Dec 13 02:23:06.093350 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024
Dec 13 02:23:06.093384 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c
Dec 13 02:23:06.093400 kernel: BIOS-provided physical RAM map:
Dec 13 02:23:06.093411 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable
Dec 13 02:23:06.093422 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved
Dec 13 02:23:06.093433 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved
Dec 13 02:23:06.093449 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable
Dec 13 02:23:06.093461 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved
Dec 13 02:23:06.093472 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved
Dec 13 02:23:06.093484 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved
Dec 13 02:23:06.093495 kernel: NX (Execute Disable) protection: active
Dec 13 02:23:06.093506 kernel: SMBIOS 2.7 present.
Dec 13 02:23:06.093518 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017
Dec 13 02:23:06.093529 kernel: Hypervisor detected: KVM
Dec 13 02:23:06.093547 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00
Dec 13 02:23:06.093560 kernel: kvm-clock: cpu 0, msr 1f19b001, primary cpu clock
Dec 13 02:23:06.093572 kernel: kvm-clock: using sched offset of 8265700160 cycles
Dec 13 02:23:06.093586 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns
Dec 13 02:23:06.093599 kernel: tsc: Detected 2499.998 MHz processor
Dec 13 02:23:06.093611 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
Dec 13 02:23:06.093627 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable
Dec 13 02:23:06.093640 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000
Dec 13 02:23:06.093653 kernel: x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
Dec 13 02:23:06.093665 kernel: Using GB pages for direct mapping
Dec 13 02:23:06.093678 kernel: ACPI: Early table checksum verification disabled
Dec 13 02:23:06.093691 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON)
Dec 13 02:23:06.093704 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001)
Dec 13 02:23:06.093717 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001)
Dec 13 02:23:06.093730 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001)
Dec 13 02:23:06.093746 kernel: ACPI: FACS 0x000000007D9EFF40 000040
Dec 13 02:23:06.093758 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001)
Dec 13 02:23:06.093771 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001)
Dec 13 02:23:06.093784 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001)
Dec 13 02:23:06.093797 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001)
Dec 13 02:23:06.093809 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001)
Dec 13 02:23:06.093822 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001)
Dec 13 02:23:06.093835 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001)
Dec 13 02:23:06.093851 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3]
Dec 13 02:23:06.093864 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488]
Dec 13 02:23:06.093877 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f]
Dec 13 02:23:06.093895 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39]
Dec 13 02:23:06.093922 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645]
Dec 13 02:23:06.093936 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf]
Dec 13 02:23:06.093949 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b]
Dec 13 02:23:06.093966 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7]
Dec 13 02:23:06.093979 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037]
Dec 13 02:23:06.093993 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba]
Dec 13 02:23:06.094007 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0
Dec 13 02:23:06.094020 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0
Dec 13 02:23:06.094034 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff]
Dec 13 02:23:06.094048 kernel: NUMA: Initialized distance table, cnt=1
Dec 13 02:23:06.094062 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff]
Dec 13 02:23:06.094079 kernel: Zone ranges:
Dec 13 02:23:06.094093 kernel:   DMA      [mem 0x0000000000001000-0x0000000000ffffff]
Dec 13 02:23:06.094107 kernel:   DMA32    [mem 0x0000000001000000-0x000000007d9e9fff]
Dec 13 02:23:06.094121 kernel:   Normal   empty
Dec 13 02:23:06.094135 kernel: Movable zone start for each node
Dec 13 02:23:06.094149 kernel: Early memory node ranges
Dec 13 02:23:06.094163 kernel:   node   0: [mem 0x0000000000001000-0x000000000009efff]
Dec 13 02:23:06.094176 kernel:   node   0: [mem 0x0000000000100000-0x000000007d9e9fff]
Dec 13 02:23:06.094190 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff]
Dec 13 02:23:06.094207 kernel: On node 0, zone DMA: 1 pages in unavailable ranges
Dec 13 02:23:06.094221 kernel: On node 0, zone DMA: 97 pages in unavailable ranges
Dec 13 02:23:06.094235 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges
Dec 13 02:23:06.094248 kernel: ACPI: PM-Timer IO Port: 0xb008
Dec 13 02:23:06.094262 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1])
Dec 13 02:23:06.094276 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23
Dec 13 02:23:06.094290 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level)
Dec 13 02:23:06.094304 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
Dec 13 02:23:06.094318 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level)
Dec 13 02:23:06.094335 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level)
Dec 13 02:23:06.094348 kernel: ACPI: Using ACPI (MADT) for SMP configuration information
Dec 13 02:23:06.094362 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000
Dec 13 02:23:06.094376 kernel: TSC deadline timer available
Dec 13 02:23:06.094390 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs
Dec 13 02:23:06.094404 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices
Dec 13 02:23:06.094417 kernel: Booting paravirtualized kernel on KVM
Dec 13 02:23:06.094432 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
Dec 13 02:23:06.094446 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1
Dec 13 02:23:06.094462 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576
Dec 13 02:23:06.094476 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152
Dec 13 02:23:06.094489 kernel: pcpu-alloc: [0] 0 1 
Dec 13 02:23:06.094503 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0
Dec 13 02:23:06.094517 kernel: kvm-guest: PV spinlocks enabled
Dec 13 02:23:06.094531 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear)
Dec 13 02:23:06.094544 kernel: Built 1 zonelists, mobility grouping on.  Total pages: 506242
Dec 13 02:23:06.094558 kernel: Policy zone: DMA32
Dec 13 02:23:06.094574 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c
Dec 13 02:23:06.094591 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space.
Dec 13 02:23:06.094604 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Dec 13 02:23:06.094618 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear)
Dec 13 02:23:06.094632 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off
Dec 13 02:23:06.094647 kernel: Memory: 1934420K/2057760K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 123080K reserved, 0K cma-reserved)
Dec 13 02:23:06.094661 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
Dec 13 02:23:06.094675 kernel: Kernel/User page tables isolation: enabled
Dec 13 02:23:06.094689 kernel: ftrace: allocating 34549 entries in 135 pages
Dec 13 02:23:06.094705 kernel: ftrace: allocated 135 pages with 4 groups
Dec 13 02:23:06.094719 kernel: rcu: Hierarchical RCU implementation.
Dec 13 02:23:06.094734 kernel: rcu:         RCU event tracing is enabled.
Dec 13 02:23:06.094748 kernel: rcu:         RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2.
Dec 13 02:23:06.094762 kernel:         Rude variant of Tasks RCU enabled.
Dec 13 02:23:06.094776 kernel:         Tracing variant of Tasks RCU enabled.
Dec 13 02:23:06.094790 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Dec 13 02:23:06.094802 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2
Dec 13 02:23:06.094816 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16
Dec 13 02:23:06.094833 kernel: random: crng init done
Dec 13 02:23:06.094847 kernel: Console: colour VGA+ 80x25
Dec 13 02:23:06.094861 kernel: printk: console [ttyS0] enabled
Dec 13 02:23:06.094875 kernel: ACPI: Core revision 20210730
Dec 13 02:23:06.094889 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns
Dec 13 02:23:06.094917 kernel: APIC: Switch to symmetric I/O mode setup
Dec 13 02:23:06.094929 kernel: x2apic enabled
Dec 13 02:23:06.094942 kernel: Switched APIC routing to physical x2apic.
Dec 13 02:23:06.094956 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns
Dec 13 02:23:06.094973 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998)
Dec 13 02:23:06.094987 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8
Dec 13 02:23:06.095001 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4
Dec 13 02:23:06.095016 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Dec 13 02:23:06.095039 kernel: Spectre V2 : Mitigation: Retpolines
Dec 13 02:23:06.095057 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
Dec 13 02:23:06.095071 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT
Dec 13 02:23:06.095087 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible!
Dec 13 02:23:06.095101 kernel: RETBleed: Vulnerable
Dec 13 02:23:06.095116 kernel: Speculative Store Bypass: Vulnerable
Dec 13 02:23:06.095130 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode
Dec 13 02:23:06.095145 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode
Dec 13 02:23:06.095159 kernel: GDS: Unknown: Dependent on hypervisor status
Dec 13 02:23:06.095174 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Dec 13 02:23:06.095191 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Dec 13 02:23:06.095206 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Dec 13 02:23:06.095221 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers'
Dec 13 02:23:06.095236 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR'
Dec 13 02:23:06.095250 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask'
Dec 13 02:23:06.095265 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256'
Dec 13 02:23:06.095282 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256'
Dec 13 02:23:06.095297 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers'
Dec 13 02:23:06.095312 kernel: x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
Dec 13 02:23:06.095327 kernel: x86/fpu: xstate_offset[3]:  832, xstate_sizes[3]:   64
Dec 13 02:23:06.095341 kernel: x86/fpu: xstate_offset[4]:  896, xstate_sizes[4]:   64
Dec 13 02:23:06.095356 kernel: x86/fpu: xstate_offset[5]:  960, xstate_sizes[5]:   64
Dec 13 02:23:06.095370 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]:  512
Dec 13 02:23:06.095385 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024
Dec 13 02:23:06.095399 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]:    8
Dec 13 02:23:06.095412 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format.
Dec 13 02:23:06.095539 kernel: Freeing SMP alternatives memory: 32K
Dec 13 02:23:06.095576 kernel: pid_max: default: 32768 minimum: 301
Dec 13 02:23:06.095589 kernel: LSM: Security Framework initializing
Dec 13 02:23:06.095604 kernel: SELinux:  Initializing.
Dec 13 02:23:06.095618 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear)
Dec 13 02:23:06.095631 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear)
Dec 13 02:23:06.097192 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7)
Dec 13 02:23:06.097210 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only.
Dec 13 02:23:06.097225 kernel: signal: max sigframe size: 3632
Dec 13 02:23:06.097239 kernel: rcu: Hierarchical SRCU implementation.
Dec 13 02:23:06.097254 kernel: NMI watchdog: Perf NMI watchdog permanently disabled
Dec 13 02:23:06.097273 kernel: smp: Bringing up secondary CPUs ...
Dec 13 02:23:06.097288 kernel: x86: Booting SMP configuration:
Dec 13 02:23:06.097301 kernel: .... node  #0, CPUs:      #1
Dec 13 02:23:06.097316 kernel: kvm-clock: cpu 1, msr 1f19b041, secondary cpu clock
Dec 13 02:23:06.097331 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0
Dec 13 02:23:06.097346 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details.
Dec 13 02:23:06.097362 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details.
Dec 13 02:23:06.097377 kernel: smp: Brought up 1 node, 2 CPUs
Dec 13 02:23:06.097391 kernel: smpboot: Max logical packages: 1
Dec 13 02:23:06.097409 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS)
Dec 13 02:23:06.097423 kernel: devtmpfs: initialized
Dec 13 02:23:06.097437 kernel: x86/mm: Memory block size: 128MB
Dec 13 02:23:06.097452 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Dec 13 02:23:06.097466 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear)
Dec 13 02:23:06.097481 kernel: pinctrl core: initialized pinctrl subsystem
Dec 13 02:23:06.097496 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
Dec 13 02:23:06.097510 kernel: audit: initializing netlink subsys (disabled)
Dec 13 02:23:06.097525 kernel: audit: type=2000 audit(1734056585.697:1): state=initialized audit_enabled=0 res=1
Dec 13 02:23:06.097542 kernel: thermal_sys: Registered thermal governor 'step_wise'
Dec 13 02:23:06.098519 kernel: thermal_sys: Registered thermal governor 'user_space'
Dec 13 02:23:06.098537 kernel: cpuidle: using governor menu
Dec 13 02:23:06.098550 kernel: ACPI: bus type PCI registered
Dec 13 02:23:06.098562 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Dec 13 02:23:06.098574 kernel: dca service started, version 1.12.1
Dec 13 02:23:06.098692 kernel: PCI: Using configuration type 1 for base access
Dec 13 02:23:06.098708 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible.
Dec 13 02:23:06.098723 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages
Dec 13 02:23:06.098740 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages
Dec 13 02:23:06.098752 kernel: ACPI: Added _OSI(Module Device)
Dec 13 02:23:06.098764 kernel: ACPI: Added _OSI(Processor Device)
Dec 13 02:23:06.098775 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Dec 13 02:23:06.098788 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Dec 13 02:23:06.098799 kernel: ACPI: Added _OSI(Linux-Dell-Video)
Dec 13 02:23:06.098812 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
Dec 13 02:23:06.098825 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
Dec 13 02:23:06.098840 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded
Dec 13 02:23:06.098857 kernel: ACPI: Interpreter enabled
Dec 13 02:23:06.098871 kernel: ACPI: PM: (supports S0 S5)
Dec 13 02:23:06.098885 kernel: ACPI: Using IOAPIC for interrupt routing
Dec 13 02:23:06.098899 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
Dec 13 02:23:06.098924 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F
Dec 13 02:23:06.098939 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
Dec 13 02:23:06.099199 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3]
Dec 13 02:23:06.099336 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge.
Dec 13 02:23:06.099357 kernel: acpiphp: Slot [3] registered
Dec 13 02:23:06.099371 kernel: acpiphp: Slot [4] registered
Dec 13 02:23:06.099383 kernel: acpiphp: Slot [5] registered
Dec 13 02:23:06.099396 kernel: acpiphp: Slot [6] registered
Dec 13 02:23:06.099407 kernel: acpiphp: Slot [7] registered
Dec 13 02:23:06.099419 kernel: acpiphp: Slot [8] registered
Dec 13 02:23:06.099432 kernel: acpiphp: Slot [9] registered
Dec 13 02:23:06.099444 kernel: acpiphp: Slot [10] registered
Dec 13 02:23:06.099456 kernel: acpiphp: Slot [11] registered
Dec 13 02:23:06.099471 kernel: acpiphp: Slot [12] registered
Dec 13 02:23:06.099483 kernel: acpiphp: Slot [13] registered
Dec 13 02:23:06.099495 kernel: acpiphp: Slot [14] registered
Dec 13 02:23:06.099507 kernel: acpiphp: Slot [15] registered
Dec 13 02:23:06.099520 kernel: acpiphp: Slot [16] registered
Dec 13 02:23:06.099533 kernel: acpiphp: Slot [17] registered
Dec 13 02:23:06.099545 kernel: acpiphp: Slot [18] registered
Dec 13 02:23:06.099557 kernel: acpiphp: Slot [19] registered
Dec 13 02:23:06.099569 kernel: acpiphp: Slot [20] registered
Dec 13 02:23:06.099584 kernel: acpiphp: Slot [21] registered
Dec 13 02:23:06.099597 kernel: acpiphp: Slot [22] registered
Dec 13 02:23:06.099609 kernel: acpiphp: Slot [23] registered
Dec 13 02:23:06.099621 kernel: acpiphp: Slot [24] registered
Dec 13 02:23:06.099636 kernel: acpiphp: Slot [25] registered
Dec 13 02:23:06.099650 kernel: acpiphp: Slot [26] registered
Dec 13 02:23:06.099663 kernel: acpiphp: Slot [27] registered
Dec 13 02:23:06.099676 kernel: acpiphp: Slot [28] registered
Dec 13 02:23:06.099688 kernel: acpiphp: Slot [29] registered
Dec 13 02:23:06.099701 kernel: acpiphp: Slot [30] registered
Dec 13 02:23:06.099718 kernel: acpiphp: Slot [31] registered
Dec 13 02:23:06.099732 kernel: PCI host bridge to bus 0000:00
Dec 13 02:23:06.099872 kernel: pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
Dec 13 02:23:06.100001 kernel: pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
Dec 13 02:23:06.100119 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
Dec 13 02:23:06.100232 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window]
Dec 13 02:23:06.100342 kernel: pci_bus 0000:00: root bus resource [bus 00-ff]
Dec 13 02:23:06.100483 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000
Dec 13 02:23:06.100617 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100
Dec 13 02:23:06.100751 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000
Dec 13 02:23:06.100875 kernel: pci 0000:00:01.3: quirk: [io  0xb000-0xb03f] claimed by PIIX4 ACPI
Dec 13 02:23:06.101008 kernel: pci 0000:00:01.3: quirk: [io  0xb100-0xb10f] claimed by PIIX4 SMB
Dec 13 02:23:06.101129 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff
Dec 13 02:23:06.101254 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff
Dec 13 02:23:06.101384 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff
Dec 13 02:23:06.101510 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff
Dec 13 02:23:06.101635 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff
Dec 13 02:23:06.101761 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff
Dec 13 02:23:06.101895 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000
Dec 13 02:23:06.102038 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref]
Dec 13 02:23:06.102167 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref]
Dec 13 02:23:06.102298 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff]
Dec 13 02:23:06.102441 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802
Dec 13 02:23:06.102571 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff]
Dec 13 02:23:06.102703 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000
Dec 13 02:23:06.102831 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff]
Dec 13 02:23:06.102851 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10
Dec 13 02:23:06.102871 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10
Dec 13 02:23:06.102886 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11
Dec 13 02:23:06.102900 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11
Dec 13 02:23:06.102926 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9
Dec 13 02:23:06.102941 kernel: iommu: Default domain type: Translated 
Dec 13 02:23:06.102956 kernel: iommu: DMA domain TLB invalidation policy: lazy mode 
Dec 13 02:23:06.103150 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device
Dec 13 02:23:06.103279 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none
Dec 13 02:23:06.103408 kernel: pci 0000:00:03.0: vgaarb: bridge control possible
Dec 13 02:23:06.103431 kernel: vgaarb: loaded
Dec 13 02:23:06.103447 kernel: pps_core: LinuxPPS API ver. 1 registered
Dec 13 02:23:06.103462 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Dec 13 02:23:06.103478 kernel: PTP clock support registered
Dec 13 02:23:06.103493 kernel: PCI: Using ACPI for IRQ routing
Dec 13 02:23:06.103509 kernel: PCI: pci_cache_line_size set to 64 bytes
Dec 13 02:23:06.103525 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff]
Dec 13 02:23:06.103540 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff]
Dec 13 02:23:06.103558 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0
Dec 13 02:23:06.103574 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter
Dec 13 02:23:06.103589 kernel: clocksource: Switched to clocksource kvm-clock
Dec 13 02:23:06.103604 kernel: VFS: Disk quotas dquot_6.6.0
Dec 13 02:23:06.103620 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Dec 13 02:23:06.103635 kernel: pnp: PnP ACPI init
Dec 13 02:23:06.103651 kernel: pnp: PnP ACPI: found 5 devices
Dec 13 02:23:06.103666 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
Dec 13 02:23:06.103681 kernel: NET: Registered PF_INET protocol family
Dec 13 02:23:06.103698 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear)
Dec 13 02:23:06.103713 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear)
Dec 13 02:23:06.103729 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Dec 13 02:23:06.103744 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear)
Dec 13 02:23:06.103759 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear)
Dec 13 02:23:06.103775 kernel: TCP: Hash tables configured (established 16384 bind 16384)
Dec 13 02:23:06.103790 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear)
Dec 13 02:23:06.103805 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear)
Dec 13 02:23:06.103820 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
Dec 13 02:23:06.103838 kernel: NET: Registered PF_XDP protocol family
Dec 13 02:23:06.103971 kernel: pci_bus 0000:00: resource 4 [io  0x0000-0x0cf7 window]
Dec 13 02:23:06.104087 kernel: pci_bus 0000:00: resource 5 [io  0x0d00-0xffff window]
Dec 13 02:23:06.104286 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window]
Dec 13 02:23:06.104402 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window]
Dec 13 02:23:06.104533 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers
Dec 13 02:23:06.104664 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds
Dec 13 02:23:06.104689 kernel: PCI: CLS 0 bytes, default 64
Dec 13 02:23:06.104705 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer
Dec 13 02:23:06.104721 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns
Dec 13 02:23:06.104736 kernel: clocksource: Switched to clocksource tsc
Dec 13 02:23:06.104751 kernel: Initialise system trusted keyrings
Dec 13 02:23:06.104767 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0
Dec 13 02:23:06.104782 kernel: Key type asymmetric registered
Dec 13 02:23:06.104796 kernel: Asymmetric key parser 'x509' registered
Dec 13 02:23:06.104812 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249)
Dec 13 02:23:06.104830 kernel: io scheduler mq-deadline registered
Dec 13 02:23:06.104845 kernel: io scheduler kyber registered
Dec 13 02:23:06.104860 kernel: io scheduler bfq registered
Dec 13 02:23:06.104875 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00
Dec 13 02:23:06.104890 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
Dec 13 02:23:06.104916 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
Dec 13 02:23:06.104928 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12
Dec 13 02:23:06.104940 kernel: i8042: Warning: Keylock active
Dec 13 02:23:06.104951 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1
Dec 13 02:23:06.104968 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12
Dec 13 02:23:06.105106 kernel: rtc_cmos 00:00: RTC can wake from S4
Dec 13 02:23:06.105216 kernel: rtc_cmos 00:00: registered as rtc0
Dec 13 02:23:06.105321 kernel: rtc_cmos 00:00: setting system clock to 2024-12-13T02:23:05 UTC (1734056585)
Dec 13 02:23:06.105425 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram
Dec 13 02:23:06.105440 kernel: intel_pstate: CPU model not supported
Dec 13 02:23:06.105453 kernel: NET: Registered PF_INET6 protocol family
Dec 13 02:23:06.105466 kernel: Segment Routing with IPv6
Dec 13 02:23:06.105482 kernel: In-situ OAM (IOAM) with IPv6
Dec 13 02:23:06.105495 kernel: NET: Registered PF_PACKET protocol family
Dec 13 02:23:06.105507 kernel: Key type dns_resolver registered
Dec 13 02:23:06.105521 kernel: IPI shorthand broadcast: enabled
Dec 13 02:23:06.105533 kernel: sched_clock: Marking stable (478403617, 329745612)->(977062399, -168913170)
Dec 13 02:23:06.105546 kernel: registered taskstats version 1
Dec 13 02:23:06.105558 kernel: Loading compiled-in X.509 certificates
Dec 13 02:23:06.105570 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e'
Dec 13 02:23:06.105583 kernel: Key type .fscrypt registered
Dec 13 02:23:06.105598 kernel: Key type fscrypt-provisioning registered
Dec 13 02:23:06.105611 kernel: ima: No TPM chip found, activating TPM-bypass!
Dec 13 02:23:06.105624 kernel: ima: Allocated hash algorithm: sha1
Dec 13 02:23:06.105636 kernel: ima: No architecture policies found
Dec 13 02:23:06.105648 kernel: clk: Disabling unused clocks
Dec 13 02:23:06.105662 kernel: Freeing unused kernel image (initmem) memory: 47476K
Dec 13 02:23:06.105674 kernel: Write protecting the kernel read-only data: 28672k
Dec 13 02:23:06.105686 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K
Dec 13 02:23:06.105699 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K
Dec 13 02:23:06.105713 kernel: Run /init as init process
Dec 13 02:23:06.105726 kernel:   with arguments:
Dec 13 02:23:06.105738 kernel:     /init
Dec 13 02:23:06.105750 kernel:   with environment:
Dec 13 02:23:06.105762 kernel:     HOME=/
Dec 13 02:23:06.105774 kernel:     TERM=linux
Dec 13 02:23:06.105786 kernel:     BOOT_IMAGE=/flatcar/vmlinuz-a
Dec 13 02:23:06.105802 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Dec 13 02:23:06.105820 systemd[1]: Detected virtualization amazon.
Dec 13 02:23:06.105833 systemd[1]: Detected architecture x86-64.
Dec 13 02:23:06.105845 systemd[1]: Running in initrd.
Dec 13 02:23:06.105858 systemd[1]: No hostname configured, using default hostname.
Dec 13 02:23:06.105885 systemd[1]: Hostname set to <localhost>.
Dec 13 02:23:06.105902 systemd[1]: Initializing machine ID from VM UUID.
Dec 13 02:23:06.105930 systemd[1]: Queued start job for default target initrd.target.
Dec 13 02:23:06.105943 systemd[1]: Started systemd-ask-password-console.path.
Dec 13 02:23:06.105956 systemd[1]: Reached target cryptsetup.target.
Dec 13 02:23:06.105970 systemd[1]: Reached target paths.target.
Dec 13 02:23:06.105983 systemd[1]: Reached target slices.target.
Dec 13 02:23:06.105996 systemd[1]: Reached target swap.target.
Dec 13 02:23:06.106009 systemd[1]: Reached target timers.target.
Dec 13 02:23:06.106026 systemd[1]: Listening on iscsid.socket.
Dec 13 02:23:06.106039 systemd[1]: Listening on iscsiuio.socket.
Dec 13 02:23:06.106052 systemd[1]: Listening on systemd-journald-audit.socket.
Dec 13 02:23:06.106065 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0
Dec 13 02:23:06.106079 systemd[1]: Listening on systemd-journald-dev-log.socket.
Dec 13 02:23:06.106092 systemd[1]: Listening on systemd-journald.socket.
Dec 13 02:23:06.106106 systemd[1]: Listening on systemd-networkd.socket.
Dec 13 02:23:06.106119 systemd[1]: Listening on systemd-udevd-control.socket.
Dec 13 02:23:06.106132 systemd[1]: Listening on systemd-udevd-kernel.socket.
Dec 13 02:23:06.106148 systemd[1]: Reached target sockets.target.
Dec 13 02:23:06.106162 systemd[1]: Starting kmod-static-nodes.service...
Dec 13 02:23:06.106175 systemd[1]: Finished network-cleanup.service.
Dec 13 02:23:06.106188 systemd[1]: Starting systemd-fsck-usr.service...
Dec 13 02:23:06.106201 systemd[1]: Starting systemd-journald.service...
Dec 13 02:23:06.106215 systemd[1]: Starting systemd-modules-load.service...
Dec 13 02:23:06.106228 systemd[1]: Starting systemd-resolved.service...
Dec 13 02:23:06.106244 systemd[1]: Starting systemd-vconsole-setup.service...
Dec 13 02:23:06.106264 systemd-journald[185]: Journal started
Dec 13 02:23:06.106333 systemd-journald[185]: Runtime Journal (/run/log/journal/ec215d90af3867fb0135584187278b5b) is 4.8M, max 38.7M, 33.9M free.
Dec 13 02:23:06.131936 systemd[1]: Started systemd-journald.service.
Dec 13 02:23:06.136955 kernel: audit: type=1130 audit(1734056586.133:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:06.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:06.135007 systemd[1]: Finished kmod-static-nodes.service.
Dec 13 02:23:06.293619 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Dec 13 02:23:06.293652 kernel: Bridge firewalling registered
Dec 13 02:23:06.293668 kernel: SCSI subsystem initialized
Dec 13 02:23:06.293688 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log.
Dec 13 02:23:06.293708 kernel: device-mapper: uevent: version 1.0.3
Dec 13 02:23:06.293726 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com
Dec 13 02:23:06.142741 systemd-resolved[187]: Positive Trust Anchors:
Dec 13 02:23:06.142755 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Dec 13 02:23:06.305124 kernel: audit: type=1130 audit(1734056586.292:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:06.305153 kernel: audit: type=1130 audit(1734056586.294:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:06.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:06.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:06.142810 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Dec 13 02:23:06.324777 kernel: audit: type=1130 audit(1734056586.306:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:06.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:06.144720 systemd-modules-load[186]: Inserted module 'overlay'
Dec 13 02:23:06.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:06.150079 systemd-resolved[187]: Defaulting to hostname 'linux'.
Dec 13 02:23:06.334412 kernel: audit: type=1130 audit(1734056586.324:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:06.208015 systemd-modules-load[186]: Inserted module 'br_netfilter'
Dec 13 02:23:06.360084 kernel: audit: type=1130 audit(1734056586.334:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:06.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:06.257110 systemd-modules-load[186]: Inserted module 'dm_multipath'
Dec 13 02:23:06.294040 systemd[1]: Started systemd-resolved.service.
Dec 13 02:23:06.305177 systemd[1]: Finished systemd-fsck-usr.service.
Dec 13 02:23:06.306489 systemd[1]: Finished systemd-modules-load.service.
Dec 13 02:23:06.325308 systemd[1]: Finished systemd-vconsole-setup.service.
Dec 13 02:23:06.360179 systemd[1]: Reached target nss-lookup.target.
Dec 13 02:23:06.386417 systemd[1]: Starting dracut-cmdline-ask.service...
Dec 13 02:23:06.398601 systemd[1]: Starting systemd-sysctl.service...
Dec 13 02:23:06.404990 systemd[1]: Starting systemd-tmpfiles-setup-dev.service...
Dec 13 02:23:06.420615 systemd[1]: Finished systemd-tmpfiles-setup-dev.service.
Dec 13 02:23:06.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:06.425925 kernel: audit: type=1130 audit(1734056586.419:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:06.427332 systemd[1]: Finished systemd-sysctl.service.
Dec 13 02:23:06.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:06.432566 kernel: audit: type=1130 audit(1734056586.426:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:06.436078 systemd[1]: Finished dracut-cmdline-ask.service.
Dec 13 02:23:06.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:06.446748 kernel: audit: type=1130 audit(1734056586.436:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:06.438331 systemd[1]: Starting dracut-cmdline.service...
Dec 13 02:23:06.456476 dracut-cmdline[205]: dracut-dracut-053
Dec 13 02:23:06.460573 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c
Dec 13 02:23:06.573935 kernel: Loading iSCSI transport class v2.0-870.
Dec 13 02:23:06.608939 kernel: iscsi: registered transport (tcp)
Dec 13 02:23:06.665315 kernel: iscsi: registered transport (qla4xxx)
Dec 13 02:23:06.665386 kernel: QLogic iSCSI HBA Driver
Dec 13 02:23:06.709327 systemd[1]: Finished dracut-cmdline.service.
Dec 13 02:23:06.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:06.714535 systemd[1]: Starting dracut-pre-udev.service...
Dec 13 02:23:06.774962 kernel: raid6: avx512x4 gen() 15323 MB/s
Dec 13 02:23:06.791965 kernel: raid6: avx512x4 xor()  6802 MB/s
Dec 13 02:23:06.808963 kernel: raid6: avx512x2 gen() 15571 MB/s
Dec 13 02:23:06.825959 kernel: raid6: avx512x2 xor() 22777 MB/s
Dec 13 02:23:06.842960 kernel: raid6: avx512x1 gen() 13568 MB/s
Dec 13 02:23:06.859959 kernel: raid6: avx512x1 xor() 20961 MB/s
Dec 13 02:23:06.876961 kernel: raid6: avx2x4   gen() 17125 MB/s
Dec 13 02:23:06.893943 kernel: raid6: avx2x4   xor()  7125 MB/s
Dec 13 02:23:06.911968 kernel: raid6: avx2x2   gen() 10820 MB/s
Dec 13 02:23:06.930066 kernel: raid6: avx2x2   xor()  9648 MB/s
Dec 13 02:23:06.947968 kernel: raid6: avx2x1   gen() 10262 MB/s
Dec 13 02:23:06.967491 kernel: raid6: avx2x1   xor()  6521 MB/s
Dec 13 02:23:06.984979 kernel: raid6: sse2x4   gen()  2868 MB/s
Dec 13 02:23:07.002028 kernel: raid6: sse2x4   xor()  3316 MB/s
Dec 13 02:23:07.019963 kernel: raid6: sse2x2   gen()  7864 MB/s
Dec 13 02:23:07.036969 kernel: raid6: sse2x2   xor()  4878 MB/s
Dec 13 02:23:07.056965 kernel: raid6: sse2x1   gen()  5651 MB/s
Dec 13 02:23:07.079037 kernel: raid6: sse2x1   xor()  1543 MB/s
Dec 13 02:23:07.079112 kernel: raid6: using algorithm avx2x4 gen() 17125 MB/s
Dec 13 02:23:07.079130 kernel: raid6: .... xor() 7125 MB/s, rmw enabled
Dec 13 02:23:07.085043 kernel: raid6: using avx512x2 recovery algorithm
Dec 13 02:23:07.101943 kernel: xor: automatically using best checksumming function   avx       
Dec 13 02:23:07.209936 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no
Dec 13 02:23:07.218934 systemd[1]: Finished dracut-pre-udev.service.
Dec 13 02:23:07.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:07.219000 audit: BPF prog-id=7 op=LOAD
Dec 13 02:23:07.219000 audit: BPF prog-id=8 op=LOAD
Dec 13 02:23:07.221249 systemd[1]: Starting systemd-udevd.service...
Dec 13 02:23:07.257130 systemd-udevd[383]: Using default interface naming scheme 'v252'.
Dec 13 02:23:07.268274 systemd[1]: Started systemd-udevd.service.
Dec 13 02:23:07.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:07.270335 systemd[1]: Starting dracut-pre-trigger.service...
Dec 13 02:23:07.291980 dracut-pre-trigger[387]: rd.md=0: removing MD RAID activation
Dec 13 02:23:07.327642 systemd[1]: Finished dracut-pre-trigger.service.
Dec 13 02:23:07.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:07.330672 systemd[1]: Starting systemd-udev-trigger.service...
Dec 13 02:23:07.383791 systemd[1]: Finished systemd-udev-trigger.service.
Dec 13 02:23:07.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:07.491107 kernel: ena 0000:00:05.0: ENA device version: 0.10
Dec 13 02:23:07.515521 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1
Dec 13 02:23:07.515672 kernel: cryptd: max_cpu_qlen set to 1000
Dec 13 02:23:07.515690 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy.
Dec 13 02:23:07.515814 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:e0:9f:f4:bf:1f
Dec 13 02:23:07.517663 (udev-worker)[438]: Network interface NamePolicy= disabled on kernel command line.
Dec 13 02:23:07.697042 kernel: nvme nvme0: pci function 0000:00:04.0
Dec 13 02:23:07.700350 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11
Dec 13 02:23:07.700376 kernel: AVX2 version of gcm_enc/dec engaged.
Dec 13 02:23:07.700394 kernel: AES CTR mode by8 optimization enabled
Dec 13 02:23:07.700413 kernel: nvme nvme0: 2/0/0 default/read/poll queues
Dec 13 02:23:07.700602 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk.
Dec 13 02:23:07.700621 kernel: GPT:9289727 != 16777215
Dec 13 02:23:07.700637 kernel: GPT:Alternate GPT header not at the end of the disk.
Dec 13 02:23:07.700654 kernel: GPT:9289727 != 16777215
Dec 13 02:23:07.700672 kernel: GPT: Use GNU Parted to correct GPT errors.
Dec 13 02:23:07.700689 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Dec 13 02:23:07.700707 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (432)
Dec 13 02:23:07.776018 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device.
Dec 13 02:23:07.784188 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Dec 13 02:23:07.803745 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device.
Dec 13 02:23:07.804037 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device.
Dec 13 02:23:07.823064 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device.
Dec 13 02:23:07.824971 systemd[1]: Starting disk-uuid.service...
Dec 13 02:23:07.834882 disk-uuid[592]: Primary Header is updated.
Dec 13 02:23:07.834882 disk-uuid[592]: Secondary Entries is updated.
Dec 13 02:23:07.834882 disk-uuid[592]: Secondary Header is updated.
Dec 13 02:23:07.841966 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Dec 13 02:23:07.853224 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Dec 13 02:23:07.868896 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Dec 13 02:23:08.874982 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Dec 13 02:23:08.875060 disk-uuid[593]: The operation has completed successfully.
Dec 13 02:23:09.091358 systemd[1]: disk-uuid.service: Deactivated successfully.
Dec 13 02:23:09.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:09.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:09.091496 systemd[1]: Finished disk-uuid.service.
Dec 13 02:23:09.111846 systemd[1]: Starting verity-setup.service...
Dec 13 02:23:09.141926 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2"
Dec 13 02:23:09.261947 systemd[1]: Found device dev-mapper-usr.device.
Dec 13 02:23:09.265145 systemd[1]: Mounting sysusr-usr.mount...
Dec 13 02:23:09.275095 systemd[1]: Finished verity-setup.service.
Dec 13 02:23:09.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:09.450929 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none.
Dec 13 02:23:09.451335 systemd[1]: Mounted sysusr-usr.mount.
Dec 13 02:23:09.453055 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met.
Dec 13 02:23:09.457997 systemd[1]: Starting ignition-setup.service...
Dec 13 02:23:09.461498 systemd[1]: Starting parse-ip-for-networkd.service...
Dec 13 02:23:09.508646 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm
Dec 13 02:23:09.508719 kernel: BTRFS info (device nvme0n1p6): using free space tree
Dec 13 02:23:09.508737 kernel: BTRFS info (device nvme0n1p6): has skinny extents
Dec 13 02:23:09.519927 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations
Dec 13 02:23:09.536274 systemd[1]: mnt-oem.mount: Deactivated successfully.
Dec 13 02:23:09.549826 systemd[1]: Finished ignition-setup.service.
Dec 13 02:23:09.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:09.552623 systemd[1]: Starting ignition-fetch-offline.service...
Dec 13 02:23:09.579711 systemd[1]: Finished parse-ip-for-networkd.service.
Dec 13 02:23:09.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:09.581000 audit: BPF prog-id=9 op=LOAD
Dec 13 02:23:09.583327 systemd[1]: Starting systemd-networkd.service...
Dec 13 02:23:09.614531 systemd-networkd[1104]: lo: Link UP
Dec 13 02:23:09.614543 systemd-networkd[1104]: lo: Gained carrier
Dec 13 02:23:09.616718 systemd-networkd[1104]: Enumeration completed
Dec 13 02:23:09.616939 systemd[1]: Started systemd-networkd.service.
Dec 13 02:23:09.617255 systemd-networkd[1104]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Dec 13 02:23:09.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:09.623116 systemd[1]: Reached target network.target.
Dec 13 02:23:09.627181 systemd[1]: Starting iscsiuio.service...
Dec 13 02:23:09.636294 systemd[1]: Started iscsiuio.service.
Dec 13 02:23:09.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:09.642742 systemd[1]: Starting iscsid.service...
Dec 13 02:23:09.642951 systemd-networkd[1104]: eth0: Link UP
Dec 13 02:23:09.642957 systemd-networkd[1104]: eth0: Gained carrier
Dec 13 02:23:09.653332 iscsid[1109]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi
Dec 13 02:23:09.653332 iscsid[1109]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier].
Dec 13 02:23:09.653332 iscsid[1109]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6.
Dec 13 02:23:09.653332 iscsid[1109]: If using hardware iscsi like qla4xxx this message can be ignored.
Dec 13 02:23:09.653332 iscsid[1109]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi
Dec 13 02:23:09.653332 iscsid[1109]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf
Dec 13 02:23:09.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:09.653861 systemd[1]: Started iscsid.service.
Dec 13 02:23:09.668487 systemd[1]: Starting dracut-initqueue.service...
Dec 13 02:23:09.681235 systemd-networkd[1104]: eth0: DHCPv4 address 172.31.27.10/20, gateway 172.31.16.1 acquired from 172.31.16.1
Dec 13 02:23:09.686843 systemd[1]: Finished dracut-initqueue.service.
Dec 13 02:23:09.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:09.687084 systemd[1]: Reached target remote-fs-pre.target.
Dec 13 02:23:09.690066 systemd[1]: Reached target remote-cryptsetup.target.
Dec 13 02:23:09.691113 systemd[1]: Reached target remote-fs.target.
Dec 13 02:23:09.696672 systemd[1]: Starting dracut-pre-mount.service...
Dec 13 02:23:09.714991 systemd[1]: Finished dracut-pre-mount.service.
Dec 13 02:23:09.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:10.010607 ignition[1076]: Ignition 2.14.0
Dec 13 02:23:10.010629 ignition[1076]: Stage: fetch-offline
Dec 13 02:23:10.010800 ignition[1076]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Dec 13 02:23:10.010846 ignition[1076]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Dec 13 02:23:10.041871 ignition[1076]: no config dir at "/usr/lib/ignition/base.platform.d/aws"
Dec 13 02:23:10.042383 ignition[1076]: Ignition finished successfully
Dec 13 02:23:10.046869 systemd[1]: Finished ignition-fetch-offline.service.
Dec 13 02:23:10.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:10.050851 systemd[1]: Starting ignition-fetch.service...
Dec 13 02:23:10.065061 ignition[1128]: Ignition 2.14.0
Dec 13 02:23:10.065075 ignition[1128]: Stage: fetch
Dec 13 02:23:10.065285 ignition[1128]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Dec 13 02:23:10.065319 ignition[1128]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Dec 13 02:23:10.075799 ignition[1128]: no config dir at "/usr/lib/ignition/base.platform.d/aws"
Dec 13 02:23:10.077333 ignition[1128]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Dec 13 02:23:10.108616 ignition[1128]: INFO     : PUT result: OK
Dec 13 02:23:10.112840 ignition[1128]: DEBUG    : parsed url from cmdline: ""
Dec 13 02:23:10.112840 ignition[1128]: INFO     : no config URL provided
Dec 13 02:23:10.112840 ignition[1128]: INFO     : reading system config file "/usr/lib/ignition/user.ign"
Dec 13 02:23:10.112840 ignition[1128]: INFO     : no config at "/usr/lib/ignition/user.ign"
Dec 13 02:23:10.120645 ignition[1128]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Dec 13 02:23:10.120645 ignition[1128]: INFO     : PUT result: OK
Dec 13 02:23:10.120645 ignition[1128]: INFO     : GET http://169.254.169.254/2019-10-01/user-data: attempt #1
Dec 13 02:23:10.123974 ignition[1128]: INFO     : GET result: OK
Dec 13 02:23:10.123974 ignition[1128]: DEBUG    : parsing config with SHA512: fe40100ab32323347284f75127020e66208e37a28ce14cd0ba7fa4614e683eec7e1e5107ead1b007a25edb2f6ae93a32be152c6735341dda758a60b4d141daf4
Dec 13 02:23:10.141544 unknown[1128]: fetched base config from "system"
Dec 13 02:23:10.141558 unknown[1128]: fetched base config from "system"
Dec 13 02:23:10.142662 ignition[1128]: fetch: fetch complete
Dec 13 02:23:10.141566 unknown[1128]: fetched user config from "aws"
Dec 13 02:23:10.163487 kernel: kauditd_printk_skb: 19 callbacks suppressed
Dec 13 02:23:10.163524 kernel: audit: type=1130 audit(1734056590.154:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:10.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:10.142671 ignition[1128]: fetch: fetch passed
Dec 13 02:23:10.145441 systemd[1]: Finished ignition-fetch.service.
Dec 13 02:23:10.142729 ignition[1128]: Ignition finished successfully
Dec 13 02:23:10.155470 systemd[1]: Starting ignition-kargs.service...
Dec 13 02:23:10.187744 ignition[1134]: Ignition 2.14.0
Dec 13 02:23:10.187759 ignition[1134]: Stage: kargs
Dec 13 02:23:10.188513 ignition[1134]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Dec 13 02:23:10.188553 ignition[1134]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Dec 13 02:23:10.204506 ignition[1134]: no config dir at "/usr/lib/ignition/base.platform.d/aws"
Dec 13 02:23:10.206281 ignition[1134]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Dec 13 02:23:10.210662 ignition[1134]: INFO     : PUT result: OK
Dec 13 02:23:10.213971 ignition[1134]: kargs: kargs passed
Dec 13 02:23:10.214033 ignition[1134]: Ignition finished successfully
Dec 13 02:23:10.215932 systemd[1]: Finished ignition-kargs.service.
Dec 13 02:23:10.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:10.229322 systemd[1]: Starting ignition-disks.service...
Dec 13 02:23:10.239269 kernel: audit: type=1130 audit(1734056590.226:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:10.257421 ignition[1140]: Ignition 2.14.0
Dec 13 02:23:10.257435 ignition[1140]: Stage: disks
Dec 13 02:23:10.257706 ignition[1140]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Dec 13 02:23:10.257742 ignition[1140]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Dec 13 02:23:10.271033 ignition[1140]: no config dir at "/usr/lib/ignition/base.platform.d/aws"
Dec 13 02:23:10.272402 ignition[1140]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Dec 13 02:23:10.274412 ignition[1140]: INFO     : PUT result: OK
Dec 13 02:23:10.278786 ignition[1140]: disks: disks passed
Dec 13 02:23:10.279047 ignition[1140]: Ignition finished successfully
Dec 13 02:23:10.284017 systemd[1]: Finished ignition-disks.service.
Dec 13 02:23:10.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:10.291274 systemd[1]: Reached target initrd-root-device.target.
Dec 13 02:23:10.313631 kernel: audit: type=1130 audit(1734056590.289:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:10.313746 systemd[1]: Reached target local-fs-pre.target.
Dec 13 02:23:10.316714 systemd[1]: Reached target local-fs.target.
Dec 13 02:23:10.321335 systemd[1]: Reached target sysinit.target.
Dec 13 02:23:10.322504 systemd[1]: Reached target basic.target.
Dec 13 02:23:10.333126 systemd[1]: Starting systemd-fsck-root.service...
Dec 13 02:23:10.399615 systemd-fsck[1148]: ROOT: clean, 621/553520 files, 56021/553472 blocks
Dec 13 02:23:10.402892 systemd[1]: Finished systemd-fsck-root.service.
Dec 13 02:23:10.411088 kernel: audit: type=1130 audit(1734056590.405:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:10.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:10.406803 systemd[1]: Mounting sysroot.mount...
Dec 13 02:23:10.430937 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none.
Dec 13 02:23:10.433003 systemd[1]: Mounted sysroot.mount.
Dec 13 02:23:10.434734 systemd[1]: Reached target initrd-root-fs.target.
Dec 13 02:23:10.441049 systemd[1]: Mounting sysroot-usr.mount...
Dec 13 02:23:10.449658 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met.
Dec 13 02:23:10.450667 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot).
Dec 13 02:23:10.450711 systemd[1]: Reached target ignition-diskful.target.
Dec 13 02:23:10.456281 systemd[1]: Mounted sysroot-usr.mount.
Dec 13 02:23:10.484518 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Dec 13 02:23:10.488616 systemd[1]: Starting initrd-setup-root.service...
Dec 13 02:23:10.497269 initrd-setup-root[1170]: cut: /sysroot/etc/passwd: No such file or directory
Dec 13 02:23:10.507397 initrd-setup-root[1178]: cut: /sysroot/etc/group: No such file or directory
Dec 13 02:23:10.518939 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1165)
Dec 13 02:23:10.526664 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm
Dec 13 02:23:10.527421 kernel: BTRFS info (device nvme0n1p6): using free space tree
Dec 13 02:23:10.527476 kernel: BTRFS info (device nvme0n1p6): has skinny extents
Dec 13 02:23:10.528347 initrd-setup-root[1186]: cut: /sysroot/etc/shadow: No such file or directory
Dec 13 02:23:10.541136 initrd-setup-root[1210]: cut: /sysroot/etc/gshadow: No such file or directory
Dec 13 02:23:10.544800 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations
Dec 13 02:23:10.549310 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Dec 13 02:23:10.671080 systemd[1]: Finished initrd-setup-root.service.
Dec 13 02:23:10.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:10.674581 systemd[1]: Starting ignition-mount.service...
Dec 13 02:23:10.684725 kernel: audit: type=1130 audit(1734056590.670:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:10.690415 systemd[1]: Starting sysroot-boot.service...
Dec 13 02:23:10.697117 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully.
Dec 13 02:23:10.697464 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully.
Dec 13 02:23:10.735295 ignition[1230]: INFO     : Ignition 2.14.0
Dec 13 02:23:10.736473 ignition[1230]: INFO     : Stage: mount
Dec 13 02:23:10.736473 ignition[1230]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Dec 13 02:23:10.736473 ignition[1230]: DEBUG    : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Dec 13 02:23:10.747574 ignition[1230]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/aws"
Dec 13 02:23:10.749376 ignition[1230]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Dec 13 02:23:10.752018 ignition[1230]: INFO     : PUT result: OK
Dec 13 02:23:10.755230 ignition[1230]: INFO     : mount: mount passed
Dec 13 02:23:10.755230 ignition[1230]: INFO     : Ignition finished successfully
Dec 13 02:23:10.756631 systemd[1]: Finished ignition-mount.service.
Dec 13 02:23:10.764809 kernel: audit: type=1130 audit(1734056590.759:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:10.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:10.760416 systemd[1]: Starting ignition-files.service...
Dec 13 02:23:10.771919 systemd[1]: Finished sysroot-boot.service.
Dec 13 02:23:10.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:10.779931 kernel: audit: type=1130 audit(1734056590.773:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:10.781575 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Dec 13 02:23:10.804928 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1240)
Dec 13 02:23:10.815302 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm
Dec 13 02:23:10.815376 kernel: BTRFS info (device nvme0n1p6): using free space tree
Dec 13 02:23:10.815395 kernel: BTRFS info (device nvme0n1p6): has skinny extents
Dec 13 02:23:10.837081 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations
Dec 13 02:23:10.846213 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Dec 13 02:23:10.867917 ignition[1259]: INFO     : Ignition 2.14.0
Dec 13 02:23:10.867917 ignition[1259]: INFO     : Stage: files
Dec 13 02:23:10.870387 ignition[1259]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Dec 13 02:23:10.870387 ignition[1259]: DEBUG    : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Dec 13 02:23:10.885432 ignition[1259]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/aws"
Dec 13 02:23:10.887504 ignition[1259]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Dec 13 02:23:10.889179 ignition[1259]: INFO     : PUT result: OK
Dec 13 02:23:10.893828 ignition[1259]: DEBUG    : files: compiled without relabeling support, skipping
Dec 13 02:23:10.901427 ignition[1259]: INFO     : files: ensureUsers: op(1): [started]  creating or modifying user "core"
Dec 13 02:23:10.903098 ignition[1259]: DEBUG    : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core"
Dec 13 02:23:10.921505 ignition[1259]: INFO     : files: ensureUsers: op(1): [finished] creating or modifying user "core"
Dec 13 02:23:10.929362 ignition[1259]: INFO     : files: ensureUsers: op(2): [started]  adding ssh keys to user "core"
Dec 13 02:23:10.935770 unknown[1259]: wrote ssh authorized keys file for user: core
Dec 13 02:23:10.937552 ignition[1259]: INFO     : files: ensureUsers: op(2): [finished] adding ssh keys to user "core"
Dec 13 02:23:10.946245 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [started]  writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz"
Dec 13 02:23:10.949510 ignition[1259]: INFO     : GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1
Dec 13 02:23:11.069032 ignition[1259]: INFO     : GET result: OK
Dec 13 02:23:11.310671 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz"
Dec 13 02:23:11.314695 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [started]  writing file "/sysroot/etc/eks/bootstrap.sh"
Dec 13 02:23:11.318358 ignition[1259]: INFO     : oem config not found in "/usr/share/oem", looking on oem partition
Dec 13 02:23:11.350822 ignition[1259]: INFO     : op(1): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem3647987973"
Dec 13 02:23:11.350822 ignition[1259]: CRITICAL : op(1): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem3647987973": device or resource busy
Dec 13 02:23:11.350822 ignition[1259]: ERROR    : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3647987973", trying btrfs: device or resource busy
Dec 13 02:23:11.350822 ignition[1259]: INFO     : op(2): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem3647987973"
Dec 13 02:23:11.371758 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1261)
Dec 13 02:23:11.371806 ignition[1259]: INFO     : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3647987973"
Dec 13 02:23:11.377256 ignition[1259]: INFO     : op(3): [started]  unmounting "/mnt/oem3647987973"
Dec 13 02:23:11.381689 ignition[1259]: INFO     : op(3): [finished] unmounting "/mnt/oem3647987973"
Dec 13 02:23:11.381689 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh"
Dec 13 02:23:11.381689 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [started]  writing file "/sysroot/home/core/install.sh"
Dec 13 02:23:11.381689 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh"
Dec 13 02:23:11.381689 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [started]  writing file "/sysroot/home/core/nginx.yaml"
Dec 13 02:23:11.381689 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nginx.yaml"
Dec 13 02:23:11.381689 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [started]  writing file "/sysroot/home/core/nfs-pod.yaml"
Dec 13 02:23:11.381689 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pod.yaml"
Dec 13 02:23:11.381689 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [started]  writing file "/sysroot/home/core/nfs-pvc.yaml"
Dec 13 02:23:11.381689 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml"
Dec 13 02:23:11.381689 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [started]  writing file "/sysroot/etc/flatcar/update.conf"
Dec 13 02:23:11.381689 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf"
Dec 13 02:23:11.381689 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(a): [started]  writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw"
Dec 13 02:23:11.433551 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(a): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw"
Dec 13 02:23:11.433551 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(b): [started]  writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json"
Dec 13 02:23:11.433551 ignition[1259]: INFO     : oem config not found in "/usr/share/oem", looking on oem partition
Dec 13 02:23:11.433551 ignition[1259]: INFO     : op(4): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem3457718992"
Dec 13 02:23:11.433551 ignition[1259]: CRITICAL : op(4): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem3457718992": device or resource busy
Dec 13 02:23:11.433551 ignition[1259]: ERROR    : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3457718992", trying btrfs: device or resource busy
Dec 13 02:23:11.433551 ignition[1259]: INFO     : op(5): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem3457718992"
Dec 13 02:23:11.433551 ignition[1259]: INFO     : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3457718992"
Dec 13 02:23:11.433551 ignition[1259]: INFO     : op(6): [started]  unmounting "/mnt/oem3457718992"
Dec 13 02:23:11.433551 ignition[1259]: INFO     : op(6): [finished] unmounting "/mnt/oem3457718992"
Dec 13 02:23:11.433551 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json"
Dec 13 02:23:11.433551 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(c): [started]  writing file "/sysroot/etc/amazon/ssm/seelog.xml"
Dec 13 02:23:11.433551 ignition[1259]: INFO     : oem config not found in "/usr/share/oem", looking on oem partition
Dec 13 02:23:11.441939 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Dec 13 02:23:11.467083 ignition[1259]: INFO     : op(7): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem2541406006"
Dec 13 02:23:11.469002 ignition[1259]: CRITICAL : op(7): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem2541406006": device or resource busy
Dec 13 02:23:11.469002 ignition[1259]: ERROR    : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2541406006", trying btrfs: device or resource busy
Dec 13 02:23:11.469002 ignition[1259]: INFO     : op(8): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem2541406006"
Dec 13 02:23:11.475014 ignition[1259]: INFO     : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2541406006"
Dec 13 02:23:11.475014 ignition[1259]: INFO     : op(9): [started]  unmounting "/mnt/oem2541406006"
Dec 13 02:23:11.474965 systemd[1]: mnt-oem2541406006.mount: Deactivated successfully.
Dec 13 02:23:11.480150 ignition[1259]: INFO     : op(9): [finished] unmounting "/mnt/oem2541406006"
Dec 13 02:23:11.480150 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml"
Dec 13 02:23:11.480150 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(d): [started]  writing file "/sysroot/etc/systemd/system/nvidia.service"
Dec 13 02:23:11.480150 ignition[1259]: INFO     : oem config not found in "/usr/share/oem", looking on oem partition
Dec 13 02:23:11.502847 ignition[1259]: INFO     : op(a): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem508335884"
Dec 13 02:23:11.507226 systemd-networkd[1104]: eth0: Gained IPv6LL
Dec 13 02:23:11.514015 ignition[1259]: CRITICAL : op(a): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem508335884": device or resource busy
Dec 13 02:23:11.514015 ignition[1259]: ERROR    : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem508335884", trying btrfs: device or resource busy
Dec 13 02:23:11.514015 ignition[1259]: INFO     : op(b): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem508335884"
Dec 13 02:23:11.514015 ignition[1259]: INFO     : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem508335884"
Dec 13 02:23:11.514015 ignition[1259]: INFO     : op(c): [started]  unmounting "/mnt/oem508335884"
Dec 13 02:23:11.514015 ignition[1259]: INFO     : op(c): [finished] unmounting "/mnt/oem508335884"
Dec 13 02:23:11.514015 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service"
Dec 13 02:23:11.514015 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(e): [started]  writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw"
Dec 13 02:23:11.514015 ignition[1259]: INFO     : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1
Dec 13 02:23:11.977993 ignition[1259]: INFO     : GET result: OK
Dec 13 02:23:12.502013 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw"
Dec 13 02:23:12.502013 ignition[1259]: INFO     : files: op(f): [started]  processing unit "coreos-metadata-sshkeys@.service"
Dec 13 02:23:12.502013 ignition[1259]: INFO     : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service"
Dec 13 02:23:12.509951 ignition[1259]: INFO     : files: op(10): [started]  processing unit "amazon-ssm-agent.service"
Dec 13 02:23:12.509951 ignition[1259]: INFO     : files: op(10): op(11): [started]  writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service"
Dec 13 02:23:12.509951 ignition[1259]: INFO     : files: op(10): op(11): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service"
Dec 13 02:23:12.509951 ignition[1259]: INFO     : files: op(10): [finished] processing unit "amazon-ssm-agent.service"
Dec 13 02:23:12.509951 ignition[1259]: INFO     : files: op(12): [started]  processing unit "nvidia.service"
Dec 13 02:23:12.509951 ignition[1259]: INFO     : files: op(12): [finished] processing unit "nvidia.service"
Dec 13 02:23:12.509951 ignition[1259]: INFO     : files: op(13): [started]  processing unit "prepare-helm.service"
Dec 13 02:23:12.509951 ignition[1259]: INFO     : files: op(13): op(14): [started]  writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service"
Dec 13 02:23:12.509951 ignition[1259]: INFO     : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service"
Dec 13 02:23:12.509951 ignition[1259]: INFO     : files: op(13): [finished] processing unit "prepare-helm.service"
Dec 13 02:23:12.509951 ignition[1259]: INFO     : files: op(15): [started]  setting preset to enabled for "coreos-metadata-sshkeys@.service "
Dec 13 02:23:12.509951 ignition[1259]: INFO     : files: op(15): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service "
Dec 13 02:23:12.509951 ignition[1259]: INFO     : files: op(16): [started]  setting preset to enabled for "amazon-ssm-agent.service"
Dec 13 02:23:12.509951 ignition[1259]: INFO     : files: op(16): [finished] setting preset to enabled for "amazon-ssm-agent.service"
Dec 13 02:23:12.509951 ignition[1259]: INFO     : files: op(17): [started]  setting preset to enabled for "nvidia.service"
Dec 13 02:23:12.509951 ignition[1259]: INFO     : files: op(17): [finished] setting preset to enabled for "nvidia.service"
Dec 13 02:23:12.509951 ignition[1259]: INFO     : files: op(18): [started]  setting preset to enabled for "prepare-helm.service"
Dec 13 02:23:12.509951 ignition[1259]: INFO     : files: op(18): [finished] setting preset to enabled for "prepare-helm.service"
Dec 13 02:23:12.606218 kernel: audit: type=1130 audit(1734056592.569:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.606292 ignition[1259]: INFO     : files: createResultFile: createFiles: op(19): [started]  writing file "/sysroot/etc/.ignition-result.json"
Dec 13 02:23:12.606292 ignition[1259]: INFO     : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json"
Dec 13 02:23:12.606292 ignition[1259]: INFO     : files: files passed
Dec 13 02:23:12.606292 ignition[1259]: INFO     : Ignition finished successfully
Dec 13 02:23:12.558799 systemd[1]: Finished ignition-files.service.
Dec 13 02:23:12.616769 systemd[1]: Starting initrd-setup-root-after-ignition.service...
Dec 13 02:23:12.625998 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile).
Dec 13 02:23:12.628548 systemd[1]: Starting ignition-quench.service...
Dec 13 02:23:12.639134 systemd[1]: ignition-quench.service: Deactivated successfully.
Dec 13 02:23:12.652140 kernel: audit: type=1130 audit(1734056592.640:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.652189 kernel: audit: type=1131 audit(1734056592.640:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.639313 systemd[1]: Finished ignition-quench.service.
Dec 13 02:23:12.658762 initrd-setup-root-after-ignition[1284]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory
Dec 13 02:23:12.646899 systemd[1]: Finished initrd-setup-root-after-ignition.service.
Dec 13 02:23:12.648347 systemd[1]: Reached target ignition-complete.target.
Dec 13 02:23:12.671225 systemd[1]: Starting initrd-parse-etc.service...
Dec 13 02:23:12.702432 systemd[1]: initrd-parse-etc.service: Deactivated successfully.
Dec 13 02:23:12.702561 systemd[1]: Finished initrd-parse-etc.service.
Dec 13 02:23:12.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.707798 systemd[1]: Reached target initrd-fs.target.
Dec 13 02:23:12.709960 systemd[1]: Reached target initrd.target.
Dec 13 02:23:12.712131 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met.
Dec 13 02:23:12.717172 systemd[1]: Starting dracut-pre-pivot.service...
Dec 13 02:23:12.743801 systemd[1]: Finished dracut-pre-pivot.service.
Dec 13 02:23:12.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.747794 systemd[1]: Starting initrd-cleanup.service...
Dec 13 02:23:12.769985 systemd[1]: Stopped target nss-lookup.target.
Dec 13 02:23:12.771956 systemd[1]: Stopped target remote-cryptsetup.target.
Dec 13 02:23:12.774819 systemd[1]: Stopped target timers.target.
Dec 13 02:23:12.775048 systemd[1]: dracut-pre-pivot.service: Deactivated successfully.
Dec 13 02:23:12.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.775197 systemd[1]: Stopped dracut-pre-pivot.service.
Dec 13 02:23:12.782988 systemd[1]: Stopped target initrd.target.
Dec 13 02:23:12.788750 systemd[1]: Stopped target basic.target.
Dec 13 02:23:12.790428 systemd[1]: Stopped target ignition-complete.target.
Dec 13 02:23:12.792274 systemd[1]: Stopped target ignition-diskful.target.
Dec 13 02:23:12.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.793560 systemd[1]: Stopped target initrd-root-device.target.
Dec 13 02:23:12.795971 systemd[1]: Stopped target remote-fs.target.
Dec 13 02:23:12.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.856308 ignition[1297]: INFO     : Ignition 2.14.0
Dec 13 02:23:12.856308 ignition[1297]: INFO     : Stage: umount
Dec 13 02:23:12.856308 ignition[1297]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Dec 13 02:23:12.856308 ignition[1297]: DEBUG    : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Dec 13 02:23:12.796302 systemd[1]: Stopped target remote-fs-pre.target.
Dec 13 02:23:12.796516 systemd[1]: Stopped target sysinit.target.
Dec 13 02:23:12.796715 systemd[1]: Stopped target local-fs.target.
Dec 13 02:23:12.797232 systemd[1]: Stopped target local-fs-pre.target.
Dec 13 02:23:12.797415 systemd[1]: Stopped target swap.target.
Dec 13 02:23:12.797575 systemd[1]: dracut-pre-mount.service: Deactivated successfully.
Dec 13 02:23:12.797777 systemd[1]: Stopped dracut-pre-mount.service.
Dec 13 02:23:12.799124 systemd[1]: Stopped target cryptsetup.target.
Dec 13 02:23:12.799812 systemd[1]: dracut-initqueue.service: Deactivated successfully.
Dec 13 02:23:12.800012 systemd[1]: Stopped dracut-initqueue.service.
Dec 13 02:23:12.800791 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully.
Dec 13 02:23:12.801766 systemd[1]: Stopped initrd-setup-root-after-ignition.service.
Dec 13 02:23:12.802964 systemd[1]: ignition-files.service: Deactivated successfully.
Dec 13 02:23:12.803097 systemd[1]: Stopped ignition-files.service.
Dec 13 02:23:12.805206 systemd[1]: Stopping ignition-mount.service...
Dec 13 02:23:12.805821 systemd[1]: Stopping iscsiuio.service...
Dec 13 02:23:12.807481 systemd[1]: Stopping sysroot-boot.service...
Dec 13 02:23:12.807594 systemd[1]: systemd-udev-trigger.service: Deactivated successfully.
Dec 13 02:23:12.807786 systemd[1]: Stopped systemd-udev-trigger.service.
Dec 13 02:23:12.808636 systemd[1]: dracut-pre-trigger.service: Deactivated successfully.
Dec 13 02:23:12.808803 systemd[1]: Stopped dracut-pre-trigger.service.
Dec 13 02:23:12.813306 systemd[1]: initrd-cleanup.service: Deactivated successfully.
Dec 13 02:23:12.818990 systemd[1]: Finished initrd-cleanup.service.
Dec 13 02:23:12.852609 systemd[1]: iscsiuio.service: Deactivated successfully.
Dec 13 02:23:12.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.904665 ignition[1297]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/aws"
Dec 13 02:23:12.904665 ignition[1297]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Dec 13 02:23:12.904665 ignition[1297]: INFO     : PUT result: OK
Dec 13 02:23:12.852746 systemd[1]: Stopped iscsiuio.service.
Dec 13 02:23:12.876560 systemd[1]: sysroot-boot.mount: Deactivated successfully.
Dec 13 02:23:12.894317 systemd[1]: sysroot-boot.service: Deactivated successfully.
Dec 13 02:23:12.894446 systemd[1]: Stopped sysroot-boot.service.
Dec 13 02:23:12.914153 ignition[1297]: INFO     : umount: umount passed
Dec 13 02:23:12.915018 ignition[1297]: INFO     : Ignition finished successfully
Dec 13 02:23:12.916242 systemd[1]: ignition-mount.service: Deactivated successfully.
Dec 13 02:23:12.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.916500 systemd[1]: Stopped ignition-mount.service.
Dec 13 02:23:12.921932 systemd[1]: ignition-disks.service: Deactivated successfully.
Dec 13 02:23:12.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.922012 systemd[1]: Stopped ignition-disks.service.
Dec 13 02:23:12.926151 systemd[1]: ignition-kargs.service: Deactivated successfully.
Dec 13 02:23:12.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.926233 systemd[1]: Stopped ignition-kargs.service.
Dec 13 02:23:12.928060 systemd[1]: ignition-fetch.service: Deactivated successfully.
Dec 13 02:23:12.928119 systemd[1]: Stopped ignition-fetch.service.
Dec 13 02:23:12.931022 systemd[1]: Stopped target network.target.
Dec 13 02:23:12.939712 systemd[1]: ignition-fetch-offline.service: Deactivated successfully.
Dec 13 02:23:12.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:12.940613 systemd[1]: Stopped ignition-fetch-offline.service.
Dec 13 02:23:12.954445 systemd[1]: Stopped target paths.target.
Dec 13 02:23:12.969087 systemd[1]: systemd-ask-password-console.path: Deactivated successfully.
Dec 13 02:23:12.978054 systemd[1]: Stopped systemd-ask-password-console.path.
Dec 13 02:23:12.993934 systemd[1]: Stopped target slices.target.
Dec 13 02:23:13.010942 systemd[1]: Stopped target sockets.target.
Dec 13 02:23:13.011143 systemd[1]: iscsid.socket: Deactivated successfully.
Dec 13 02:23:13.011185 systemd[1]: Closed iscsid.socket.
Dec 13 02:23:13.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:13.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:13.026939 systemd[1]: iscsiuio.socket: Deactivated successfully.
Dec 13 02:23:13.027002 systemd[1]: Closed iscsiuio.socket.
Dec 13 02:23:13.034991 systemd[1]: ignition-setup.service: Deactivated successfully.
Dec 13 02:23:13.035074 systemd[1]: Stopped ignition-setup.service.
Dec 13 02:23:13.038091 systemd[1]: initrd-setup-root.service: Deactivated successfully.
Dec 13 02:23:13.038148 systemd[1]: Stopped initrd-setup-root.service.
Dec 13 02:23:13.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:13.041033 systemd[1]: Stopping systemd-networkd.service...
Dec 13 02:23:13.044167 systemd[1]: Stopping systemd-resolved.service...
Dec 13 02:23:13.048985 systemd-networkd[1104]: eth0: DHCPv6 lease lost
Dec 13 02:23:13.053328 systemd[1]: systemd-resolved.service: Deactivated successfully.
Dec 13 02:23:13.053442 systemd[1]: Stopped systemd-resolved.service.
Dec 13 02:23:13.058484 systemd[1]: systemd-networkd.service: Deactivated successfully.
Dec 13 02:23:13.058632 systemd[1]: Stopped systemd-networkd.service.
Dec 13 02:23:13.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:13.078040 systemd[1]: systemd-networkd.socket: Deactivated successfully.
Dec 13 02:23:13.086000 audit: BPF prog-id=9 op=UNLOAD
Dec 13 02:23:13.086000 audit: BPF prog-id=6 op=UNLOAD
Dec 13 02:23:13.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:13.078083 systemd[1]: Closed systemd-networkd.socket.
Dec 13 02:23:13.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:13.081325 systemd[1]: Stopping network-cleanup.service...
Dec 13 02:23:13.086880 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully.
Dec 13 02:23:13.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:13.087036 systemd[1]: Stopped parse-ip-for-networkd.service.
Dec 13 02:23:13.100717 systemd[1]: systemd-sysctl.service: Deactivated successfully.
Dec 13 02:23:13.100800 systemd[1]: Stopped systemd-sysctl.service.
Dec 13 02:23:13.111244 systemd[1]: systemd-modules-load.service: Deactivated successfully.
Dec 13 02:23:13.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:13.112283 systemd[1]: Stopped systemd-modules-load.service.
Dec 13 02:23:13.116360 systemd[1]: Stopping systemd-udevd.service...
Dec 13 02:23:13.139275 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully.
Dec 13 02:23:13.141045 systemd[1]: systemd-udevd.service: Deactivated successfully.
Dec 13 02:23:13.145339 systemd[1]: Stopped systemd-udevd.service.
Dec 13 02:23:13.159927 systemd[1]: systemd-udevd-control.socket: Deactivated successfully.
Dec 13 02:23:13.159999 systemd[1]: Closed systemd-udevd-control.socket.
Dec 13 02:23:13.162628 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully.
Dec 13 02:23:13.163422 systemd[1]: Closed systemd-udevd-kernel.socket.
Dec 13 02:23:13.171447 systemd[1]: dracut-pre-udev.service: Deactivated successfully.
Dec 13 02:23:13.171519 systemd[1]: Stopped dracut-pre-udev.service.
Dec 13 02:23:13.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:13.174431 systemd[1]: dracut-cmdline.service: Deactivated successfully.
Dec 13 02:23:13.174493 systemd[1]: Stopped dracut-cmdline.service.
Dec 13 02:23:13.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:13.178979 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully.
Dec 13 02:23:13.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:13.179040 systemd[1]: Stopped dracut-cmdline-ask.service.
Dec 13 02:23:13.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:13.184185 systemd[1]: Starting initrd-udevadm-cleanup-db.service...
Dec 13 02:23:13.185223 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully.
Dec 13 02:23:13.185314 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service.
Dec 13 02:23:13.189354 systemd[1]: kmod-static-nodes.service: Deactivated successfully.
Dec 13 02:23:13.189431 systemd[1]: Stopped kmod-static-nodes.service.
Dec 13 02:23:13.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:13.195834 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully.
Dec 13 02:23:13.195930 systemd[1]: Stopped systemd-vconsole-setup.service.
Dec 13 02:23:13.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:13.199717 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully.
Dec 13 02:23:13.200691 systemd[1]: network-cleanup.service: Deactivated successfully.
Dec 13 02:23:13.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:13.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:13.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:13.200825 systemd[1]: Stopped network-cleanup.service.
Dec 13 02:23:13.202897 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully.
Dec 13 02:23:13.203022 systemd[1]: Finished initrd-udevadm-cleanup-db.service.
Dec 13 02:23:13.206544 systemd[1]: Reached target initrd-switch-root.target.
Dec 13 02:23:13.209397 systemd[1]: Starting initrd-switch-root.service...
Dec 13 02:23:13.226164 systemd[1]: Switching root.
Dec 13 02:23:13.255020 iscsid[1109]: iscsid shutting down.
Dec 13 02:23:13.258247 systemd-journald[185]: Received SIGTERM from PID 1 (systemd).
Dec 13 02:23:13.258337 systemd-journald[185]: Journal stopped
Dec 13 02:23:18.846648 kernel: SELinux:  Class mctp_socket not defined in policy.
Dec 13 02:23:18.847001 kernel: SELinux:  Class anon_inode not defined in policy.
Dec 13 02:23:18.847227 kernel: SELinux: the above unknown classes and permissions will be allowed
Dec 13 02:23:18.847364 kernel: SELinux:  policy capability network_peer_controls=1
Dec 13 02:23:18.847386 kernel: SELinux:  policy capability open_perms=1
Dec 13 02:23:18.847405 kernel: SELinux:  policy capability extended_socket_class=1
Dec 13 02:23:18.847617 kernel: SELinux:  policy capability always_check_network=0
Dec 13 02:23:18.847643 kernel: SELinux:  policy capability cgroup_seclabel=1
Dec 13 02:23:18.847660 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Dec 13 02:23:18.847677 kernel: SELinux:  policy capability genfs_seclabel_symlinks=0
Dec 13 02:23:18.847694 kernel: SELinux:  policy capability ioctl_skip_cloexec=0
Dec 13 02:23:18.847714 systemd[1]: Successfully loaded SELinux policy in 60.711ms.
Dec 13 02:23:18.847752 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 12.482ms.
Dec 13 02:23:18.847772 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Dec 13 02:23:18.847796 systemd[1]: Detected virtualization amazon.
Dec 13 02:23:18.848267 systemd[1]: Detected architecture x86-64.
Dec 13 02:23:18.848292 systemd[1]: Detected first boot.
Dec 13 02:23:18.848318 systemd[1]: Initializing machine ID from VM UUID.
Dec 13 02:23:18.848337 kernel: SELinux:  Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped).
Dec 13 02:23:18.848355 systemd[1]: Populated /etc with preset unit settings.
Dec 13 02:23:18.848375 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Dec 13 02:23:18.848395 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Dec 13 02:23:18.848418 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Dec 13 02:23:18.848438 kernel: kauditd_printk_skb: 55 callbacks suppressed
Dec 13 02:23:18.848454 kernel: audit: type=1334 audit(1734056598.451:88): prog-id=12 op=LOAD
Dec 13 02:23:18.848471 kernel: audit: type=1334 audit(1734056598.451:89): prog-id=3 op=UNLOAD
Dec 13 02:23:18.848488 kernel: audit: type=1334 audit(1734056598.456:90): prog-id=13 op=LOAD
Dec 13 02:23:18.848504 kernel: audit: type=1334 audit(1734056598.457:91): prog-id=14 op=LOAD
Dec 13 02:23:18.848525 kernel: audit: type=1334 audit(1734056598.457:92): prog-id=4 op=UNLOAD
Dec 13 02:23:18.848542 kernel: audit: type=1334 audit(1734056598.457:93): prog-id=5 op=UNLOAD
Dec 13 02:23:18.848561 kernel: audit: type=1131 audit(1734056598.466:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.848580 systemd[1]: iscsid.service: Deactivated successfully.
Dec 13 02:23:18.848599 systemd[1]: Stopped iscsid.service.
Dec 13 02:23:18.848617 kernel: audit: type=1334 audit(1734056598.484:95): prog-id=12 op=UNLOAD
Dec 13 02:23:18.848634 systemd[1]: initrd-switch-root.service: Deactivated successfully.
Dec 13 02:23:18.848653 kernel: audit: type=1131 audit(1734056598.484:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.848673 systemd[1]: Stopped initrd-switch-root.service.
Dec 13 02:23:18.848691 kernel: audit: type=1130 audit(1734056598.495:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.848708 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1.
Dec 13 02:23:18.848726 systemd[1]: Created slice system-addon\x2dconfig.slice.
Dec 13 02:23:18.848751 systemd[1]: Created slice system-addon\x2drun.slice.
Dec 13 02:23:18.848770 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice.
Dec 13 02:23:18.848788 systemd[1]: Created slice system-getty.slice.
Dec 13 02:23:18.848809 systemd[1]: Created slice system-modprobe.slice.
Dec 13 02:23:18.848828 systemd[1]: Created slice system-serial\x2dgetty.slice.
Dec 13 02:23:18.848846 systemd[1]: Created slice system-system\x2dcloudinit.slice.
Dec 13 02:23:18.848865 systemd[1]: Created slice system-systemd\x2dfsck.slice.
Dec 13 02:23:18.848882 systemd[1]: Created slice user.slice.
Dec 13 02:23:18.849851 systemd[1]: Started systemd-ask-password-console.path.
Dec 13 02:23:18.849881 systemd[1]: Started systemd-ask-password-wall.path.
Dec 13 02:23:18.849901 systemd[1]: Set up automount boot.automount.
Dec 13 02:23:18.849928 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount.
Dec 13 02:23:18.849951 systemd[1]: Stopped target initrd-switch-root.target.
Dec 13 02:23:18.849968 systemd[1]: Stopped target initrd-fs.target.
Dec 13 02:23:18.849991 systemd[1]: Stopped target initrd-root-fs.target.
Dec 13 02:23:18.850007 systemd[1]: Reached target integritysetup.target.
Dec 13 02:23:18.850023 systemd[1]: Reached target remote-cryptsetup.target.
Dec 13 02:23:18.850040 systemd[1]: Reached target remote-fs.target.
Dec 13 02:23:18.850057 systemd[1]: Reached target slices.target.
Dec 13 02:23:18.850074 systemd[1]: Reached target swap.target.
Dec 13 02:23:18.850089 systemd[1]: Reached target torcx.target.
Dec 13 02:23:18.850106 systemd[1]: Reached target veritysetup.target.
Dec 13 02:23:18.850128 systemd[1]: Listening on systemd-coredump.socket.
Dec 13 02:23:18.850147 systemd[1]: Listening on systemd-initctl.socket.
Dec 13 02:23:18.854259 systemd[1]: Listening on systemd-networkd.socket.
Dec 13 02:23:18.854310 systemd[1]: Listening on systemd-udevd-control.socket.
Dec 13 02:23:18.854330 systemd[1]: Listening on systemd-udevd-kernel.socket.
Dec 13 02:23:18.854349 systemd[1]: Listening on systemd-userdbd.socket.
Dec 13 02:23:18.854367 systemd[1]: Mounting dev-hugepages.mount...
Dec 13 02:23:18.855017 systemd[1]: Mounting dev-mqueue.mount...
Dec 13 02:23:18.855061 systemd[1]: Mounting media.mount...
Dec 13 02:23:18.855091 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Dec 13 02:23:18.855112 systemd[1]: Mounting sys-kernel-debug.mount...
Dec 13 02:23:18.855132 systemd[1]: Mounting sys-kernel-tracing.mount...
Dec 13 02:23:18.855150 systemd[1]: Mounting tmp.mount...
Dec 13 02:23:18.855168 systemd[1]: Starting flatcar-tmpfiles.service...
Dec 13 02:23:18.855187 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Dec 13 02:23:18.855210 systemd[1]: Starting kmod-static-nodes.service...
Dec 13 02:23:18.855235 systemd[1]: Starting modprobe@configfs.service...
Dec 13 02:23:18.855255 systemd[1]: Starting modprobe@dm_mod.service...
Dec 13 02:23:18.855281 systemd[1]: Starting modprobe@drm.service...
Dec 13 02:23:18.855301 systemd[1]: Starting modprobe@efi_pstore.service...
Dec 13 02:23:18.855324 systemd[1]: Starting modprobe@fuse.service...
Dec 13 02:23:18.855342 systemd[1]: Starting modprobe@loop.service...
Dec 13 02:23:18.855362 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf).
Dec 13 02:23:18.855389 systemd[1]: systemd-fsck-root.service: Deactivated successfully.
Dec 13 02:23:18.855410 systemd[1]: Stopped systemd-fsck-root.service.
Dec 13 02:23:18.855429 systemd[1]: systemd-fsck-usr.service: Deactivated successfully.
Dec 13 02:23:18.855447 systemd[1]: Stopped systemd-fsck-usr.service.
Dec 13 02:23:18.855465 systemd[1]: Stopped systemd-journald.service.
Dec 13 02:23:18.855483 systemd[1]: Starting systemd-journald.service...
Dec 13 02:23:18.855500 systemd[1]: Starting systemd-modules-load.service...
Dec 13 02:23:18.855520 systemd[1]: Starting systemd-network-generator.service...
Dec 13 02:23:18.855538 systemd[1]: Starting systemd-remount-fs.service...
Dec 13 02:23:18.855559 systemd[1]: Starting systemd-udev-trigger.service...
Dec 13 02:23:18.855577 systemd[1]: verity-setup.service: Deactivated successfully.
Dec 13 02:23:18.855596 systemd[1]: Stopped verity-setup.service.
Dec 13 02:23:18.855614 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Dec 13 02:23:18.855632 systemd[1]: Mounted dev-hugepages.mount.
Dec 13 02:23:18.855651 systemd[1]: Mounted dev-mqueue.mount.
Dec 13 02:23:18.855668 systemd[1]: Mounted media.mount.
Dec 13 02:23:18.855686 systemd[1]: Mounted sys-kernel-debug.mount.
Dec 13 02:23:18.855704 systemd[1]: Mounted sys-kernel-tracing.mount.
Dec 13 02:23:18.855725 systemd[1]: Mounted tmp.mount.
Dec 13 02:23:18.855743 systemd[1]: Finished kmod-static-nodes.service.
Dec 13 02:23:18.855762 systemd[1]: modprobe@configfs.service: Deactivated successfully.
Dec 13 02:23:18.855781 systemd[1]: Finished modprobe@configfs.service.
Dec 13 02:23:18.855799 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Dec 13 02:23:18.855816 systemd[1]: Finished modprobe@dm_mod.service.
Dec 13 02:23:18.855833 systemd[1]: modprobe@drm.service: Deactivated successfully.
Dec 13 02:23:18.855851 systemd[1]: Finished modprobe@drm.service.
Dec 13 02:23:18.855873 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Dec 13 02:23:18.855892 systemd[1]: Finished modprobe@efi_pstore.service.
Dec 13 02:23:18.855922 systemd[1]: Finished systemd-modules-load.service.
Dec 13 02:23:18.855940 systemd[1]: Finished systemd-network-generator.service.
Dec 13 02:23:18.855988 kernel: loop: module loaded
Dec 13 02:23:18.856007 systemd[1]: Finished systemd-remount-fs.service.
Dec 13 02:23:18.856027 systemd[1]: Reached target network-pre.target.
Dec 13 02:23:18.856052 systemd-journald[1409]: Journal started
Dec 13 02:23:18.856129 systemd-journald[1409]: Runtime Journal (/run/log/journal/ec215d90af3867fb0135584187278b5b) is 4.8M, max 38.7M, 33.9M free.
Dec 13 02:23:13.603000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1
Dec 13 02:23:13.729000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Dec 13 02:23:13.729000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Dec 13 02:23:13.729000 audit: BPF prog-id=10 op=LOAD
Dec 13 02:23:13.729000 audit: BPF prog-id=10 op=UNLOAD
Dec 13 02:23:13.729000 audit: BPF prog-id=11 op=LOAD
Dec 13 02:23:13.729000 audit: BPF prog-id=11 op=UNLOAD
Dec 13 02:23:13.984000 audit[1330]: AVC avc:  denied  { associate } for  pid=1330 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023"
Dec 13 02:23:13.984000 audit[1330]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=1313 pid=1330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:13.984000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Dec 13 02:23:13.986000 audit[1330]: AVC avc:  denied  { associate } for  pid=1330 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1
Dec 13 02:23:13.986000 audit[1330]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=1313 pid=1330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:13.986000 audit: CWD cwd="/"
Dec 13 02:23:13.986000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:13.986000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:13.986000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Dec 13 02:23:18.451000 audit: BPF prog-id=12 op=LOAD
Dec 13 02:23:18.451000 audit: BPF prog-id=3 op=UNLOAD
Dec 13 02:23:18.456000 audit: BPF prog-id=13 op=LOAD
Dec 13 02:23:18.457000 audit: BPF prog-id=14 op=LOAD
Dec 13 02:23:18.457000 audit: BPF prog-id=4 op=UNLOAD
Dec 13 02:23:18.457000 audit: BPF prog-id=5 op=UNLOAD
Dec 13 02:23:18.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.484000 audit: BPF prog-id=12 op=UNLOAD
Dec 13 02:23:18.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.685000 audit: BPF prog-id=15 op=LOAD
Dec 13 02:23:18.685000 audit: BPF prog-id=16 op=LOAD
Dec 13 02:23:18.685000 audit: BPF prog-id=17 op=LOAD
Dec 13 02:23:18.685000 audit: BPF prog-id=13 op=UNLOAD
Dec 13 02:23:18.685000 audit: BPF prog-id=14 op=UNLOAD
Dec 13 02:23:18.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.831000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1
Dec 13 02:23:18.831000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffcdec668d0 a2=4000 a3=7ffcdec6696c items=0 ppid=1 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:18.831000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald"
Dec 13 02:23:18.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:13.977597 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]"
Dec 13 02:23:18.436602 systemd[1]: Queued start job for default target multi-user.target.
Dec 13 02:23:13.980083 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:13Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Dec 13 02:23:18.462784 systemd[1]: systemd-journald.service: Deactivated successfully.
Dec 13 02:23:13.980114 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:13Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Dec 13 02:23:13.980224 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:13Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12"
Dec 13 02:23:13.980240 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:13Z" level=debug msg="skipped missing lower profile" missing profile=oem
Dec 13 02:23:13.980329 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:13Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory"
Dec 13 02:23:18.860948 systemd[1]: Mounting sys-kernel-config.mount...
Dec 13 02:23:13.980351 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:13Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)=
Dec 13 02:23:13.980820 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:13Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack
Dec 13 02:23:13.980885 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:13Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Dec 13 02:23:13.981053 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:13Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Dec 13 02:23:13.983032 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:13Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10
Dec 13 02:23:13.983090 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:13Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl
Dec 13 02:23:13.983120 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:13Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6
Dec 13 02:23:13.983144 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:13Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store
Dec 13 02:23:13.983172 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:13Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6
Dec 13 02:23:13.983194 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:13Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store
Dec 13 02:23:17.556954 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:17Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Dec 13 02:23:17.557534 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:17Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Dec 13 02:23:17.557940 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:17Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Dec 13 02:23:17.558177 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:17Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Dec 13 02:23:17.558235 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:17Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile=
Dec 13 02:23:17.558347 /usr/lib/systemd/system-generators/torcx-generator[1330]: time="2024-12-13T02:23:17Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx
Dec 13 02:23:18.870130 kernel: fuse: init (API version 7.34)
Dec 13 02:23:18.870203 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/).
Dec 13 02:23:18.880002 systemd[1]: Starting systemd-hwdb-update.service...
Dec 13 02:23:18.880088 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Dec 13 02:23:18.883198 systemd[1]: Starting systemd-random-seed.service...
Dec 13 02:23:18.893141 systemd[1]: Starting systemd-sysctl.service...
Dec 13 02:23:18.893217 systemd[1]: Started systemd-journald.service.
Dec 13 02:23:18.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.896568 systemd[1]: modprobe@fuse.service: Deactivated successfully.
Dec 13 02:23:18.897372 systemd[1]: Finished modprobe@fuse.service.
Dec 13 02:23:18.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.898877 systemd[1]: modprobe@loop.service: Deactivated successfully.
Dec 13 02:23:18.902159 systemd[1]: Finished modprobe@loop.service.
Dec 13 02:23:18.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.903817 systemd[1]: Mounted sys-kernel-config.mount.
Dec 13 02:23:18.907623 systemd[1]: Mounting sys-fs-fuse-connections.mount...
Dec 13 02:23:18.914097 systemd[1]: Starting systemd-journal-flush.service...
Dec 13 02:23:18.915192 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Dec 13 02:23:18.916752 systemd[1]: Finished systemd-random-seed.service.
Dec 13 02:23:18.918085 systemd[1]: Mounted sys-fs-fuse-connections.mount.
Dec 13 02:23:18.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.919571 systemd[1]: Reached target first-boot-complete.target.
Dec 13 02:23:18.946707 systemd[1]: Finished systemd-sysctl.service.
Dec 13 02:23:18.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:18.950172 systemd-journald[1409]: Time spent on flushing to /var/log/journal/ec215d90af3867fb0135584187278b5b is 111.974ms for 1192 entries.
Dec 13 02:23:18.950172 systemd-journald[1409]: System Journal (/var/log/journal/ec215d90af3867fb0135584187278b5b) is 8.0M, max 195.6M, 187.6M free.
Dec 13 02:23:19.070622 systemd-journald[1409]: Received client request to flush runtime journal.
Dec 13 02:23:19.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:19.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:19.031453 systemd[1]: Finished flatcar-tmpfiles.service.
Dec 13 02:23:19.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:19.040731 systemd[1]: Starting systemd-sysusers.service...
Dec 13 02:23:19.054368 systemd[1]: Finished systemd-udev-trigger.service.
Dec 13 02:23:19.057810 systemd[1]: Starting systemd-udev-settle.service...
Dec 13 02:23:19.073063 systemd[1]: Finished systemd-journal-flush.service.
Dec 13 02:23:19.079421 udevadm[1446]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in.
Dec 13 02:23:19.119940 systemd[1]: Finished systemd-sysusers.service.
Dec 13 02:23:19.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:19.122713 systemd[1]: Starting systemd-tmpfiles-setup-dev.service...
Dec 13 02:23:19.236227 systemd[1]: Finished systemd-tmpfiles-setup-dev.service.
Dec 13 02:23:19.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:19.948607 systemd[1]: Finished systemd-hwdb-update.service.
Dec 13 02:23:19.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:19.949000 audit: BPF prog-id=18 op=LOAD
Dec 13 02:23:19.949000 audit: BPF prog-id=19 op=LOAD
Dec 13 02:23:19.949000 audit: BPF prog-id=7 op=UNLOAD
Dec 13 02:23:19.949000 audit: BPF prog-id=8 op=UNLOAD
Dec 13 02:23:19.951367 systemd[1]: Starting systemd-udevd.service...
Dec 13 02:23:19.973625 systemd-udevd[1450]: Using default interface naming scheme 'v252'.
Dec 13 02:23:20.065457 systemd[1]: Started systemd-udevd.service.
Dec 13 02:23:20.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:20.066000 audit: BPF prog-id=20 op=LOAD
Dec 13 02:23:20.068429 systemd[1]: Starting systemd-networkd.service...
Dec 13 02:23:20.098000 audit: BPF prog-id=21 op=LOAD
Dec 13 02:23:20.098000 audit: BPF prog-id=22 op=LOAD
Dec 13 02:23:20.098000 audit: BPF prog-id=23 op=LOAD
Dec 13 02:23:20.100022 systemd[1]: Starting systemd-userdbd.service...
Dec 13 02:23:20.174455 (udev-worker)[1451]: Network interface NamePolicy= disabled on kernel command line.
Dec 13 02:23:20.191810 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped.
Dec 13 02:23:20.200396 systemd[1]: Started systemd-userdbd.service.
Dec 13 02:23:20.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:20.419441 systemd-networkd[1457]: lo: Link UP
Dec 13 02:23:20.419456 systemd-networkd[1457]: lo: Gained carrier
Dec 13 02:23:20.429067 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3
Dec 13 02:23:20.420440 systemd-networkd[1457]: Enumeration completed
Dec 13 02:23:20.423186 systemd[1]: Started systemd-networkd.service.
Dec 13 02:23:20.425375 systemd-networkd[1457]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Dec 13 02:23:20.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:20.432956 systemd[1]: Starting systemd-networkd-wait-online.service...
Dec 13 02:23:20.436146 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Dec 13 02:23:20.436239 systemd-networkd[1457]: eth0: Link UP
Dec 13 02:23:20.436511 systemd-networkd[1457]: eth0: Gained carrier
Dec 13 02:23:20.437000 audit[1458]: AVC avc:  denied  { confidentiality } for  pid=1458 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1
Dec 13 02:23:20.437000 audit[1458]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5586f9c34e50 a1=337fc a2=7fe74b8b5bc5 a3=5 items=110 ppid=1450 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:20.437000 audit: CWD cwd="/"
Dec 13 02:23:20.437000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=1 name=(null) inode=13774 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=2 name=(null) inode=13774 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=3 name=(null) inode=13775 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=4 name=(null) inode=13774 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=5 name=(null) inode=13776 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=6 name=(null) inode=13774 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=7 name=(null) inode=13777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=8 name=(null) inode=13777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=9 name=(null) inode=13778 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=10 name=(null) inode=13777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=11 name=(null) inode=13779 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=12 name=(null) inode=13777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=13 name=(null) inode=13780 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=14 name=(null) inode=13777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=15 name=(null) inode=13781 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=16 name=(null) inode=13777 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=17 name=(null) inode=13782 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=18 name=(null) inode=13774 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=19 name=(null) inode=13783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=20 name=(null) inode=13783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=21 name=(null) inode=13784 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=22 name=(null) inode=13783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=23 name=(null) inode=13785 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=24 name=(null) inode=13783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=25 name=(null) inode=13786 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=26 name=(null) inode=13783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=27 name=(null) inode=13787 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=28 name=(null) inode=13783 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=29 name=(null) inode=13788 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=30 name=(null) inode=13774 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=31 name=(null) inode=13789 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=32 name=(null) inode=13789 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=33 name=(null) inode=13790 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=34 name=(null) inode=13789 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=35 name=(null) inode=13791 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=36 name=(null) inode=13789 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=37 name=(null) inode=13792 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=38 name=(null) inode=13789 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=39 name=(null) inode=13793 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=40 name=(null) inode=13789 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=41 name=(null) inode=13794 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=42 name=(null) inode=13774 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=43 name=(null) inode=13795 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=44 name=(null) inode=13795 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=45 name=(null) inode=13796 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=46 name=(null) inode=13795 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=47 name=(null) inode=13797 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=48 name=(null) inode=13795 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=49 name=(null) inode=13798 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=50 name=(null) inode=13795 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=51 name=(null) inode=13799 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=52 name=(null) inode=13795 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=53 name=(null) inode=13800 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=55 name=(null) inode=13801 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=56 name=(null) inode=13801 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=57 name=(null) inode=13802 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=58 name=(null) inode=13801 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=59 name=(null) inode=13803 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=60 name=(null) inode=13801 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=61 name=(null) inode=13804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=62 name=(null) inode=13804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=63 name=(null) inode=13805 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=64 name=(null) inode=13804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=65 name=(null) inode=13806 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=66 name=(null) inode=13804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=67 name=(null) inode=13807 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=68 name=(null) inode=13804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=69 name=(null) inode=13808 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=70 name=(null) inode=13804 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=71 name=(null) inode=13809 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=72 name=(null) inode=13801 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=73 name=(null) inode=13810 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=74 name=(null) inode=13810 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=75 name=(null) inode=13811 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=76 name=(null) inode=13810 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=77 name=(null) inode=13812 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=78 name=(null) inode=13810 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=79 name=(null) inode=13813 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=80 name=(null) inode=13810 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=81 name=(null) inode=13814 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=82 name=(null) inode=13810 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=83 name=(null) inode=13815 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=84 name=(null) inode=13801 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=85 name=(null) inode=13816 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=86 name=(null) inode=13816 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=87 name=(null) inode=13817 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=88 name=(null) inode=13816 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=89 name=(null) inode=13818 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=90 name=(null) inode=13816 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=91 name=(null) inode=13819 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=92 name=(null) inode=13816 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=93 name=(null) inode=13820 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=94 name=(null) inode=13816 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=95 name=(null) inode=13821 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=96 name=(null) inode=13801 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=97 name=(null) inode=13822 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=98 name=(null) inode=13822 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=99 name=(null) inode=13823 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=100 name=(null) inode=13822 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=101 name=(null) inode=13824 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=102 name=(null) inode=13822 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=103 name=(null) inode=13825 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=104 name=(null) inode=13822 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=105 name=(null) inode=13826 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=106 name=(null) inode=13822 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=107 name=(null) inode=13827 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PATH item=109 name=(null) inode=13828 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:23:20.437000 audit: PROCTITLE proctitle="(udev-worker)"
Dec 13 02:23:20.448270 systemd-networkd[1457]: eth0: DHCPv4 address 172.31.27.10/20, gateway 172.31.16.1 acquired from 172.31.16.1
Dec 13 02:23:20.482018 kernel: ACPI: button: Power Button [PWRF]
Dec 13 02:23:20.482189 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4
Dec 13 02:23:20.486985 kernel: ACPI: button: Sleep Button [SLPF]
Dec 13 02:23:20.487076 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1464)
Dec 13 02:23:20.524877 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input5
Dec 13 02:23:20.571987 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255
Dec 13 02:23:20.622942 kernel: mousedev: PS/2 mouse device common for all mice
Dec 13 02:23:20.676508 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Dec 13 02:23:20.783434 systemd[1]: Finished systemd-udev-settle.service.
Dec 13 02:23:20.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:20.786254 systemd[1]: Starting lvm2-activation-early.service...
Dec 13 02:23:20.847865 lvm[1564]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Dec 13 02:23:20.886328 systemd[1]: Finished lvm2-activation-early.service.
Dec 13 02:23:20.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:20.887494 systemd[1]: Reached target cryptsetup.target.
Dec 13 02:23:20.890214 systemd[1]: Starting lvm2-activation.service...
Dec 13 02:23:20.897682 lvm[1565]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Dec 13 02:23:20.934885 systemd[1]: Finished lvm2-activation.service.
Dec 13 02:23:20.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:20.936258 systemd[1]: Reached target local-fs-pre.target.
Dec 13 02:23:20.937308 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw).
Dec 13 02:23:20.937349 systemd[1]: Reached target local-fs.target.
Dec 13 02:23:20.938304 systemd[1]: Reached target machines.target.
Dec 13 02:23:20.941128 systemd[1]: Starting ldconfig.service...
Dec 13 02:23:20.944455 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Dec 13 02:23:20.944534 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Dec 13 02:23:20.946678 systemd[1]: Starting systemd-boot-update.service...
Dec 13 02:23:20.948839 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service...
Dec 13 02:23:20.956621 systemd[1]: Starting systemd-machine-id-commit.service...
Dec 13 02:23:20.961419 systemd[1]: Starting systemd-sysext.service...
Dec 13 02:23:20.964383 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1567 (bootctl)
Dec 13 02:23:20.968109 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service...
Dec 13 02:23:20.993661 systemd[1]: Unmounting usr-share-oem.mount...
Dec 13 02:23:21.013395 systemd[1]: usr-share-oem.mount: Deactivated successfully.
Dec 13 02:23:21.013612 systemd[1]: Unmounted usr-share-oem.mount.
Dec 13 02:23:21.036986 kernel: loop0: detected capacity change from 0 to 205544
Dec 13 02:23:21.039678 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service.
Dec 13 02:23:21.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:21.238958 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher
Dec 13 02:23:21.267973 systemd-fsck[1578]: fsck.fat 4.2 (2021-01-31)
Dec 13 02:23:21.267973 systemd-fsck[1578]: /dev/nvme0n1p1: 789 files, 119291/258078 clusters
Dec 13 02:23:21.271769 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service.
Dec 13 02:23:21.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:21.277369 systemd[1]: Mounting boot.mount...
Dec 13 02:23:21.284937 kernel: loop1: detected capacity change from 0 to 205544
Dec 13 02:23:21.320519 systemd[1]: Mounted boot.mount.
Dec 13 02:23:21.343805 (sd-sysext)[1582]: Using extensions 'kubernetes'.
Dec 13 02:23:21.345015 (sd-sysext)[1582]: Merged extensions into '/usr'.
Dec 13 02:23:21.362038 systemd[1]: etc-machine\x2did.mount: Deactivated successfully.
Dec 13 02:23:21.362927 systemd[1]: Finished systemd-machine-id-commit.service.
Dec 13 02:23:21.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:21.370614 systemd[1]: Finished systemd-boot-update.service.
Dec 13 02:23:21.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:21.385486 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Dec 13 02:23:21.388739 systemd[1]: Mounting usr-share-oem.mount...
Dec 13 02:23:21.391012 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Dec 13 02:23:21.394481 systemd[1]: Starting modprobe@dm_mod.service...
Dec 13 02:23:21.400757 systemd[1]: Starting modprobe@efi_pstore.service...
Dec 13 02:23:21.406897 systemd[1]: Starting modprobe@loop.service...
Dec 13 02:23:21.410279 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Dec 13 02:23:21.411553 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Dec 13 02:23:21.411728 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Dec 13 02:23:21.421300 systemd[1]: Mounted usr-share-oem.mount.
Dec 13 02:23:21.422838 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Dec 13 02:23:21.423142 systemd[1]: Finished modprobe@dm_mod.service.
Dec 13 02:23:21.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:21.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:21.424674 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Dec 13 02:23:21.424797 systemd[1]: Finished modprobe@efi_pstore.service.
Dec 13 02:23:21.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:21.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:21.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:21.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:21.427079 systemd[1]: modprobe@loop.service: Deactivated successfully.
Dec 13 02:23:21.427204 systemd[1]: Finished modprobe@loop.service.
Dec 13 02:23:21.430723 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Dec 13 02:23:21.432562 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Dec 13 02:23:21.433405 systemd[1]: Finished systemd-sysext.service.
Dec 13 02:23:21.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:21.438460 systemd[1]: Starting ensure-sysext.service...
Dec 13 02:23:21.452799 systemd[1]: Starting systemd-tmpfiles-setup.service...
Dec 13 02:23:21.478804 systemd[1]: Reloading.
Dec 13 02:23:21.499206 systemd-tmpfiles[1600]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring.
Dec 13 02:23:21.506393 systemd-tmpfiles[1600]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring.
Dec 13 02:23:21.510127 systemd-tmpfiles[1600]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring.
Dec 13 02:23:21.605809 /usr/lib/systemd/system-generators/torcx-generator[1619]: time="2024-12-13T02:23:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]"
Dec 13 02:23:21.605851 /usr/lib/systemd/system-generators/torcx-generator[1619]: time="2024-12-13T02:23:21Z" level=info msg="torcx already run"
Dec 13 02:23:21.795659 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Dec 13 02:23:21.796164 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Dec 13 02:23:21.835807 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Dec 13 02:23:21.928000 audit: BPF prog-id=24 op=LOAD
Dec 13 02:23:21.928000 audit: BPF prog-id=25 op=LOAD
Dec 13 02:23:21.928000 audit: BPF prog-id=18 op=UNLOAD
Dec 13 02:23:21.928000 audit: BPF prog-id=19 op=UNLOAD
Dec 13 02:23:21.929000 audit: BPF prog-id=26 op=LOAD
Dec 13 02:23:21.929000 audit: BPF prog-id=15 op=UNLOAD
Dec 13 02:23:21.930000 audit: BPF prog-id=27 op=LOAD
Dec 13 02:23:21.930000 audit: BPF prog-id=28 op=LOAD
Dec 13 02:23:21.930000 audit: BPF prog-id=16 op=UNLOAD
Dec 13 02:23:21.930000 audit: BPF prog-id=17 op=UNLOAD
Dec 13 02:23:21.934000 audit: BPF prog-id=29 op=LOAD
Dec 13 02:23:21.934000 audit: BPF prog-id=21 op=UNLOAD
Dec 13 02:23:21.934000 audit: BPF prog-id=30 op=LOAD
Dec 13 02:23:21.934000 audit: BPF prog-id=31 op=LOAD
Dec 13 02:23:21.934000 audit: BPF prog-id=22 op=UNLOAD
Dec 13 02:23:21.934000 audit: BPF prog-id=23 op=UNLOAD
Dec 13 02:23:21.935000 audit: BPF prog-id=32 op=LOAD
Dec 13 02:23:21.935000 audit: BPF prog-id=20 op=UNLOAD
Dec 13 02:23:21.942310 systemd[1]: Finished systemd-tmpfiles-setup.service.
Dec 13 02:23:21.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:21.953148 systemd[1]: Starting audit-rules.service...
Dec 13 02:23:21.959168 systemd[1]: Starting clean-ca-certificates.service...
Dec 13 02:23:21.964739 systemd[1]: Starting systemd-journal-catalog-update.service...
Dec 13 02:23:21.967000 audit: BPF prog-id=33 op=LOAD
Dec 13 02:23:21.974000 audit: BPF prog-id=34 op=LOAD
Dec 13 02:23:21.972289 systemd[1]: Starting systemd-resolved.service...
Dec 13 02:23:21.976894 systemd[1]: Starting systemd-timesyncd.service...
Dec 13 02:23:21.981582 systemd[1]: Starting systemd-update-utmp.service...
Dec 13 02:23:22.000700 systemd[1]: Finished clean-ca-certificates.service.
Dec 13 02:23:22.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.002242 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Dec 13 02:23:22.010000 audit[1678]: SYSTEM_BOOT pid=1678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.020872 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Dec 13 02:23:22.021338 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Dec 13 02:23:22.029077 systemd[1]: Starting modprobe@dm_mod.service...
Dec 13 02:23:22.032940 systemd[1]: Starting modprobe@efi_pstore.service...
Dec 13 02:23:22.036719 systemd[1]: Starting modprobe@loop.service...
Dec 13 02:23:22.038128 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Dec 13 02:23:22.038426 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Dec 13 02:23:22.039458 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Dec 13 02:23:22.039876 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Dec 13 02:23:22.043377 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Dec 13 02:23:22.045082 systemd[1]: Finished modprobe@dm_mod.service.
Dec 13 02:23:22.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.048274 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Dec 13 02:23:22.048565 systemd[1]: Finished modprobe@efi_pstore.service.
Dec 13 02:23:22.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.051381 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Dec 13 02:23:22.055654 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Dec 13 02:23:22.056194 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Dec 13 02:23:22.061348 systemd[1]: Starting modprobe@dm_mod.service...
Dec 13 02:23:22.066839 systemd[1]: Starting modprobe@efi_pstore.service...
Dec 13 02:23:22.067806 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Dec 13 02:23:22.068063 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Dec 13 02:23:22.068481 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Dec 13 02:23:22.068633 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Dec 13 02:23:22.073109 systemd[1]: Finished systemd-update-utmp.service.
Dec 13 02:23:22.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.075042 systemd[1]: modprobe@loop.service: Deactivated successfully.
Dec 13 02:23:22.075206 systemd[1]: Finished modprobe@loop.service.
Dec 13 02:23:22.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.077985 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Dec 13 02:23:22.078167 systemd[1]: Finished modprobe@dm_mod.service.
Dec 13 02:23:22.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.081408 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Dec 13 02:23:22.092667 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Dec 13 02:23:22.094632 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Dec 13 02:23:22.100235 systemd[1]: Starting modprobe@dm_mod.service...
Dec 13 02:23:22.106814 systemd[1]: Starting modprobe@drm.service...
Dec 13 02:23:22.111344 ldconfig[1566]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start.
Dec 13 02:23:22.111724 systemd[1]: Starting modprobe@loop.service...
Dec 13 02:23:22.113629 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Dec 13 02:23:22.113842 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Dec 13 02:23:22.114136 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Dec 13 02:23:22.114519 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Dec 13 02:23:22.119795 systemd[1]: Finished ensure-sysext.service.
Dec 13 02:23:22.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.124452 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Dec 13 02:23:22.124646 systemd[1]: Finished modprobe@efi_pstore.service.
Dec 13 02:23:22.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.126018 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Dec 13 02:23:22.126684 systemd[1]: Finished ldconfig.service.
Dec 13 02:23:22.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.137745 systemd[1]: modprobe@drm.service: Deactivated successfully.
Dec 13 02:23:22.138126 systemd[1]: Finished modprobe@drm.service.
Dec 13 02:23:22.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.146326 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Dec 13 02:23:22.146503 systemd[1]: Finished modprobe@dm_mod.service.
Dec 13 02:23:22.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.147928 systemd[1]: modprobe@loop.service: Deactivated successfully.
Dec 13 02:23:22.148095 systemd[1]: Finished modprobe@loop.service.
Dec 13 02:23:22.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.149296 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Dec 13 02:23:22.159018 systemd[1]: Finished systemd-journal-catalog-update.service.
Dec 13 02:23:22.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.162327 systemd[1]: Starting systemd-update-done.service...
Dec 13 02:23:22.181687 systemd[1]: Finished systemd-update-done.service.
Dec 13 02:23:22.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.195155 systemd-networkd[1457]: eth0: Gained IPv6LL
Dec 13 02:23:22.199531 systemd[1]: Finished systemd-networkd-wait-online.service.
Dec 13 02:23:22.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:22.219000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1
Dec 13 02:23:22.219000 audit[1702]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd197971a0 a2=420 a3=0 items=0 ppid=1673 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:22.219000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573
Dec 13 02:23:22.220662 augenrules[1702]: No rules
Dec 13 02:23:22.221646 systemd[1]: Finished audit-rules.service.
Dec 13 02:23:22.237803 systemd[1]: Started systemd-timesyncd.service.
Dec 13 02:23:22.239134 systemd[1]: Reached target time-set.target.
Dec 13 02:23:22.245994 systemd-resolved[1676]: Positive Trust Anchors:
Dec 13 02:23:22.246435 systemd-resolved[1676]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Dec 13 02:23:22.246514 systemd-resolved[1676]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Dec 13 02:23:23.340630 systemd-timesyncd[1677]: Contacted time server 199.68.201.235:123 (0.flatcar.pool.ntp.org).
Dec 13 02:23:23.340856 systemd-timesyncd[1677]: Initial clock synchronization to Fri 2024-12-13 02:23:23.340248 UTC.
Dec 13 02:23:23.370602 systemd-resolved[1676]: Defaulting to hostname 'linux'.
Dec 13 02:23:23.372652 systemd[1]: Started systemd-resolved.service.
Dec 13 02:23:23.374226 systemd[1]: Reached target network.target.
Dec 13 02:23:23.376582 systemd[1]: Reached target network-online.target.
Dec 13 02:23:23.377599 systemd[1]: Reached target nss-lookup.target.
Dec 13 02:23:23.378783 systemd[1]: Reached target sysinit.target.
Dec 13 02:23:23.380104 systemd[1]: Started motdgen.path.
Dec 13 02:23:23.381475 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path.
Dec 13 02:23:23.383808 systemd[1]: Started logrotate.timer.
Dec 13 02:23:23.384809 systemd[1]: Started mdadm.timer.
Dec 13 02:23:23.385591 systemd[1]: Started systemd-tmpfiles-clean.timer.
Dec 13 02:23:23.386797 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate).
Dec 13 02:23:23.386846 systemd[1]: Reached target paths.target.
Dec 13 02:23:23.388370 systemd[1]: Reached target timers.target.
Dec 13 02:23:23.392495 systemd[1]: Listening on dbus.socket.
Dec 13 02:23:23.395743 systemd[1]: Starting docker.socket...
Dec 13 02:23:23.400799 systemd[1]: Listening on sshd.socket.
Dec 13 02:23:23.401974 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Dec 13 02:23:23.402655 systemd[1]: Listening on docker.socket.
Dec 13 02:23:23.403774 systemd[1]: Reached target sockets.target.
Dec 13 02:23:23.406021 systemd[1]: Reached target basic.target.
Dec 13 02:23:23.410845 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met.
Dec 13 02:23:23.410886 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met.
Dec 13 02:23:23.413767 systemd[1]: Started amazon-ssm-agent.service.
Dec 13 02:23:23.420297 systemd[1]: Starting containerd.service...
Dec 13 02:23:23.423380 systemd[1]: Starting coreos-metadata-sshkeys@core.service...
Dec 13 02:23:23.426437 systemd[1]: Starting dbus.service...
Dec 13 02:23:23.428693 systemd[1]: Starting enable-oem-cloudinit.service...
Dec 13 02:23:23.436116 systemd[1]: Starting extend-filesystems.service...
Dec 13 02:23:23.437438 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment).
Dec 13 02:23:23.440091 systemd[1]: Starting kubelet.service...
Dec 13 02:23:23.445298 systemd[1]: Starting motdgen.service...
Dec 13 02:23:23.447757 systemd[1]: Started nvidia.service.
Dec 13 02:23:23.450812 systemd[1]: Starting prepare-helm.service...
Dec 13 02:23:23.454002 systemd[1]: Starting ssh-key-proc-cmdline.service...
Dec 13 02:23:23.456803 systemd[1]: Starting sshd-keygen.service...
Dec 13 02:23:23.463399 systemd[1]: Starting systemd-logind.service...
Dec 13 02:23:23.464540 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Dec 13 02:23:23.464623 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0).
Dec 13 02:23:23.466023 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details.
Dec 13 02:23:23.468425 systemd[1]: Starting update-engine.service...
Dec 13 02:23:23.513809 jq[1714]: false
Dec 13 02:23:23.474050 systemd[1]: Starting update-ssh-keys-after-ignition.service...
Dec 13 02:23:23.512939 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'.
Dec 13 02:23:23.513202 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped.
Dec 13 02:23:23.533346 jq[1725]: true
Dec 13 02:23:23.577105 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully.
Dec 13 02:23:23.577347 systemd[1]: Finished ssh-key-proc-cmdline.service.
Dec 13 02:23:23.594044 tar[1729]: linux-amd64/helm
Dec 13 02:23:23.623811 jq[1733]: true
Dec 13 02:23:23.691668 dbus-daemon[1713]: [system] SELinux support is enabled
Dec 13 02:23:23.692471 systemd[1]: Started dbus.service.
Dec 13 02:23:23.698305 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml).
Dec 13 02:23:23.698340 systemd[1]: Reached target system-config.target.
Dec 13 02:23:23.699582 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url).
Dec 13 02:23:23.699612 systemd[1]: Reached target user-config.target.
Dec 13 02:23:23.715419 dbus-daemon[1713]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1457 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0")
Dec 13 02:23:23.721213 systemd[1]: Starting systemd-hostnamed.service...
Dec 13 02:23:23.767719 extend-filesystems[1715]: Found loop1
Dec 13 02:23:23.769084 extend-filesystems[1715]: Found nvme0n1
Dec 13 02:23:23.770053 extend-filesystems[1715]: Found nvme0n1p1
Dec 13 02:23:23.793512 extend-filesystems[1715]: Found nvme0n1p2
Dec 13 02:23:23.795278 extend-filesystems[1715]: Found nvme0n1p3
Dec 13 02:23:23.796219 extend-filesystems[1715]: Found usr
Dec 13 02:23:23.802377 extend-filesystems[1715]: Found nvme0n1p4
Dec 13 02:23:23.804370 extend-filesystems[1715]: Found nvme0n1p6
Dec 13 02:23:23.807587 extend-filesystems[1715]: Found nvme0n1p7
Dec 13 02:23:23.808712 extend-filesystems[1715]: Found nvme0n1p9
Dec 13 02:23:23.809737 extend-filesystems[1715]: Checking size of /dev/nvme0n1p9
Dec 13 02:23:23.854627 systemd[1]: motdgen.service: Deactivated successfully.
Dec 13 02:23:23.854859 systemd[1]: Finished motdgen.service.
Dec 13 02:23:23.879970 amazon-ssm-agent[1710]: 2024/12/13 02:23:23 Failed to load instance info from vault. RegistrationKey does not exist.
Dec 13 02:23:23.896179 update_engine[1723]: I1213 02:23:23.895128  1723 main.cc:92] Flatcar Update Engine starting
Dec 13 02:23:23.900042 extend-filesystems[1715]: Resized partition /dev/nvme0n1p9
Dec 13 02:23:23.906015 amazon-ssm-agent[1710]: Initializing new seelog logger
Dec 13 02:23:23.922289 systemd[1]: Started update-engine.service.
Dec 13 02:23:23.924067 update_engine[1723]: I1213 02:23:23.922525  1723 update_check_scheduler.cc:74] Next update check in 6m24s
Dec 13 02:23:23.927513 amazon-ssm-agent[1710]: New Seelog Logger Creation Complete
Dec 13 02:23:23.928315 amazon-ssm-agent[1710]: 2024/12/13 02:23:23 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json.
Dec 13 02:23:23.928419 amazon-ssm-agent[1710]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json.
Dec 13 02:23:23.930194 amazon-ssm-agent[1710]: 2024/12/13 02:23:23 processing appconfig overrides
Dec 13 02:23:23.935244 systemd[1]: Started locksmithd.service.
Dec 13 02:23:23.963373 bash[1776]: Updated "/home/core/.ssh/authorized_keys"
Dec 13 02:23:23.963884 extend-filesystems[1780]: resize2fs 1.46.5 (30-Dec-2021)
Dec 13 02:23:23.967797 systemd[1]: Finished update-ssh-keys-after-ignition.service.
Dec 13 02:23:23.994173 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks
Dec 13 02:23:24.101178 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915
Dec 13 02:23:24.140252 env[1728]: time="2024-12-13T02:23:24.139119690Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16
Dec 13 02:23:24.148062 extend-filesystems[1780]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required
Dec 13 02:23:24.148062 extend-filesystems[1780]: old_desc_blocks = 1, new_desc_blocks = 1
Dec 13 02:23:24.148062 extend-filesystems[1780]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long.
Dec 13 02:23:24.171635 extend-filesystems[1715]: Resized filesystem in /dev/nvme0n1p9
Dec 13 02:23:24.148780 systemd[1]: extend-filesystems.service: Deactivated successfully.
Dec 13 02:23:24.148988 systemd[1]: Finished extend-filesystems.service.
Dec 13 02:23:24.237417 systemd-logind[1722]: Watching system buttons on /dev/input/event1 (Power Button)
Dec 13 02:23:24.245847 systemd-logind[1722]: Watching system buttons on /dev/input/event2 (Sleep Button)
Dec 13 02:23:24.246175 systemd-logind[1722]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard)
Dec 13 02:23:24.259755 systemd-logind[1722]: New seat seat0.
Dec 13 02:23:24.268395 systemd[1]: Started systemd-logind.service.
Dec 13 02:23:24.283508 env[1728]: time="2024-12-13T02:23:24.283347330Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1
Dec 13 02:23:24.283649 env[1728]: time="2024-12-13T02:23:24.283553656Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1
Dec 13 02:23:24.299695 env[1728]: time="2024-12-13T02:23:24.299391798Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1
Dec 13 02:23:24.299695 env[1728]: time="2024-12-13T02:23:24.299446575Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1
Dec 13 02:23:24.299869 env[1728]: time="2024-12-13T02:23:24.299743871Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Dec 13 02:23:24.299869 env[1728]: time="2024-12-13T02:23:24.299766000Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1
Dec 13 02:23:24.299869 env[1728]: time="2024-12-13T02:23:24.299784618Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured"
Dec 13 02:23:24.299869 env[1728]: time="2024-12-13T02:23:24.299799895Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1
Dec 13 02:23:24.300038 env[1728]: time="2024-12-13T02:23:24.299903982Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1
Dec 13 02:23:24.300258 env[1728]: time="2024-12-13T02:23:24.300206904Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1
Dec 13 02:23:24.300431 env[1728]: time="2024-12-13T02:23:24.300403353Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Dec 13 02:23:24.300502 env[1728]: time="2024-12-13T02:23:24.300431938Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1
Dec 13 02:23:24.300544 env[1728]: time="2024-12-13T02:23:24.300506916Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured"
Dec 13 02:23:24.300544 env[1728]: time="2024-12-13T02:23:24.300525525Z" level=info msg="metadata content store policy set" policy=shared
Dec 13 02:23:24.323474 env[1728]: time="2024-12-13T02:23:24.323408888Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1
Dec 13 02:23:24.323627 env[1728]: time="2024-12-13T02:23:24.323483479Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1
Dec 13 02:23:24.323627 env[1728]: time="2024-12-13T02:23:24.323502011Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1
Dec 13 02:23:24.323627 env[1728]: time="2024-12-13T02:23:24.323576118Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1
Dec 13 02:23:24.323751 env[1728]: time="2024-12-13T02:23:24.323654471Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1
Dec 13 02:23:24.323751 env[1728]: time="2024-12-13T02:23:24.323691360Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1
Dec 13 02:23:24.323751 env[1728]: time="2024-12-13T02:23:24.323712396Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1
Dec 13 02:23:24.323751 env[1728]: time="2024-12-13T02:23:24.323733438Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1
Dec 13 02:23:24.323907 env[1728]: time="2024-12-13T02:23:24.323769710Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1
Dec 13 02:23:24.323907 env[1728]: time="2024-12-13T02:23:24.323791526Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1
Dec 13 02:23:24.323907 env[1728]: time="2024-12-13T02:23:24.323810023Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1
Dec 13 02:23:24.323907 env[1728]: time="2024-12-13T02:23:24.323845309Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1
Dec 13 02:23:24.324055 env[1728]: time="2024-12-13T02:23:24.324034330Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2
Dec 13 02:23:24.324243 env[1728]: time="2024-12-13T02:23:24.324223243Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1
Dec 13 02:23:24.324684 env[1728]: time="2024-12-13T02:23:24.324660029Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1
Dec 13 02:23:24.324750 env[1728]: time="2024-12-13T02:23:24.324716338Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1
Dec 13 02:23:24.324750 env[1728]: time="2024-12-13T02:23:24.324740234Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1
Dec 13 02:23:24.324843 env[1728]: time="2024-12-13T02:23:24.324826569Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1
Dec 13 02:23:24.324936 env[1728]: time="2024-12-13T02:23:24.324916543Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1
Dec 13 02:23:24.324992 env[1728]: time="2024-12-13T02:23:24.324958071Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1
Dec 13 02:23:24.324992 env[1728]: time="2024-12-13T02:23:24.324977364Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1
Dec 13 02:23:24.325069 env[1728]: time="2024-12-13T02:23:24.324996625Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1
Dec 13 02:23:24.325069 env[1728]: time="2024-12-13T02:23:24.325030296Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1
Dec 13 02:23:24.325069 env[1728]: time="2024-12-13T02:23:24.325049888Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1
Dec 13 02:23:24.325202 env[1728]: time="2024-12-13T02:23:24.325070083Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1
Dec 13 02:23:24.325202 env[1728]: time="2024-12-13T02:23:24.325103300Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1
Dec 13 02:23:24.325350 env[1728]: time="2024-12-13T02:23:24.325330308Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1
Dec 13 02:23:24.325400 env[1728]: time="2024-12-13T02:23:24.325359833Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1
Dec 13 02:23:24.325441 env[1728]: time="2024-12-13T02:23:24.325379485Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1
Dec 13 02:23:24.325441 env[1728]: time="2024-12-13T02:23:24.325414223Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1
Dec 13 02:23:24.325522 env[1728]: time="2024-12-13T02:23:24.325438547Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1
Dec 13 02:23:24.328208 env[1728]: time="2024-12-13T02:23:24.325456821Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1
Dec 13 02:23:24.328325 env[1728]: time="2024-12-13T02:23:24.328241987Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin"
Dec 13 02:23:24.328372 env[1728]: time="2024-12-13T02:23:24.328360499Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1
Dec 13 02:23:24.328808 env[1728]: time="2024-12-13T02:23:24.328719380Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}"
Dec 13 02:23:24.333001 env[1728]: time="2024-12-13T02:23:24.328821186Z" level=info msg="Connect containerd service"
Dec 13 02:23:24.333001 env[1728]: time="2024-12-13T02:23:24.328891076Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\""
Dec 13 02:23:24.333001 env[1728]: time="2024-12-13T02:23:24.330195043Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Dec 13 02:23:24.338361 env[1728]: time="2024-12-13T02:23:24.333262432Z" level=info msg="Start subscribing containerd event"
Dec 13 02:23:24.338361 env[1728]: time="2024-12-13T02:23:24.333341614Z" level=info msg="Start recovering state"
Dec 13 02:23:24.338361 env[1728]: time="2024-12-13T02:23:24.333427490Z" level=info msg="Start event monitor"
Dec 13 02:23:24.338361 env[1728]: time="2024-12-13T02:23:24.333442104Z" level=info msg="Start snapshots syncer"
Dec 13 02:23:24.338361 env[1728]: time="2024-12-13T02:23:24.333454774Z" level=info msg="Start cni network conf syncer for default"
Dec 13 02:23:24.338361 env[1728]: time="2024-12-13T02:23:24.333465223Z" level=info msg="Start streaming server"
Dec 13 02:23:24.355035 systemd[1]: nvidia.service: Deactivated successfully.
Dec 13 02:23:24.359442 env[1728]: time="2024-12-13T02:23:24.359017531Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc
Dec 13 02:23:24.359442 env[1728]: time="2024-12-13T02:23:24.359105974Z" level=info msg=serving... address=/run/containerd/containerd.sock
Dec 13 02:23:24.359337 systemd[1]: Started containerd.service.
Dec 13 02:23:24.360786 env[1728]: time="2024-12-13T02:23:24.360580484Z" level=info msg="containerd successfully booted in 0.305504s"
Dec 13 02:23:24.446883 dbus-daemon[1713]: [system] Successfully activated service 'org.freedesktop.hostname1'
Dec 13 02:23:24.447060 systemd[1]: Started systemd-hostnamed.service.
Dec 13 02:23:24.449178 dbus-daemon[1713]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1756 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0")
Dec 13 02:23:24.453466 systemd[1]: Starting polkit.service...
Dec 13 02:23:24.485717 polkitd[1817]: Started polkitd version 121
Dec 13 02:23:24.513072 polkitd[1817]: Loading rules from directory /etc/polkit-1/rules.d
Dec 13 02:23:24.513176 polkitd[1817]: Loading rules from directory /usr/share/polkit-1/rules.d
Dec 13 02:23:24.515809 polkitd[1817]: Finished loading, compiling and executing 2 rules
Dec 13 02:23:24.517504 dbus-daemon[1713]: [system] Successfully activated service 'org.freedesktop.PolicyKit1'
Dec 13 02:23:24.517736 systemd[1]: Started polkit.service.
Dec 13 02:23:24.519589 polkitd[1817]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
Dec 13 02:23:24.574705 coreos-metadata[1712]: Dec 13 02:23:24.573 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1
Dec 13 02:23:24.577260 coreos-metadata[1712]: Dec 13 02:23:24.577 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1
Dec 13 02:23:24.578082 coreos-metadata[1712]: Dec 13 02:23:24.577 INFO Fetch successful
Dec 13 02:23:24.578082 coreos-metadata[1712]: Dec 13 02:23:24.578 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1
Dec 13 02:23:24.579275 coreos-metadata[1712]: Dec 13 02:23:24.579 INFO Fetch successful
Dec 13 02:23:24.579669 systemd-hostnamed[1756]: Hostname set to <ip-172-31-27-10> (transient)
Dec 13 02:23:24.579827 systemd-resolved[1676]: System hostname changed to 'ip-172-31-27-10'.
Dec 13 02:23:24.584306 unknown[1712]: wrote ssh authorized keys file for user: core
Dec 13 02:23:24.612664 update-ssh-keys[1834]: Updated "/home/core/.ssh/authorized_keys"
Dec 13 02:23:24.613074 systemd[1]: Finished coreos-metadata-sshkeys@core.service.
Dec 13 02:23:24.757699 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO Create new startup processor
Dec 13 02:23:24.758413 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [LongRunningPluginsManager] registered plugins: {}
Dec 13 02:23:24.770876 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO Initializing bookkeeping folders
Dec 13 02:23:24.771045 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO removing the completed state files
Dec 13 02:23:24.771114 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO Initializing bookkeeping folders for long running plugins
Dec 13 02:23:24.771208 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO Initializing replies folder for MDS reply requests that couldn't reach the service
Dec 13 02:23:24.771263 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO Initializing healthcheck folders for long running plugins
Dec 13 02:23:24.771324 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO Initializing locations for inventory plugin
Dec 13 02:23:24.771402 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO Initializing default location for custom inventory
Dec 13 02:23:24.771463 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO Initializing default location for file inventory
Dec 13 02:23:24.771519 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO Initializing default location for role inventory
Dec 13 02:23:24.771577 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO Init the cloudwatchlogs publisher
Dec 13 02:23:24.771633 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [instanceID=i-0c710bba90b67fdd6] Successfully loaded platform independent plugin aws:softwareInventory
Dec 13 02:23:24.771693 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [instanceID=i-0c710bba90b67fdd6] Successfully loaded platform independent plugin aws:runPowerShellScript
Dec 13 02:23:24.771758 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [instanceID=i-0c710bba90b67fdd6] Successfully loaded platform independent plugin aws:updateSsmAgent
Dec 13 02:23:24.771818 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [instanceID=i-0c710bba90b67fdd6] Successfully loaded platform independent plugin aws:refreshAssociation
Dec 13 02:23:24.772066 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [instanceID=i-0c710bba90b67fdd6] Successfully loaded platform independent plugin aws:downloadContent
Dec 13 02:23:24.772173 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [instanceID=i-0c710bba90b67fdd6] Successfully loaded platform independent plugin aws:configureDocker
Dec 13 02:23:24.772234 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [instanceID=i-0c710bba90b67fdd6] Successfully loaded platform independent plugin aws:runDockerAction
Dec 13 02:23:24.772292 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [instanceID=i-0c710bba90b67fdd6] Successfully loaded platform independent plugin aws:configurePackage
Dec 13 02:23:24.772367 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [instanceID=i-0c710bba90b67fdd6] Successfully loaded platform independent plugin aws:runDocument
Dec 13 02:23:24.772431 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [instanceID=i-0c710bba90b67fdd6] Successfully loaded platform dependent plugin aws:runShellScript
Dec 13 02:23:24.772491 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0
Dec 13 02:23:24.772549 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO OS: linux, Arch: amd64
Dec 13 02:23:24.775954 amazon-ssm-agent[1710]: datastore file /var/lib/amazon/ssm/i-0c710bba90b67fdd6/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute
Dec 13 02:23:24.857419 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [MessageGatewayService] Starting session document processing engine...
Dec 13 02:23:24.952218 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [MessageGatewayService] [EngineProcessor] Starting
Dec 13 02:23:25.046558 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module.
Dec 13 02:23:25.120622 sshd_keygen[1749]: ssh-keygen: generating new host keys: RSA ECDSA ED25519
Dec 13 02:23:25.141027 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0c710bba90b67fdd6, requestId: 6c009aae-3eb3-4ff7-b12b-ec53cea1dbef
Dec 13 02:23:25.207963 systemd[1]: Finished sshd-keygen.service.
Dec 13 02:23:25.211787 systemd[1]: Starting issuegen.service...
Dec 13 02:23:25.225663 systemd[1]: issuegen.service: Deactivated successfully.
Dec 13 02:23:25.225874 systemd[1]: Finished issuegen.service.
Dec 13 02:23:25.229271 systemd[1]: Starting systemd-user-sessions.service...
Dec 13 02:23:25.237765 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [MessagingDeliveryService] Starting document processing engine...
Dec 13 02:23:25.241451 systemd[1]: Finished systemd-user-sessions.service.
Dec 13 02:23:25.244760 systemd[1]: Started getty@tty1.service.
Dec 13 02:23:25.248273 systemd[1]: Started serial-getty@ttyS0.service.
Dec 13 02:23:25.249656 systemd[1]: Reached target getty.target.
Dec 13 02:23:25.332353 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [MessagingDeliveryService] [EngineProcessor] Starting
Dec 13 02:23:25.422281 locksmithd[1782]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot"
Dec 13 02:23:25.427408 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing
Dec 13 02:23:25.431717 tar[1729]: linux-amd64/LICENSE
Dec 13 02:23:25.431717 tar[1729]: linux-amd64/README.md
Dec 13 02:23:25.437430 systemd[1]: Finished prepare-helm.service.
Dec 13 02:23:25.522687 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [MessagingDeliveryService] Starting message polling
Dec 13 02:23:25.618545 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [MessagingDeliveryService] Starting send replies to MDS
Dec 13 02:23:25.714278 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [instanceID=i-0c710bba90b67fdd6] Starting association polling
Dec 13 02:23:25.810231 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting
Dec 13 02:23:25.906559 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [MessagingDeliveryService] [Association] Launching response handler
Dec 13 02:23:26.002871 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing
Dec 13 02:23:26.032088 systemd[1]: Started kubelet.service.
Dec 13 02:23:26.038540 systemd[1]: Reached target multi-user.target.
Dec 13 02:23:26.049102 systemd[1]: Starting systemd-update-utmp-runlevel.service...
Dec 13 02:23:26.074660 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully.
Dec 13 02:23:26.074890 systemd[1]: Finished systemd-update-utmp-runlevel.service.
Dec 13 02:23:26.076594 systemd[1]: Startup finished in 755ms (kernel) + 7.737s (initrd) + 11.465s (userspace) = 19.958s.
Dec 13 02:23:26.103304 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service
Dec 13 02:23:26.200057 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized
Dec 13 02:23:26.296911 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [MessageGatewayService] listening reply.
Dec 13 02:23:26.394540 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [HealthCheck] HealthCheck reporting agent health.
Dec 13 02:23:26.491859 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [OfflineService] Starting document processing engine...
Dec 13 02:23:26.589348 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [OfflineService] [EngineProcessor] Starting
Dec 13 02:23:26.687025 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [OfflineService] [EngineProcessor] Initial processing
Dec 13 02:23:26.785000 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [OfflineService] Starting message polling
Dec 13 02:23:26.883203 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [OfflineService] Starting send replies to MDS
Dec 13 02:23:26.981517 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [LongRunningPluginsManager] starting long running plugin manager
Dec 13 02:23:27.080787 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute
Dec 13 02:23:27.178863 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck
Dec 13 02:23:27.277993 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [StartupProcessor] Executing startup processor tasks
Dec 13 02:23:27.377179 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running
Dec 13 02:23:27.385858 kubelet[1937]: E1213 02:23:27.385689    1937 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory"
Dec 13 02:23:27.392009 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Dec 13 02:23:27.392203 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Dec 13 02:23:27.393677 systemd[1]: kubelet.service: Consumed 1.047s CPU time.
Dec 13 02:23:27.476307 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk
Dec 13 02:23:27.575747 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.6
Dec 13 02:23:27.675459 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0c710bba90b67fdd6?role=subscribe&stream=input
Dec 13 02:23:27.775281 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0c710bba90b67fdd6?role=subscribe&stream=input
Dec 13 02:23:27.875329 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [MessageGatewayService] Starting receiving message from control channel
Dec 13 02:23:27.975606 amazon-ssm-agent[1710]: 2024-12-13 02:23:24 INFO [MessageGatewayService] [EngineProcessor] Initial processing
Dec 13 02:23:32.660639 systemd[1]: Created slice system-sshd.slice.
Dec 13 02:23:32.662486 systemd[1]: Started sshd@0-172.31.27.10:22-139.178.68.195:36436.service.
Dec 13 02:23:32.897942 sshd[1945]: Accepted publickey for core from 139.178.68.195 port 36436 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:23:32.906017 sshd[1945]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:23:32.932322 systemd[1]: Created slice user-500.slice.
Dec 13 02:23:32.941254 systemd[1]: Starting user-runtime-dir@500.service...
Dec 13 02:23:32.947006 systemd-logind[1722]: New session 1 of user core.
Dec 13 02:23:32.983962 systemd[1]: Finished user-runtime-dir@500.service.
Dec 13 02:23:32.991416 systemd[1]: Starting user@500.service...
Dec 13 02:23:33.001004 (systemd)[1948]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:23:33.104867 systemd[1948]: Queued start job for default target default.target.
Dec 13 02:23:33.105797 systemd[1948]: Reached target paths.target.
Dec 13 02:23:33.105883 systemd[1948]: Reached target sockets.target.
Dec 13 02:23:33.105903 systemd[1948]: Reached target timers.target.
Dec 13 02:23:33.105919 systemd[1948]: Reached target basic.target.
Dec 13 02:23:33.106114 systemd[1]: Started user@500.service.
Dec 13 02:23:33.108317 systemd[1]: Started session-1.scope.
Dec 13 02:23:33.109495 systemd[1948]: Reached target default.target.
Dec 13 02:23:33.109704 systemd[1948]: Startup finished in 100ms.
Dec 13 02:23:33.261327 systemd[1]: Started sshd@1-172.31.27.10:22-139.178.68.195:36452.service.
Dec 13 02:23:33.429122 sshd[1957]: Accepted publickey for core from 139.178.68.195 port 36452 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:23:33.430801 sshd[1957]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:23:33.436748 systemd[1]: Started session-2.scope.
Dec 13 02:23:33.437450 systemd-logind[1722]: New session 2 of user core.
Dec 13 02:23:33.563750 sshd[1957]: pam_unix(sshd:session): session closed for user core
Dec 13 02:23:33.567861 systemd[1]: sshd@1-172.31.27.10:22-139.178.68.195:36452.service: Deactivated successfully.
Dec 13 02:23:33.568866 systemd[1]: session-2.scope: Deactivated successfully.
Dec 13 02:23:33.569543 systemd-logind[1722]: Session 2 logged out. Waiting for processes to exit.
Dec 13 02:23:33.570554 systemd-logind[1722]: Removed session 2.
Dec 13 02:23:33.589927 systemd[1]: Started sshd@2-172.31.27.10:22-139.178.68.195:36454.service.
Dec 13 02:23:33.757879 sshd[1963]: Accepted publickey for core from 139.178.68.195 port 36454 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:23:33.759551 sshd[1963]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:23:33.767874 systemd-logind[1722]: New session 3 of user core.
Dec 13 02:23:33.768502 systemd[1]: Started session-3.scope.
Dec 13 02:23:33.888672 sshd[1963]: pam_unix(sshd:session): session closed for user core
Dec 13 02:23:33.893426 systemd[1]: sshd@2-172.31.27.10:22-139.178.68.195:36454.service: Deactivated successfully.
Dec 13 02:23:33.894953 systemd[1]: session-3.scope: Deactivated successfully.
Dec 13 02:23:33.896050 systemd-logind[1722]: Session 3 logged out. Waiting for processes to exit.
Dec 13 02:23:33.896984 systemd-logind[1722]: Removed session 3.
Dec 13 02:23:33.916390 systemd[1]: Started sshd@3-172.31.27.10:22-139.178.68.195:36464.service.
Dec 13 02:23:34.104045 sshd[1969]: Accepted publickey for core from 139.178.68.195 port 36464 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:23:34.105549 sshd[1969]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:23:34.111745 systemd[1]: Started session-4.scope.
Dec 13 02:23:34.113638 systemd-logind[1722]: New session 4 of user core.
Dec 13 02:23:34.255064 sshd[1969]: pam_unix(sshd:session): session closed for user core
Dec 13 02:23:34.259038 systemd[1]: sshd@3-172.31.27.10:22-139.178.68.195:36464.service: Deactivated successfully.
Dec 13 02:23:34.260071 systemd[1]: session-4.scope: Deactivated successfully.
Dec 13 02:23:34.260993 systemd-logind[1722]: Session 4 logged out. Waiting for processes to exit.
Dec 13 02:23:34.262069 systemd-logind[1722]: Removed session 4.
Dec 13 02:23:34.281263 systemd[1]: Started sshd@4-172.31.27.10:22-139.178.68.195:36474.service.
Dec 13 02:23:34.443945 sshd[1975]: Accepted publickey for core from 139.178.68.195 port 36474 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:23:34.445653 sshd[1975]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:23:34.472124 systemd-logind[1722]: New session 5 of user core.
Dec 13 02:23:34.472691 systemd[1]: Started session-5.scope.
Dec 13 02:23:34.624639 sudo[1978]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1
Dec 13 02:23:34.624966 sudo[1978]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Dec 13 02:23:34.634416 dbus-daemon[1713]: \xd0m\xb0e\xeaU:  received setenforce notice (enforcing=1153695760)
Dec 13 02:23:34.636675 sudo[1978]: pam_unix(sudo:session): session closed for user root
Dec 13 02:23:34.664271 sshd[1975]: pam_unix(sshd:session): session closed for user core
Dec 13 02:23:34.671122 systemd[1]: sshd@4-172.31.27.10:22-139.178.68.195:36474.service: Deactivated successfully.
Dec 13 02:23:34.672169 systemd[1]: session-5.scope: Deactivated successfully.
Dec 13 02:23:34.673425 systemd-logind[1722]: Session 5 logged out. Waiting for processes to exit.
Dec 13 02:23:34.674465 systemd-logind[1722]: Removed session 5.
Dec 13 02:23:34.693705 systemd[1]: Started sshd@5-172.31.27.10:22-139.178.68.195:36490.service.
Dec 13 02:23:34.871830 sshd[1982]: Accepted publickey for core from 139.178.68.195 port 36490 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:23:34.874084 sshd[1982]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:23:34.896322 systemd-logind[1722]: New session 6 of user core.
Dec 13 02:23:34.896893 systemd[1]: Started session-6.scope.
Dec 13 02:23:35.033926 sudo[1986]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules
Dec 13 02:23:35.034294 sudo[1986]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Dec 13 02:23:35.057752 sudo[1986]: pam_unix(sudo:session): session closed for user root
Dec 13 02:23:35.070105 sudo[1985]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules
Dec 13 02:23:35.070346 sudo[1985]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Dec 13 02:23:35.107179 systemd[1]: Stopping audit-rules.service...
Dec 13 02:23:35.107000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Dec 13 02:23:35.111355 auditctl[1989]: No rules
Dec 13 02:23:35.111574 kernel: kauditd_printk_skb: 226 callbacks suppressed
Dec 13 02:23:35.111625 kernel: audit: type=1305 audit(1734056615.107:207): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Dec 13 02:23:35.107000 audit[1989]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff6e0a80e0 a2=420 a3=0 items=0 ppid=1 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:35.121241 kernel: audit: type=1300 audit(1734056615.107:207): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff6e0a80e0 a2=420 a3=0 items=0 ppid=1 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:35.121402 kernel: audit: type=1327 audit(1734056615.107:207): proctitle=2F7362696E2F617564697463746C002D44
Dec 13 02:23:35.107000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44
Dec 13 02:23:35.114488 systemd[1]: audit-rules.service: Deactivated successfully.
Dec 13 02:23:35.114710 systemd[1]: Stopped audit-rules.service.
Dec 13 02:23:35.118266 systemd[1]: Starting audit-rules.service...
Dec 13 02:23:35.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:35.129014 kernel: audit: type=1131 audit(1734056615.113:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:35.150519 augenrules[2006]: No rules
Dec 13 02:23:35.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:35.154270 systemd[1]: Finished audit-rules.service.
Dec 13 02:23:35.155491 sudo[1985]: pam_unix(sudo:session): session closed for user root
Dec 13 02:23:35.154000 audit[1985]: USER_END pid=1985 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:35.167791 kernel: audit: type=1130 audit(1734056615.153:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:35.167934 kernel: audit: type=1106 audit(1734056615.154:210): pid=1985 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:35.167968 kernel: audit: type=1104 audit(1734056615.154:211): pid=1985 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:35.154000 audit[1985]: CRED_DISP pid=1985 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:35.178979 sshd[1982]: pam_unix(sshd:session): session closed for user core
Dec 13 02:23:35.179000 audit[1982]: USER_END pid=1982 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:23:35.182789 systemd[1]: sshd@5-172.31.27.10:22-139.178.68.195:36490.service: Deactivated successfully.
Dec 13 02:23:35.183974 systemd[1]: session-6.scope: Deactivated successfully.
Dec 13 02:23:35.187175 kernel: audit: type=1106 audit(1734056615.179:212): pid=1982 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:23:35.179000 audit[1982]: CRED_DISP pid=1982 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:23:35.188566 systemd-logind[1722]: Session 6 logged out. Waiting for processes to exit.
Dec 13 02:23:35.190262 systemd-logind[1722]: Removed session 6.
Dec 13 02:23:35.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.27.10:22-139.178.68.195:36490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:35.197210 kernel: audit: type=1104 audit(1734056615.179:213): pid=1982 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:23:35.197321 kernel: audit: type=1131 audit(1734056615.181:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.27.10:22-139.178.68.195:36490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:35.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.10:22-139.178.68.195:36496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:35.206778 systemd[1]: Started sshd@6-172.31.27.10:22-139.178.68.195:36496.service.
Dec 13 02:23:35.399000 audit[2012]: USER_ACCT pid=2012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:23:35.401557 sshd[2012]: Accepted publickey for core from 139.178.68.195 port 36496 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:23:35.403000 audit[2012]: CRED_ACQ pid=2012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:23:35.403000 audit[2012]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe930caa50 a2=3 a3=0 items=0 ppid=1 pid=2012 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:35.403000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:23:35.406291 sshd[2012]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:23:35.420350 systemd-logind[1722]: New session 7 of user core.
Dec 13 02:23:35.420678 systemd[1]: Started session-7.scope.
Dec 13 02:23:35.453000 audit[2012]: USER_START pid=2012 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:23:35.456000 audit[2014]: CRED_ACQ pid=2014 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:23:35.549000 audit[2015]: USER_ACCT pid=2015 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:35.550733 sudo[2015]:     core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh
Dec 13 02:23:35.549000 audit[2015]: CRED_REFR pid=2015 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:35.551140 sudo[2015]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Dec 13 02:23:35.552000 audit[2015]: USER_START pid=2015 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:35.587404 systemd[1]: Starting docker.service...
Dec 13 02:23:35.648775 env[2025]: time="2024-12-13T02:23:35.648719530Z" level=info msg="Starting up"
Dec 13 02:23:35.650474 env[2025]: time="2024-12-13T02:23:35.650449741Z" level=info msg="parsed scheme: \"unix\"" module=grpc
Dec 13 02:23:35.650591 env[2025]: time="2024-12-13T02:23:35.650579749Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc
Dec 13 02:23:35.650648 env[2025]: time="2024-12-13T02:23:35.650636603Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock  <nil> 0 <nil>}] <nil> <nil>}" module=grpc
Dec 13 02:23:35.650735 env[2025]: time="2024-12-13T02:23:35.650723231Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc
Dec 13 02:23:35.653028 env[2025]: time="2024-12-13T02:23:35.652916963Z" level=info msg="parsed scheme: \"unix\"" module=grpc
Dec 13 02:23:35.653028 env[2025]: time="2024-12-13T02:23:35.652938863Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc
Dec 13 02:23:35.653028 env[2025]: time="2024-12-13T02:23:35.652959998Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock  <nil> 0 <nil>}] <nil> <nil>}" module=grpc
Dec 13 02:23:35.653028 env[2025]: time="2024-12-13T02:23:35.652972599Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc
Dec 13 02:23:35.694587 env[2025]: time="2024-12-13T02:23:35.694547824Z" level=info msg="Loading containers: start."
Dec 13 02:23:35.785000 audit[2055]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2055 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:35.785000 audit[2055]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd82821470 a2=0 a3=7ffd8282145c items=0 ppid=2025 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:35.785000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552
Dec 13 02:23:35.788000 audit[2057]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2057 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:35.788000 audit[2057]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc117f9ca0 a2=0 a3=7ffc117f9c8c items=0 ppid=2025 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:35.788000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552
Dec 13 02:23:35.790000 audit[2059]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2059 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:35.790000 audit[2059]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffeaeb28a40 a2=0 a3=7ffeaeb28a2c items=0 ppid=2025 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:35.790000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31
Dec 13 02:23:35.793000 audit[2061]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2061 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:35.793000 audit[2061]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffecffade40 a2=0 a3=7ffecffade2c items=0 ppid=2025 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:35.793000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32
Dec 13 02:23:35.797000 audit[2064]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2064 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:35.797000 audit[2064]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe125b9c40 a2=0 a3=7ffe125b9c2c items=0 ppid=2025 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:35.797000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E
Dec 13 02:23:35.838000 audit[2069]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2069 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:35.838000 audit[2069]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeecfe9030 a2=0 a3=7ffeecfe901c items=0 ppid=2025 pid=2069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:35.838000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E
Dec 13 02:23:35.851000 audit[2071]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2071 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:35.851000 audit[2071]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeddef6fa0 a2=0 a3=7ffeddef6f8c items=0 ppid=2025 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:35.851000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552
Dec 13 02:23:35.863000 audit[2073]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2073 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:35.863000 audit[2073]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe402f2830 a2=0 a3=7ffe402f281c items=0 ppid=2025 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:35.863000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E
Dec 13 02:23:35.867000 audit[2075]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2075 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:35.867000 audit[2075]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff77254360 a2=0 a3=7fff7725434c items=0 ppid=2025 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:35.867000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552
Dec 13 02:23:35.885000 audit[2079]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2079 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:35.885000 audit[2079]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff03abfe80 a2=0 a3=7fff03abfe6c items=0 ppid=2025 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:35.885000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552
Dec 13 02:23:35.893000 audit[2080]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2080 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:35.893000 audit[2080]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc13f2c1f0 a2=0 a3=7ffc13f2c1dc items=0 ppid=2025 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:35.893000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552
Dec 13 02:23:35.908180 kernel: Initializing XFRM netlink socket
Dec 13 02:23:35.955191 env[2025]: time="2024-12-13T02:23:35.955132913Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address"
Dec 13 02:23:35.957015 (udev-worker)[2035]: Network interface NamePolicy= disabled on kernel command line.
Dec 13 02:23:36.044000 audit[2088]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2088 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:36.044000 audit[2088]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff74580590 a2=0 a3=7fff7458057c items=0 ppid=2025 pid=2088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:36.044000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445
Dec 13 02:23:36.129000 audit[2091]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2091 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:36.129000 audit[2091]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe314f2d60 a2=0 a3=7ffe314f2d4c items=0 ppid=2025 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:36.129000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E
Dec 13 02:23:36.135000 audit[2094]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2094 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:36.135000 audit[2094]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff28b9ee00 a2=0 a3=7fff28b9edec items=0 ppid=2025 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:36.135000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054
Dec 13 02:23:36.139000 audit[2096]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2096 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:36.139000 audit[2096]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffca5809c50 a2=0 a3=7ffca5809c3c items=0 ppid=2025 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:36.139000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054
Dec 13 02:23:36.151000 audit[2098]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2098 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:36.151000 audit[2098]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffdb3d5a480 a2=0 a3=7ffdb3d5a46c items=0 ppid=2025 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:36.151000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552
Dec 13 02:23:36.158000 audit[2100]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2100 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:36.158000 audit[2100]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc058ea6e0 a2=0 a3=7ffc058ea6cc items=0 ppid=2025 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:36.158000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38
Dec 13 02:23:36.164000 audit[2102]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2102 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:36.164000 audit[2102]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffff0d5ed10 a2=0 a3=7ffff0d5ecfc items=0 ppid=2025 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:36.164000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552
Dec 13 02:23:36.176000 audit[2105]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2105 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:36.176000 audit[2105]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff823d59b0 a2=0 a3=7fff823d599c items=0 ppid=2025 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:36.176000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054
Dec 13 02:23:36.180000 audit[2107]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2107 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:36.180000 audit[2107]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffde9baa650 a2=0 a3=7ffde9baa63c items=0 ppid=2025 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:36.180000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31
Dec 13 02:23:36.182000 audit[2109]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:36.182000 audit[2109]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd107b08b0 a2=0 a3=7ffd107b089c items=0 ppid=2025 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:36.182000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32
Dec 13 02:23:36.186000 audit[2111]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2111 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:36.186000 audit[2111]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdfc094530 a2=0 a3=7ffdfc09451c items=0 ppid=2025 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:36.186000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50
Dec 13 02:23:36.187899 systemd-networkd[1457]: docker0: Link UP
Dec 13 02:23:36.200000 audit[2115]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2115 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:36.200000 audit[2115]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc56019550 a2=0 a3=7ffc5601953c items=0 ppid=2025 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:36.200000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552
Dec 13 02:23:36.206000 audit[2116]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2116 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:23:36.206000 audit[2116]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe64e6bc70 a2=0 a3=7ffe64e6bc5c items=0 ppid=2025 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:23:36.206000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552
Dec 13 02:23:36.210771 env[2025]: time="2024-12-13T02:23:36.207849479Z" level=info msg="Loading containers: done."
Dec 13 02:23:36.254410 env[2025]: time="2024-12-13T02:23:36.254361265Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2
Dec 13 02:23:36.254647 env[2025]: time="2024-12-13T02:23:36.254594111Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23
Dec 13 02:23:36.254807 env[2025]: time="2024-12-13T02:23:36.254725899Z" level=info msg="Daemon has completed initialization"
Dec 13 02:23:36.292755 systemd[1]: Started docker.service.
Dec 13 02:23:36.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:36.318596 env[2025]: time="2024-12-13T02:23:36.318499572Z" level=info msg="API listen on /run/docker.sock"
Dec 13 02:23:37.488327 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1.
Dec 13 02:23:37.488586 systemd[1]: Stopped kubelet.service.
Dec 13 02:23:37.488652 systemd[1]: kubelet.service: Consumed 1.047s CPU time.
Dec 13 02:23:37.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:37.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:37.490717 systemd[1]: Starting kubelet.service...
Dec 13 02:23:37.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:37.714330 systemd[1]: Started kubelet.service.
Dec 13 02:23:37.761572 env[1728]: time="2024-12-13T02:23:37.760443136Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\""
Dec 13 02:23:37.789648 kubelet[2151]: E1213 02:23:37.789602    2151 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory"
Dec 13 02:23:37.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Dec 13 02:23:37.793644 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Dec 13 02:23:37.793772 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Dec 13 02:23:38.087668 amazon-ssm-agent[1710]: 2024-12-13 02:23:38 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds.
Dec 13 02:23:38.408670 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2064487705.mount: Deactivated successfully.
Dec 13 02:23:41.096137 env[1728]: time="2024-12-13T02:23:41.096011686Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:41.099457 env[1728]: time="2024-12-13T02:23:41.099413320Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:41.102281 env[1728]: time="2024-12-13T02:23:41.102223040Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:41.106816 env[1728]: time="2024-12-13T02:23:41.106760456Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ace6a943b058439bd6daeb74f152e7c36e6fc0b5e481cdff9364cd6ca0473e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:41.107680 env[1728]: time="2024-12-13T02:23:41.107529553Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\" returns image reference \"sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e\""
Dec 13 02:23:41.113305 env[1728]: time="2024-12-13T02:23:41.113222313Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\""
Dec 13 02:23:43.970330 env[1728]: time="2024-12-13T02:23:43.970279793Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:43.973480 env[1728]: time="2024-12-13T02:23:43.973437885Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:43.975947 env[1728]: time="2024-12-13T02:23:43.975901837Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:43.978071 env[1728]: time="2024-12-13T02:23:43.978033337Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4bd1d4a449e7a1a4f375bd7c71abf48a95f8949b38f725ded255077329f21f7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:43.978756 env[1728]: time="2024-12-13T02:23:43.978720973Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\" returns image reference \"sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079\""
Dec 13 02:23:43.980532 env[1728]: time="2024-12-13T02:23:43.980499268Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\""
Dec 13 02:23:46.126019 env[1728]: time="2024-12-13T02:23:46.125960630Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:46.130159 env[1728]: time="2024-12-13T02:23:46.130094961Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:46.134688 env[1728]: time="2024-12-13T02:23:46.134612443Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:46.138959 env[1728]: time="2024-12-13T02:23:46.138895492Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:1a3081cb7d21763d22eb2c0781cc462d89f501ed523ad558dea1226f128fbfdd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:46.139930 env[1728]: time="2024-12-13T02:23:46.139844146Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\" returns image reference \"sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674\""
Dec 13 02:23:46.140658 env[1728]: time="2024-12-13T02:23:46.140627940Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\""
Dec 13 02:23:47.508108 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount224691934.mount: Deactivated successfully.
Dec 13 02:23:47.988741 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2.
Dec 13 02:23:47.990495 systemd[1]: Stopped kubelet.service.
Dec 13 02:23:47.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:47.997992 kernel: kauditd_printk_skb: 88 callbacks suppressed
Dec 13 02:23:47.998615 kernel: audit: type=1130 audit(1734056627.990:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:47.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:48.026521 kernel: audit: type=1131 audit(1734056627.990:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:48.022680 systemd[1]: Starting kubelet.service...
Dec 13 02:23:48.316483 systemd[1]: Started kubelet.service.
Dec 13 02:23:48.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:48.322172 kernel: audit: type=1130 audit(1734056628.316:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:48.431387 kubelet[2161]: E1213 02:23:48.431340    2161 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory"
Dec 13 02:23:48.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Dec 13 02:23:48.434372 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Dec 13 02:23:48.434597 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Dec 13 02:23:48.442183 kernel: audit: type=1131 audit(1734056628.433:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Dec 13 02:23:48.660032 env[1728]: time="2024-12-13T02:23:48.659904530Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:48.663415 env[1728]: time="2024-12-13T02:23:48.663371605Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:48.665265 env[1728]: time="2024-12-13T02:23:48.665226011Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:48.666942 env[1728]: time="2024-12-13T02:23:48.666905001Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:48.667658 env[1728]: time="2024-12-13T02:23:48.667624016Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\""
Dec 13 02:23:48.668617 env[1728]: time="2024-12-13T02:23:48.668588528Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\""
Dec 13 02:23:49.259020 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount65998959.mount: Deactivated successfully.
Dec 13 02:23:50.750621 env[1728]: time="2024-12-13T02:23:50.750567275Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:50.753427 env[1728]: time="2024-12-13T02:23:50.753378731Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:50.755759 env[1728]: time="2024-12-13T02:23:50.755716292Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:50.757974 env[1728]: time="2024-12-13T02:23:50.757935803Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:50.758780 env[1728]: time="2024-12-13T02:23:50.758740493Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\""
Dec 13 02:23:50.759518 env[1728]: time="2024-12-13T02:23:50.759491009Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\""
Dec 13 02:23:51.284369 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1110842105.mount: Deactivated successfully.
Dec 13 02:23:51.290401 env[1728]: time="2024-12-13T02:23:51.290132951Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:51.292623 env[1728]: time="2024-12-13T02:23:51.292406588Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:51.298727 env[1728]: time="2024-12-13T02:23:51.298684120Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:51.303609 env[1728]: time="2024-12-13T02:23:51.303562791Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:51.305112 env[1728]: time="2024-12-13T02:23:51.305020077Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\""
Dec 13 02:23:51.305862 env[1728]: time="2024-12-13T02:23:51.305827702Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\""
Dec 13 02:23:51.856736 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3854770358.mount: Deactivated successfully.
Dec 13 02:23:54.616340 kernel: audit: type=1131 audit(1734056634.610:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:54.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:54.611648 systemd[1]: systemd-hostnamed.service: Deactivated successfully.
Dec 13 02:23:54.636683 kernel: audit: type=1334 audit(1734056634.632:258): prog-id=40 op=UNLOAD
Dec 13 02:23:54.636833 kernel: audit: type=1334 audit(1734056634.632:259): prog-id=39 op=UNLOAD
Dec 13 02:23:54.636870 kernel: audit: type=1334 audit(1734056634.632:260): prog-id=38 op=UNLOAD
Dec 13 02:23:54.632000 audit: BPF prog-id=40 op=UNLOAD
Dec 13 02:23:54.632000 audit: BPF prog-id=39 op=UNLOAD
Dec 13 02:23:54.632000 audit: BPF prog-id=38 op=UNLOAD
Dec 13 02:23:55.002013 env[1728]: time="2024-12-13T02:23:55.001957365Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:55.013097 env[1728]: time="2024-12-13T02:23:55.013048593Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:55.025756 env[1728]: time="2024-12-13T02:23:55.025710265Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:55.031762 env[1728]: time="2024-12-13T02:23:55.031713802Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:23:55.036233 env[1728]: time="2024-12-13T02:23:55.036051239Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\""
Dec 13 02:23:58.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:58.489646 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3.
Dec 13 02:23:58.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:58.489912 systemd[1]: Stopped kubelet.service.
Dec 13 02:23:58.495659 systemd[1]: Starting kubelet.service...
Dec 13 02:23:58.500580 kernel: audit: type=1130 audit(1734056638.488:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:58.500695 kernel: audit: type=1131 audit(1734056638.488:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:59.040995 systemd[1]: Started kubelet.service.
Dec 13 02:23:59.045170 kernel: audit: type=1130 audit(1734056639.040:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:59.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:59.109189 kubelet[2190]: E1213 02:23:59.108260    2190 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory"
Dec 13 02:23:59.110209 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Dec 13 02:23:59.110379 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Dec 13 02:23:59.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Dec 13 02:23:59.114172 kernel: audit: type=1131 audit(1734056639.109:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Dec 13 02:23:59.191202 systemd[1]: Stopped kubelet.service.
Dec 13 02:23:59.198503 kernel: audit: type=1130 audit(1734056639.190:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:59.198627 kernel: audit: type=1131 audit(1734056639.193:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:59.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:59.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:59.199210 systemd[1]: Starting kubelet.service...
Dec 13 02:23:59.236128 systemd[1]: Reloading.
Dec 13 02:23:59.343549 /usr/lib/systemd/system-generators/torcx-generator[2223]: time="2024-12-13T02:23:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]"
Dec 13 02:23:59.343591 /usr/lib/systemd/system-generators/torcx-generator[2223]: time="2024-12-13T02:23:59Z" level=info msg="torcx already run"
Dec 13 02:23:59.464905 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Dec 13 02:23:59.464933 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Dec 13 02:23:59.490407 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Dec 13 02:23:59.596000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.596000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.596000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.596000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.596000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.596000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.596000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.596000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.596000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.596000 audit: BPF prog-id=43 op=LOAD
Dec 13 02:23:59.596000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.596000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.596000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.596000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.596000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.596000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.596000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.596000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.596000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.596000 audit: BPF prog-id=44 op=LOAD
Dec 13 02:23:59.596000 audit: BPF prog-id=24 op=UNLOAD
Dec 13 02:23:59.596000 audit: BPF prog-id=25 op=UNLOAD
Dec 13 02:23:59.599000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.599000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.599000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.599000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.599000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.599000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.599000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.599000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.599000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.599000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.599000 audit: BPF prog-id=45 op=LOAD
Dec 13 02:23:59.599000 audit: BPF prog-id=34 op=UNLOAD
Dec 13 02:23:59.600000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.600000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.600000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.600000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.600000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.600000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.600000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.600000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.600000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.600000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.600000 audit: BPF prog-id=46 op=LOAD
Dec 13 02:23:59.600000 audit: BPF prog-id=26 op=UNLOAD
Dec 13 02:23:59.601000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.601000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.601000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.601000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.601000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.601000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.601000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.601000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.601000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.601000 audit: BPF prog-id=47 op=LOAD
Dec 13 02:23:59.601000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.601000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.601000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.601000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.601000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.601000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.601000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.601000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.601000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.601000 audit: BPF prog-id=48 op=LOAD
Dec 13 02:23:59.601000 audit: BPF prog-id=27 op=UNLOAD
Dec 13 02:23:59.601000 audit: BPF prog-id=28 op=UNLOAD
Dec 13 02:23:59.604000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.604000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.604000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.604000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.604000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.604000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.604000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.604000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.604000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.605000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.605000 audit: BPF prog-id=49 op=LOAD
Dec 13 02:23:59.605000 audit: BPF prog-id=29 op=UNLOAD
Dec 13 02:23:59.605000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.605000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.605000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.605000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.605000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.605000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.605000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.605000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.605000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.605000 audit: BPF prog-id=50 op=LOAD
Dec 13 02:23:59.605000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.605000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.605000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.605000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.605000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.605000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.605000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.605000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.605000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.605000 audit: BPF prog-id=51 op=LOAD
Dec 13 02:23:59.605000 audit: BPF prog-id=30 op=UNLOAD
Dec 13 02:23:59.605000 audit: BPF prog-id=31 op=UNLOAD
Dec 13 02:23:59.607000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.607000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.607000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.607000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.607000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.607000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.607000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.607000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.607000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.607000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.607000 audit: BPF prog-id=52 op=LOAD
Dec 13 02:23:59.607000 audit: BPF prog-id=41 op=UNLOAD
Dec 13 02:23:59.608000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.608000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.608000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.608000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.608000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.608000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.608000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.608000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.608000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.608000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.608000 audit: BPF prog-id=53 op=LOAD
Dec 13 02:23:59.608000 audit: BPF prog-id=32 op=UNLOAD
Dec 13 02:23:59.610000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.610000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.610000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.610000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.610000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.610000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.610000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.610000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.610000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.610000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.610000 audit: BPF prog-id=54 op=LOAD
Dec 13 02:23:59.610000 audit: BPF prog-id=35 op=UNLOAD
Dec 13 02:23:59.622524 kernel: kauditd_printk_skb: 143 callbacks suppressed
Dec 13 02:23:59.622663 kernel: audit: type=1400 audit(1734056639.610:410): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.622708 kernel: audit: type=1400 audit(1734056639.611:411): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.610000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.610000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.610000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.610000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.610000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.610000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.611000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.627241 kernel: audit: type=1400 audit(1734056639.611:412): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.611000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.631739 kernel: audit: type=1400 audit(1734056639.612:413): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.612000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.633321 kernel: audit: type=1334 audit(1734056639.612:414): prog-id=55 op=LOAD
Dec 13 02:23:59.612000 audit: BPF prog-id=55 op=LOAD
Dec 13 02:23:59.637514 kernel: audit: type=1400 audit(1734056639.612:415): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.612000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.641717 kernel: audit: type=1400 audit(1734056639.612:416): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.612000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.646892 kernel: audit: type=1400 audit(1734056639.612:417): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.612000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.651773 kernel: audit: type=1400 audit(1734056639.612:418): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.612000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.612000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.663178 kernel: audit: type=1400 audit(1734056639.612:419): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.612000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.612000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.612000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.618000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.618000 audit: BPF prog-id=56 op=LOAD
Dec 13 02:23:59.618000 audit: BPF prog-id=36 op=UNLOAD
Dec 13 02:23:59.618000 audit: BPF prog-id=37 op=UNLOAD
Dec 13 02:23:59.618000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.618000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.618000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.618000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.618000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.618000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.618000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.618000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.618000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.622000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:23:59.622000 audit: BPF prog-id=57 op=LOAD
Dec 13 02:23:59.622000 audit: BPF prog-id=33 op=UNLOAD
Dec 13 02:23:59.674890 systemd[1]: Started kubelet.service.
Dec 13 02:23:59.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:59.678665 systemd[1]: Stopping kubelet.service...
Dec 13 02:23:59.679130 systemd[1]: kubelet.service: Deactivated successfully.
Dec 13 02:23:59.679590 systemd[1]: Stopped kubelet.service.
Dec 13 02:23:59.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:59.682394 systemd[1]: Starting kubelet.service...
Dec 13 02:23:59.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:23:59.946908 systemd[1]: Started kubelet.service.
Dec 13 02:24:00.100917 kubelet[2282]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Dec 13 02:24:00.100917 kubelet[2282]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI.
Dec 13 02:24:00.100917 kubelet[2282]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Dec 13 02:24:00.103324 kubelet[2282]: I1213 02:24:00.103250    2282 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime"
Dec 13 02:24:00.806944 kubelet[2282]: I1213 02:24:00.806896    2282 server.go:486] "Kubelet version" kubeletVersion="v1.31.0"
Dec 13 02:24:00.806944 kubelet[2282]: I1213 02:24:00.806929    2282 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
Dec 13 02:24:00.807418 kubelet[2282]: I1213 02:24:00.807394    2282 server.go:929] "Client rotation is on, will bootstrap in background"
Dec 13 02:24:00.873536 kubelet[2282]: E1213 02:24:00.873489    2282 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://172.31.27.10:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.31.27.10:6443: connect: connection refused" logger="UnhandledError"
Dec 13 02:24:00.878827 kubelet[2282]: I1213 02:24:00.878718    2282 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Dec 13 02:24:00.898607 kubelet[2282]: E1213 02:24:00.898563    2282 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService"
Dec 13 02:24:00.898607 kubelet[2282]: I1213 02:24:00.898604    2282 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config."
Dec 13 02:24:00.906739 kubelet[2282]: I1213 02:24:00.906703    2282 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified.  defaulting to /"
Dec 13 02:24:00.907248 kubelet[2282]: I1213 02:24:00.907226    2282 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority"
Dec 13 02:24:00.907588 kubelet[2282]: I1213 02:24:00.907543    2282 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[]
Dec 13 02:24:00.908573 kubelet[2282]: I1213 02:24:00.907679    2282 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-27-10","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2}
Dec 13 02:24:00.910313 kubelet[2282]: I1213 02:24:00.910291    2282 topology_manager.go:138] "Creating topology manager with none policy"
Dec 13 02:24:00.910405 kubelet[2282]: I1213 02:24:00.910319    2282 container_manager_linux.go:300] "Creating device plugin manager"
Dec 13 02:24:00.910479 kubelet[2282]: I1213 02:24:00.910465    2282 state_mem.go:36] "Initialized new in-memory state store"
Dec 13 02:24:00.920434 kubelet[2282]: I1213 02:24:00.920385    2282 kubelet.go:408] "Attempting to sync node with API server"
Dec 13 02:24:00.920434 kubelet[2282]: I1213 02:24:00.920445    2282 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests"
Dec 13 02:24:00.920655 kubelet[2282]: I1213 02:24:00.920492    2282 kubelet.go:314] "Adding apiserver pod source"
Dec 13 02:24:00.920655 kubelet[2282]: I1213 02:24:00.920506    2282 apiserver.go:42] "Waiting for node sync before watching apiserver pods"
Dec 13 02:24:00.946131 kubelet[2282]: W1213 02:24:00.946058    2282 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.27.10:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-10&limit=500&resourceVersion=0": dial tcp 172.31.27.10:6443: connect: connection refused
Dec 13 02:24:00.946315 kubelet[2282]: E1213 02:24:00.946172    2282 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.31.27.10:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-10&limit=500&resourceVersion=0\": dial tcp 172.31.27.10:6443: connect: connection refused" logger="UnhandledError"
Dec 13 02:24:00.952967 kubelet[2282]: W1213 02:24:00.952870    2282 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.27.10:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.31.27.10:6443: connect: connection refused
Dec 13 02:24:00.953341 kubelet[2282]: E1213 02:24:00.953198    2282 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.31.27.10:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.27.10:6443: connect: connection refused" logger="UnhandledError"
Dec 13 02:24:00.953399 kubelet[2282]: I1213 02:24:00.953339    2282 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1"
Dec 13 02:24:00.965289 kubelet[2282]: I1213 02:24:00.965246    2282 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode"
Dec 13 02:24:00.966310 kubelet[2282]: W1213 02:24:00.966283    2282 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.
Dec 13 02:24:00.967388 kubelet[2282]: I1213 02:24:00.967336    2282 server.go:1269] "Started kubelet"
Dec 13 02:24:00.967578 kubelet[2282]: I1213 02:24:00.967540    2282 server.go:163] "Starting to listen" address="0.0.0.0" port=10250
Dec 13 02:24:00.969358 kubelet[2282]: I1213 02:24:00.969224    2282 server.go:460] "Adding debug handlers to kubelet server"
Dec 13 02:24:00.971000 audit[2282]: AVC avc:  denied  { mac_admin } for  pid=2282 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:00.971000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Dec 13 02:24:00.971000 audit[2282]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ad27b0 a1=c000675398 a2=c000ad2780 a3=25 items=0 ppid=1 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:00.971000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Dec 13 02:24:00.971000 audit[2282]: AVC avc:  denied  { mac_admin } for  pid=2282 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:00.971000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Dec 13 02:24:00.971000 audit[2282]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006a1280 a1=c0006753b0 a2=c000ad2840 a3=25 items=0 ppid=1 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:00.971000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Dec 13 02:24:00.974837 kubelet[2282]: I1213 02:24:00.972976    2282 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument"
Dec 13 02:24:00.974837 kubelet[2282]: I1213 02:24:00.973102    2282 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument"
Dec 13 02:24:00.974837 kubelet[2282]: I1213 02:24:00.973343    2282 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer"
Dec 13 02:24:00.977374 kubelet[2282]: I1213 02:24:00.977305    2282 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10
Dec 13 02:24:00.977766 kubelet[2282]: I1213 02:24:00.977747    2282 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock"
Dec 13 02:24:00.976000 audit[2293]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:00.976000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc2d36f240 a2=0 a3=7ffc2d36f22c items=0 ppid=2282 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:00.976000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Dec 13 02:24:00.978000 audit[2294]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:00.978000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe292a6650 a2=0 a3=7ffe292a663c items=0 ppid=2282 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:00.978000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Dec 13 02:24:00.983020 kubelet[2282]: I1213 02:24:00.982992    2282 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key"
Dec 13 02:24:00.984435 kubelet[2282]: E1213 02:24:00.981395    2282 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.27.10:6443/api/v1/namespaces/default/events\": dial tcp 172.31.27.10:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-27-10.18109b53d943687a  default    0 0001-01-01 00:00:00 +0000 UTC <nil> <nil> map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-27-10,UID:ip-172-31-27-10,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-27-10,},FirstTimestamp:2024-12-13 02:24:00.967305338 +0000 UTC m=+1.007646770,LastTimestamp:2024-12-13 02:24:00.967305338 +0000 UTC m=+1.007646770,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-27-10,}"
Dec 13 02:24:00.984599 kubelet[2282]: E1213 02:24:00.984530    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:00.984599 kubelet[2282]: I1213 02:24:00.984577    2282 volume_manager.go:289] "Starting Kubelet Volume Manager"
Dec 13 02:24:00.986371 kubelet[2282]: I1213 02:24:00.984975    2282 desired_state_of_world_populator.go:146] "Desired state populator starts to run"
Dec 13 02:24:00.986371 kubelet[2282]: I1213 02:24:00.985136    2282 reconciler.go:26] "Reconciler: start to sync state"
Dec 13 02:24:00.986371 kubelet[2282]: W1213 02:24:00.985706    2282 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.27.10:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.10:6443: connect: connection refused
Dec 13 02:24:00.986371 kubelet[2282]: E1213 02:24:00.985785    2282 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.31.27.10:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.27.10:6443: connect: connection refused" logger="UnhandledError"
Dec 13 02:24:00.987775 kubelet[2282]: E1213 02:24:00.987732    2282 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.10:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-10?timeout=10s\": dial tcp 172.31.27.10:6443: connect: connection refused" interval="200ms"
Dec 13 02:24:00.988278 kubelet[2282]: I1213 02:24:00.988251    2282 factory.go:221] Registration of the systemd container factory successfully
Dec 13 02:24:00.988383 kubelet[2282]: I1213 02:24:00.988360    2282 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory
Dec 13 02:24:00.991560 kubelet[2282]: I1213 02:24:00.991531    2282 factory.go:221] Registration of the containerd container factory successfully
Dec 13 02:24:00.990000 audit[2296]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:00.990000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd8d1b2650 a2=0 a3=7ffd8d1b263c items=0 ppid=2282 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:00.990000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Dec 13 02:24:00.997000 audit[2298]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:00.997000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd891f9510 a2=0 a3=7ffd891f94fc items=0 ppid=2282 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:00.997000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Dec 13 02:24:01.007059 kubelet[2282]: E1213 02:24:01.007030    2282 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem"
Dec 13 02:24:01.025000 audit[2305]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2305 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:01.025000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffeeabc7f30 a2=0 a3=7ffeeabc7f1c items=0 ppid=2282 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:01.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38
Dec 13 02:24:01.026956 kubelet[2282]: I1213 02:24:01.026569    2282 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4"
Dec 13 02:24:01.029000 audit[2306]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:01.029000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffe1d42ee0 a2=0 a3=7fffe1d42ecc items=0 ppid=2282 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:01.029000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Dec 13 02:24:01.031420 kubelet[2282]: I1213 02:24:01.031136    2282 cpu_manager.go:214] "Starting CPU manager" policy="none"
Dec 13 02:24:01.031780 kubelet[2282]: I1213 02:24:01.031764    2282 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s"
Dec 13 02:24:01.031998 kubelet[2282]: I1213 02:24:01.031986    2282 state_mem.go:36] "Initialized new in-memory state store"
Dec 13 02:24:01.031000 audit[2307]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:01.031000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff52917e90 a2=0 a3=7fff52917e7c items=0 ppid=2282 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:01.031000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Dec 13 02:24:01.032969 kubelet[2282]: I1213 02:24:01.031638    2282 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6"
Dec 13 02:24:01.033047 kubelet[2282]: I1213 02:24:01.033039    2282 status_manager.go:217] "Starting to sync pod status with apiserver"
Dec 13 02:24:01.033098 kubelet[2282]: I1213 02:24:01.033093    2282 kubelet.go:2321] "Starting kubelet main sync loop"
Dec 13 02:24:01.033307 kubelet[2282]: E1213 02:24:01.033285    2282 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]"
Dec 13 02:24:01.035750 kubelet[2282]: W1213 02:24:01.035696    2282 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.27.10:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.10:6443: connect: connection refused
Dec 13 02:24:01.036344 kubelet[2282]: E1213 02:24:01.036316    2282 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.31.27.10:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.27.10:6443: connect: connection refused" logger="UnhandledError"
Dec 13 02:24:01.036788 kubelet[2282]: I1213 02:24:01.036633    2282 policy_none.go:49] "None policy: Start"
Dec 13 02:24:01.035000 audit[2310]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:01.035000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd45ea430 a2=0 a3=7fffd45ea41c items=0 ppid=2282 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:01.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Dec 13 02:24:01.038277 kubelet[2282]: I1213 02:24:01.038263    2282 memory_manager.go:170] "Starting memorymanager" policy="None"
Dec 13 02:24:01.038392 kubelet[2282]: I1213 02:24:01.038382    2282 state_mem.go:35] "Initializing new in-memory state store"
Dec 13 02:24:01.037000 audit[2312]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:01.037000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff30be81e0 a2=0 a3=7fff30be81cc items=0 ppid=2282 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:01.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Dec 13 02:24:01.039000 audit[2309]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:01.039000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffdfb18be0 a2=0 a3=7fffdfb18bcc items=0 ppid=2282 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:01.039000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Dec 13 02:24:01.046734 systemd[1]: Created slice kubepods.slice.
Dec 13 02:24:01.047000 audit[2313]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:01.047000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff3d441650 a2=0 a3=7fff3d44163c items=0 ppid=2282 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:01.047000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Dec 13 02:24:01.054088 systemd[1]: Created slice kubepods-besteffort.slice.
Dec 13 02:24:01.053000 audit[2314]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:01.053000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc0d34a7d0 a2=0 a3=7ffc0d34a7bc items=0 ppid=2282 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:01.053000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Dec 13 02:24:01.078339 systemd[1]: Created slice kubepods-burstable.slice.
Dec 13 02:24:01.085653 kubelet[2282]: E1213 02:24:01.085574    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:01.089067 kubelet[2282]: I1213 02:24:01.089041    2282 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found"
Dec 13 02:24:01.088000 audit[2282]: AVC avc:  denied  { mac_admin } for  pid=2282 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:01.088000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Dec 13 02:24:01.088000 audit[2282]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d6a5a0 a1=c000d19cc8 a2=c000d6a570 a3=25 items=0 ppid=1 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:01.088000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Dec 13 02:24:01.089624 kubelet[2282]: I1213 02:24:01.089605    2282 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument"
Dec 13 02:24:01.089866 kubelet[2282]: I1213 02:24:01.089853    2282 eviction_manager.go:189] "Eviction manager: starting control loop"
Dec 13 02:24:01.090615 kubelet[2282]: I1213 02:24:01.089938    2282 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s"
Dec 13 02:24:01.101486 kubelet[2282]: I1213 02:24:01.101452    2282 plugin_manager.go:118] "Starting Kubelet Plugin Manager"
Dec 13 02:24:01.112403 kubelet[2282]: E1213 02:24:01.112376    2282 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-27-10\" not found"
Dec 13 02:24:01.193734 kubelet[2282]: E1213 02:24:01.191032    2282 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.10:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-10?timeout=10s\": dial tcp 172.31.27.10:6443: connect: connection refused" interval="400ms"
Dec 13 02:24:01.210205 kubelet[2282]: I1213 02:24:01.210171    2282 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-27-10"
Dec 13 02:24:01.213443 systemd[1]: Created slice kubepods-burstable-podd54f93ed8d6d7cbe6e96341180cd9061.slice.
Dec 13 02:24:01.220969 kubelet[2282]: E1213 02:24:01.215067    2282 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.27.10:6443/api/v1/nodes\": dial tcp 172.31.27.10:6443: connect: connection refused" node="ip-172-31-27-10"
Dec 13 02:24:01.279362 systemd[1]: Created slice kubepods-burstable-pod54d5102484490a22a8b100edef22d00d.slice.
Dec 13 02:24:01.291878 kubelet[2282]: I1213 02:24:01.291843    2282 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d54f93ed8d6d7cbe6e96341180cd9061-k8s-certs\") pod \"kube-apiserver-ip-172-31-27-10\" (UID: \"d54f93ed8d6d7cbe6e96341180cd9061\") " pod="kube-system/kube-apiserver-ip-172-31-27-10"
Dec 13 02:24:01.298940 kubelet[2282]: I1213 02:24:01.292082    2282 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d54f93ed8d6d7cbe6e96341180cd9061-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-27-10\" (UID: \"d54f93ed8d6d7cbe6e96341180cd9061\") " pod="kube-system/kube-apiserver-ip-172-31-27-10"
Dec 13 02:24:01.301522 kubelet[2282]: I1213 02:24:01.301193    2282 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/54d5102484490a22a8b100edef22d00d-ca-certs\") pod \"kube-controller-manager-ip-172-31-27-10\" (UID: \"54d5102484490a22a8b100edef22d00d\") " pod="kube-system/kube-controller-manager-ip-172-31-27-10"
Dec 13 02:24:01.301522 kubelet[2282]: I1213 02:24:01.301308    2282 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/54d5102484490a22a8b100edef22d00d-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-27-10\" (UID: \"54d5102484490a22a8b100edef22d00d\") " pod="kube-system/kube-controller-manager-ip-172-31-27-10"
Dec 13 02:24:01.301641 kubelet[2282]: I1213 02:24:01.301533    2282 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d54f93ed8d6d7cbe6e96341180cd9061-ca-certs\") pod \"kube-apiserver-ip-172-31-27-10\" (UID: \"d54f93ed8d6d7cbe6e96341180cd9061\") " pod="kube-system/kube-apiserver-ip-172-31-27-10"
Dec 13 02:24:01.301641 kubelet[2282]: I1213 02:24:01.301560    2282 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/54d5102484490a22a8b100edef22d00d-k8s-certs\") pod \"kube-controller-manager-ip-172-31-27-10\" (UID: \"54d5102484490a22a8b100edef22d00d\") " pod="kube-system/kube-controller-manager-ip-172-31-27-10"
Dec 13 02:24:01.301641 kubelet[2282]: I1213 02:24:01.301617    2282 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/54d5102484490a22a8b100edef22d00d-kubeconfig\") pod \"kube-controller-manager-ip-172-31-27-10\" (UID: \"54d5102484490a22a8b100edef22d00d\") " pod="kube-system/kube-controller-manager-ip-172-31-27-10"
Dec 13 02:24:01.301777 kubelet[2282]: I1213 02:24:01.301646    2282 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/54d5102484490a22a8b100edef22d00d-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-27-10\" (UID: \"54d5102484490a22a8b100edef22d00d\") " pod="kube-system/kube-controller-manager-ip-172-31-27-10"
Dec 13 02:24:01.301777 kubelet[2282]: I1213 02:24:01.301716    2282 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/115a04a48bb535fc3ffadc24a16eb6b9-kubeconfig\") pod \"kube-scheduler-ip-172-31-27-10\" (UID: \"115a04a48bb535fc3ffadc24a16eb6b9\") " pod="kube-system/kube-scheduler-ip-172-31-27-10"
Dec 13 02:24:01.323823 systemd[1]: Created slice kubepods-burstable-pod115a04a48bb535fc3ffadc24a16eb6b9.slice.
Dec 13 02:24:01.429616 kubelet[2282]: I1213 02:24:01.429503    2282 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-27-10"
Dec 13 02:24:01.433052 kubelet[2282]: E1213 02:24:01.433001    2282 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.27.10:6443/api/v1/nodes\": dial tcp 172.31.27.10:6443: connect: connection refused" node="ip-172-31-27-10"
Dec 13 02:24:01.538598 env[1728]: time="2024-12-13T02:24:01.538542113Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-27-10,Uid:d54f93ed8d6d7cbe6e96341180cd9061,Namespace:kube-system,Attempt:0,}"
Dec 13 02:24:01.592482 kubelet[2282]: E1213 02:24:01.592425    2282 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.10:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-10?timeout=10s\": dial tcp 172.31.27.10:6443: connect: connection refused" interval="800ms"
Dec 13 02:24:01.618676 env[1728]: time="2024-12-13T02:24:01.618441511Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-27-10,Uid:54d5102484490a22a8b100edef22d00d,Namespace:kube-system,Attempt:0,}"
Dec 13 02:24:01.663966 env[1728]: time="2024-12-13T02:24:01.663915980Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-27-10,Uid:115a04a48bb535fc3ffadc24a16eb6b9,Namespace:kube-system,Attempt:0,}"
Dec 13 02:24:01.841125 kubelet[2282]: I1213 02:24:01.838905    2282 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-27-10"
Dec 13 02:24:01.841125 kubelet[2282]: E1213 02:24:01.841057    2282 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.27.10:6443/api/v1/nodes\": dial tcp 172.31.27.10:6443: connect: connection refused" node="ip-172-31-27-10"
Dec 13 02:24:01.883983 kubelet[2282]: W1213 02:24:01.883914    2282 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.27.10:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.31.27.10:6443: connect: connection refused
Dec 13 02:24:01.884128 kubelet[2282]: E1213 02:24:01.883994    2282 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.31.27.10:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.27.10:6443: connect: connection refused" logger="UnhandledError"
Dec 13 02:24:02.017370 kubelet[2282]: W1213 02:24:02.017291    2282 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.27.10:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-10&limit=500&resourceVersion=0": dial tcp 172.31.27.10:6443: connect: connection refused
Dec 13 02:24:02.017521 kubelet[2282]: E1213 02:24:02.017380    2282 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.31.27.10:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-10&limit=500&resourceVersion=0\": dial tcp 172.31.27.10:6443: connect: connection refused" logger="UnhandledError"
Dec 13 02:24:02.111661 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount573957026.mount: Deactivated successfully.
Dec 13 02:24:02.133229 env[1728]: time="2024-12-13T02:24:02.133177972Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:02.136965 env[1728]: time="2024-12-13T02:24:02.136918301Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:02.142326 env[1728]: time="2024-12-13T02:24:02.142275774Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:02.151387 env[1728]: time="2024-12-13T02:24:02.151334901Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:02.155821 env[1728]: time="2024-12-13T02:24:02.155429300Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:02.161798 env[1728]: time="2024-12-13T02:24:02.161748652Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:02.169206 env[1728]: time="2024-12-13T02:24:02.169115712Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:02.177337 env[1728]: time="2024-12-13T02:24:02.177256299Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:02.188644 env[1728]: time="2024-12-13T02:24:02.188592943Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:02.193449 env[1728]: time="2024-12-13T02:24:02.193372284Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:02.199128 env[1728]: time="2024-12-13T02:24:02.198668169Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:02.206627 kubelet[2282]: E1213 02:24:02.206500    2282 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.27.10:6443/api/v1/namespaces/default/events\": dial tcp 172.31.27.10:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-27-10.18109b53d943687a  default    0 0001-01-01 00:00:00 +0000 UTC <nil> <nil> map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-27-10,UID:ip-172-31-27-10,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-27-10,},FirstTimestamp:2024-12-13 02:24:00.967305338 +0000 UTC m=+1.007646770,LastTimestamp:2024-12-13 02:24:00.967305338 +0000 UTC m=+1.007646770,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-27-10,}"
Dec 13 02:24:02.211873 env[1728]: time="2024-12-13T02:24:02.211707258Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:02.425903 kubelet[2282]: W1213 02:24:02.393234    2282 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.27.10:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.10:6443: connect: connection refused
Dec 13 02:24:02.425903 kubelet[2282]: E1213 02:24:02.393362    2282 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.31.27.10:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.27.10:6443: connect: connection refused" logger="UnhandledError"
Dec 13 02:24:02.425903 kubelet[2282]: E1213 02:24:02.396119    2282 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.10:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-10?timeout=10s\": dial tcp 172.31.27.10:6443: connect: connection refused" interval="1.6s"
Dec 13 02:24:02.426244 env[1728]: time="2024-12-13T02:24:02.423780772Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 02:24:02.426244 env[1728]: time="2024-12-13T02:24:02.423851594Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 02:24:02.426244 env[1728]: time="2024-12-13T02:24:02.423869998Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 02:24:02.426244 env[1728]: time="2024-12-13T02:24:02.424081781Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0ca3184d4aa2e82f650447e11c2e33693c0acaf9895b02ae9149c583068901ea pid=2322 runtime=io.containerd.runc.v2
Dec 13 02:24:02.462823 env[1728]: time="2024-12-13T02:24:02.462713263Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 02:24:02.463045 env[1728]: time="2024-12-13T02:24:02.463015680Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 02:24:02.463183 env[1728]: time="2024-12-13T02:24:02.463133112Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 02:24:02.468691 env[1728]: time="2024-12-13T02:24:02.467864171Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/048828b9415bd188065c1759f7e077d9bf0c33dcd9767221ab1620f94df2228f pid=2351 runtime=io.containerd.runc.v2
Dec 13 02:24:02.496266 env[1728]: time="2024-12-13T02:24:02.496053684Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 02:24:02.496657 env[1728]: time="2024-12-13T02:24:02.496598473Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 02:24:02.496927 env[1728]: time="2024-12-13T02:24:02.496883952Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 02:24:02.504219 env[1728]: time="2024-12-13T02:24:02.504106180Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9aed8d1d4dfb0ff770774ad18be88b9ac6a550b5e31e92e609703d51be2cf8f4 pid=2347 runtime=io.containerd.runc.v2
Dec 13 02:24:02.539833 systemd[1]: Started cri-containerd-0ca3184d4aa2e82f650447e11c2e33693c0acaf9895b02ae9149c583068901ea.scope.
Dec 13 02:24:02.582472 kubelet[2282]: W1213 02:24:02.579629    2282 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.27.10:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.10:6443: connect: connection refused
Dec 13 02:24:02.582472 kubelet[2282]: E1213 02:24:02.582142    2282 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.31.27.10:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.27.10:6443: connect: connection refused" logger="UnhandledError"
Dec 13 02:24:02.664897 kubelet[2282]: I1213 02:24:02.658927    2282 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-27-10"
Dec 13 02:24:02.664897 kubelet[2282]: E1213 02:24:02.664789    2282 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.27.10:6443/api/v1/nodes\": dial tcp 172.31.27.10:6443: connect: connection refused" node="ip-172-31-27-10"
Dec 13 02:24:02.687000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.687000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.687000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.687000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.687000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.687000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.687000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.687000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.687000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.687000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.690000 audit: BPF prog-id=58 op=LOAD
Dec 13 02:24:02.697000 audit[2345]: AVC avc:  denied  { bpf } for  pid=2345 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.697000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2322 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:02.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063613331383464346161326538326636353034343765313163326533
Dec 13 02:24:02.697000 audit[2345]: AVC avc:  denied  { perfmon } for  pid=2345 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.697000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2322 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:02.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063613331383464346161326538326636353034343765313163326533
Dec 13 02:24:02.697000 audit[2345]: AVC avc:  denied  { bpf } for  pid=2345 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.697000 audit[2345]: AVC avc:  denied  { bpf } for  pid=2345 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.697000 audit[2345]: AVC avc:  denied  { bpf } for  pid=2345 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.697000 audit[2345]: AVC avc:  denied  { perfmon } for  pid=2345 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.697000 audit[2345]: AVC avc:  denied  { perfmon } for  pid=2345 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.697000 audit[2345]: AVC avc:  denied  { perfmon } for  pid=2345 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.697000 audit[2345]: AVC avc:  denied  { perfmon } for  pid=2345 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.697000 audit[2345]: AVC avc:  denied  { perfmon } for  pid=2345 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.697000 audit[2345]: AVC avc:  denied  { bpf } for  pid=2345 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.697000 audit[2345]: AVC avc:  denied  { bpf } for  pid=2345 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.697000 audit: BPF prog-id=59 op=LOAD
Dec 13 02:24:02.697000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000283080 items=0 ppid=2322 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:02.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063613331383464346161326538326636353034343765313163326533
Dec 13 02:24:02.697000 audit[2345]: AVC avc:  denied  { bpf } for  pid=2345 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.697000 audit[2345]: AVC avc:  denied  { bpf } for  pid=2345 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.697000 audit[2345]: AVC avc:  denied  { perfmon } for  pid=2345 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.697000 audit[2345]: AVC avc:  denied  { perfmon } for  pid=2345 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.697000 audit[2345]: AVC avc:  denied  { perfmon } for  pid=2345 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.697000 audit[2345]: AVC avc:  denied  { perfmon } for  pid=2345 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.697000 audit[2345]: AVC avc:  denied  { perfmon } for  pid=2345 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.697000 audit[2345]: AVC avc:  denied  { bpf } for  pid=2345 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.697000 audit[2345]: AVC avc:  denied  { bpf } for  pid=2345 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.697000 audit: BPF prog-id=60 op=LOAD
Dec 13 02:24:02.697000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002830c8 items=0 ppid=2322 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:02.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063613331383464346161326538326636353034343765313163326533
Dec 13 02:24:02.698000 audit: BPF prog-id=60 op=UNLOAD
Dec 13 02:24:02.700000 audit: BPF prog-id=59 op=UNLOAD
Dec 13 02:24:02.700000 audit[2345]: AVC avc:  denied  { bpf } for  pid=2345 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.700000 audit[2345]: AVC avc:  denied  { bpf } for  pid=2345 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.700000 audit[2345]: AVC avc:  denied  { bpf } for  pid=2345 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.700000 audit[2345]: AVC avc:  denied  { perfmon } for  pid=2345 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.700000 audit[2345]: AVC avc:  denied  { perfmon } for  pid=2345 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.700000 audit[2345]: AVC avc:  denied  { perfmon } for  pid=2345 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.700000 audit[2345]: AVC avc:  denied  { perfmon } for  pid=2345 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.700000 audit[2345]: AVC avc:  denied  { perfmon } for  pid=2345 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.700000 audit[2345]: AVC avc:  denied  { bpf } for  pid=2345 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.700000 audit[2345]: AVC avc:  denied  { bpf } for  pid=2345 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:02.700000 audit: BPF prog-id=61 op=LOAD
Dec 13 02:24:02.700000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002834d8 items=0 ppid=2322 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:02.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063613331383464346161326538326636353034343765313163326533
Dec 13 02:24:02.810153 systemd[1]: Started cri-containerd-9aed8d1d4dfb0ff770774ad18be88b9ac6a550b5e31e92e609703d51be2cf8f4.scope.
Dec 13 02:24:02.844557 systemd[1]: Started cri-containerd-048828b9415bd188065c1759f7e077d9bf0c33dcd9767221ab1620f94df2228f.scope.
Dec 13 02:24:03.000000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.000000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.000000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.000000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.000000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.000000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.000000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.000000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.000000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.000000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.000000 audit: BPF prog-id=62 op=LOAD
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { bpf } for  pid=2392 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2351 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034383832386239343135626431383830363563313735396637653037
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { perfmon } for  pid=2392 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2351 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034383832386239343135626431383830363563313735396637653037
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { bpf } for  pid=2392 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { bpf } for  pid=2392 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { bpf } for  pid=2392 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { perfmon } for  pid=2392 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { perfmon } for  pid=2392 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { perfmon } for  pid=2392 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { perfmon } for  pid=2392 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { perfmon } for  pid=2392 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { bpf } for  pid=2392 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { bpf } for  pid=2392 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit: BPF prog-id=63 op=LOAD
Dec 13 02:24:03.001000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000288660 items=0 ppid=2351 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034383832386239343135626431383830363563313735396637653037
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { bpf } for  pid=2392 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { bpf } for  pid=2392 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { perfmon } for  pid=2392 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { perfmon } for  pid=2392 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { perfmon } for  pid=2392 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { perfmon } for  pid=2392 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { perfmon } for  pid=2392 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { bpf } for  pid=2392 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { bpf } for  pid=2392 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit: BPF prog-id=64 op=LOAD
Dec 13 02:24:03.001000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002886a8 items=0 ppid=2351 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034383832386239343135626431383830363563313735396637653037
Dec 13 02:24:03.001000 audit: BPF prog-id=64 op=UNLOAD
Dec 13 02:24:03.001000 audit: BPF prog-id=63 op=UNLOAD
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { bpf } for  pid=2392 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { bpf } for  pid=2392 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { bpf } for  pid=2392 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { perfmon } for  pid=2392 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { perfmon } for  pid=2392 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { perfmon } for  pid=2392 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { perfmon } for  pid=2392 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { perfmon } for  pid=2392 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { bpf } for  pid=2392 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit[2392]: AVC avc:  denied  { bpf } for  pid=2392 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.001000 audit: BPF prog-id=65 op=LOAD
Dec 13 02:24:03.001000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000288ab8 items=0 ppid=2351 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034383832386239343135626431383830363563313735396637653037
Dec 13 02:24:03.014000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.014000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.015000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.015000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.015000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.015000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.015000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.015000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.015000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.015000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.015000 audit: BPF prog-id=66 op=LOAD
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { bpf } for  pid=2379 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2347 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961656438643164346466623066663737303737346164313862653838
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { perfmon } for  pid=2379 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2347 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961656438643164346466623066663737303737346164313862653838
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { bpf } for  pid=2379 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { bpf } for  pid=2379 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { bpf } for  pid=2379 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { perfmon } for  pid=2379 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { perfmon } for  pid=2379 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { perfmon } for  pid=2379 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { perfmon } for  pid=2379 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { perfmon } for  pid=2379 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { bpf } for  pid=2379 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { bpf } for  pid=2379 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit: BPF prog-id=67 op=LOAD
Dec 13 02:24:03.016000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001bd560 items=0 ppid=2347 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961656438643164346466623066663737303737346164313862653838
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { bpf } for  pid=2379 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { bpf } for  pid=2379 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { perfmon } for  pid=2379 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { perfmon } for  pid=2379 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { perfmon } for  pid=2379 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { perfmon } for  pid=2379 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { perfmon } for  pid=2379 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { bpf } for  pid=2379 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { bpf } for  pid=2379 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit: BPF prog-id=68 op=LOAD
Dec 13 02:24:03.016000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001bd5a8 items=0 ppid=2347 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961656438643164346466623066663737303737346164313862653838
Dec 13 02:24:03.016000 audit: BPF prog-id=68 op=UNLOAD
Dec 13 02:24:03.016000 audit: BPF prog-id=67 op=UNLOAD
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { bpf } for  pid=2379 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { bpf } for  pid=2379 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { bpf } for  pid=2379 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { perfmon } for  pid=2379 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { perfmon } for  pid=2379 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { perfmon } for  pid=2379 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { perfmon } for  pid=2379 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { perfmon } for  pid=2379 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { bpf } for  pid=2379 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit[2379]: AVC avc:  denied  { bpf } for  pid=2379 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.016000 audit: BPF prog-id=69 op=LOAD
Dec 13 02:24:03.016000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001bd9b8 items=0 ppid=2347 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961656438643164346466623066663737303737346164313862653838
Dec 13 02:24:03.053710 env[1728]: time="2024-12-13T02:24:03.053654125Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-27-10,Uid:d54f93ed8d6d7cbe6e96341180cd9061,Namespace:kube-system,Attempt:0,} returns sandbox id \"0ca3184d4aa2e82f650447e11c2e33693c0acaf9895b02ae9149c583068901ea\""
Dec 13 02:24:03.074815 kubelet[2282]: E1213 02:24:03.074741    2282 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://172.31.27.10:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.31.27.10:6443: connect: connection refused" logger="UnhandledError"
Dec 13 02:24:03.097023 env[1728]: time="2024-12-13T02:24:03.096974005Z" level=info msg="CreateContainer within sandbox \"0ca3184d4aa2e82f650447e11c2e33693c0acaf9895b02ae9149c583068901ea\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}"
Dec 13 02:24:03.178723 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount559868207.mount: Deactivated successfully.
Dec 13 02:24:03.190897 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2531988410.mount: Deactivated successfully.
Dec 13 02:24:03.207591 env[1728]: time="2024-12-13T02:24:03.207529006Z" level=info msg="CreateContainer within sandbox \"0ca3184d4aa2e82f650447e11c2e33693c0acaf9895b02ae9149c583068901ea\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"c97c69d004a8a18e2971ab871863528196a234fad004f197b0c4257acdd24fb6\""
Dec 13 02:24:03.208736 env[1728]: time="2024-12-13T02:24:03.208695104Z" level=info msg="StartContainer for \"c97c69d004a8a18e2971ab871863528196a234fad004f197b0c4257acdd24fb6\""
Dec 13 02:24:03.265119 env[1728]: time="2024-12-13T02:24:03.260625923Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-27-10,Uid:54d5102484490a22a8b100edef22d00d,Namespace:kube-system,Attempt:0,} returns sandbox id \"048828b9415bd188065c1759f7e077d9bf0c33dcd9767221ab1620f94df2228f\""
Dec 13 02:24:03.265119 env[1728]: time="2024-12-13T02:24:03.264267235Z" level=info msg="CreateContainer within sandbox \"048828b9415bd188065c1759f7e077d9bf0c33dcd9767221ab1620f94df2228f\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}"
Dec 13 02:24:03.277825 env[1728]: time="2024-12-13T02:24:03.277777640Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-27-10,Uid:115a04a48bb535fc3ffadc24a16eb6b9,Namespace:kube-system,Attempt:0,} returns sandbox id \"9aed8d1d4dfb0ff770774ad18be88b9ac6a550b5e31e92e609703d51be2cf8f4\""
Dec 13 02:24:03.283700 systemd[1]: Started cri-containerd-c97c69d004a8a18e2971ab871863528196a234fad004f197b0c4257acdd24fb6.scope.
Dec 13 02:24:03.291137 env[1728]: time="2024-12-13T02:24:03.291078819Z" level=info msg="CreateContainer within sandbox \"9aed8d1d4dfb0ff770774ad18be88b9ac6a550b5e31e92e609703d51be2cf8f4\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}"
Dec 13 02:24:03.316000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.316000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.316000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.316000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.316000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.316000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.316000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.316000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.316000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.316000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.316000 audit: BPF prog-id=70 op=LOAD
Dec 13 02:24:03.317000 audit[2438]: AVC avc:  denied  { bpf } for  pid=2438 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.317000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2322 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339376336396430303461386131386532393731616238373138363335
Dec 13 02:24:03.317000 audit[2438]: AVC avc:  denied  { perfmon } for  pid=2438 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.317000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2322 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339376336396430303461386131386532393731616238373138363335
Dec 13 02:24:03.318000 audit[2438]: AVC avc:  denied  { bpf } for  pid=2438 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.318000 audit[2438]: AVC avc:  denied  { bpf } for  pid=2438 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.318000 audit[2438]: AVC avc:  denied  { bpf } for  pid=2438 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.318000 audit[2438]: AVC avc:  denied  { perfmon } for  pid=2438 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.318000 audit[2438]: AVC avc:  denied  { perfmon } for  pid=2438 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.318000 audit[2438]: AVC avc:  denied  { perfmon } for  pid=2438 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.318000 audit[2438]: AVC avc:  denied  { perfmon } for  pid=2438 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.318000 audit[2438]: AVC avc:  denied  { perfmon } for  pid=2438 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.318000 audit[2438]: AVC avc:  denied  { bpf } for  pid=2438 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.318000 audit[2438]: AVC avc:  denied  { bpf } for  pid=2438 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.318000 audit: BPF prog-id=71 op=LOAD
Dec 13 02:24:03.318000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003deb50 items=0 ppid=2322 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339376336396430303461386131386532393731616238373138363335
Dec 13 02:24:03.319000 audit[2438]: AVC avc:  denied  { bpf } for  pid=2438 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.319000 audit[2438]: AVC avc:  denied  { bpf } for  pid=2438 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.319000 audit[2438]: AVC avc:  denied  { perfmon } for  pid=2438 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.319000 audit[2438]: AVC avc:  denied  { perfmon } for  pid=2438 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.319000 audit[2438]: AVC avc:  denied  { perfmon } for  pid=2438 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.319000 audit[2438]: AVC avc:  denied  { perfmon } for  pid=2438 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.319000 audit[2438]: AVC avc:  denied  { perfmon } for  pid=2438 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.319000 audit[2438]: AVC avc:  denied  { bpf } for  pid=2438 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.319000 audit[2438]: AVC avc:  denied  { bpf } for  pid=2438 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.319000 audit: BPF prog-id=72 op=LOAD
Dec 13 02:24:03.319000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003deb98 items=0 ppid=2322 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339376336396430303461386131386532393731616238373138363335
Dec 13 02:24:03.319000 audit: BPF prog-id=72 op=UNLOAD
Dec 13 02:24:03.319000 audit: BPF prog-id=71 op=UNLOAD
Dec 13 02:24:03.320000 audit[2438]: AVC avc:  denied  { bpf } for  pid=2438 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.320000 audit[2438]: AVC avc:  denied  { bpf } for  pid=2438 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.320000 audit[2438]: AVC avc:  denied  { bpf } for  pid=2438 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.320000 audit[2438]: AVC avc:  denied  { perfmon } for  pid=2438 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.320000 audit[2438]: AVC avc:  denied  { perfmon } for  pid=2438 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.320000 audit[2438]: AVC avc:  denied  { perfmon } for  pid=2438 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.320000 audit[2438]: AVC avc:  denied  { perfmon } for  pid=2438 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.320000 audit[2438]: AVC avc:  denied  { perfmon } for  pid=2438 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.320000 audit[2438]: AVC avc:  denied  { bpf } for  pid=2438 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.320000 audit[2438]: AVC avc:  denied  { bpf } for  pid=2438 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.320000 audit: BPF prog-id=73 op=LOAD
Dec 13 02:24:03.320000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003defa8 items=0 ppid=2322 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339376336396430303461386131386532393731616238373138363335
Dec 13 02:24:03.324142 env[1728]: time="2024-12-13T02:24:03.324075056Z" level=info msg="CreateContainer within sandbox \"048828b9415bd188065c1759f7e077d9bf0c33dcd9767221ab1620f94df2228f\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"2f7b442b3bbe88c89286e91ceb392c9707737214968eb593c4073b575f048792\""
Dec 13 02:24:03.329202 env[1728]: time="2024-12-13T02:24:03.328982902Z" level=info msg="StartContainer for \"2f7b442b3bbe88c89286e91ceb392c9707737214968eb593c4073b575f048792\""
Dec 13 02:24:03.349381 env[1728]: time="2024-12-13T02:24:03.349321235Z" level=info msg="CreateContainer within sandbox \"9aed8d1d4dfb0ff770774ad18be88b9ac6a550b5e31e92e609703d51be2cf8f4\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"af09e791290d37ecad94607081fc685227a7edfc0c844de0e204cb6c5654899a\""
Dec 13 02:24:03.350271 env[1728]: time="2024-12-13T02:24:03.350233847Z" level=info msg="StartContainer for \"af09e791290d37ecad94607081fc685227a7edfc0c844de0e204cb6c5654899a\""
Dec 13 02:24:03.368185 systemd[1]: Started cri-containerd-2f7b442b3bbe88c89286e91ceb392c9707737214968eb593c4073b575f048792.scope.
Dec 13 02:24:03.406378 systemd[1]: Started cri-containerd-af09e791290d37ecad94607081fc685227a7edfc0c844de0e204cb6c5654899a.scope.
Dec 13 02:24:03.424798 env[1728]: time="2024-12-13T02:24:03.424734536Z" level=info msg="StartContainer for \"c97c69d004a8a18e2971ab871863528196a234fad004f197b0c4257acdd24fb6\" returns successfully"
Dec 13 02:24:03.432000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.432000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.432000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.432000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.432000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.432000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.432000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.432000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.432000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.432000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.432000 audit: BPF prog-id=74 op=LOAD
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { bpf } for  pid=2473 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2351 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266376234343262336262653838633839323836653931636562333932
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { perfmon } for  pid=2473 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2351 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266376234343262336262653838633839323836653931636562333932
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { bpf } for  pid=2473 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { bpf } for  pid=2473 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { bpf } for  pid=2473 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { perfmon } for  pid=2473 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { perfmon } for  pid=2473 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { perfmon } for  pid=2473 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { perfmon } for  pid=2473 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { perfmon } for  pid=2473 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { bpf } for  pid=2473 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { bpf } for  pid=2473 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit: BPF prog-id=75 op=LOAD
Dec 13 02:24:03.433000 audit[2473]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000215230 items=0 ppid=2351 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266376234343262336262653838633839323836653931636562333932
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { bpf } for  pid=2473 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { bpf } for  pid=2473 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { perfmon } for  pid=2473 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { perfmon } for  pid=2473 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { perfmon } for  pid=2473 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { perfmon } for  pid=2473 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { perfmon } for  pid=2473 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { bpf } for  pid=2473 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { bpf } for  pid=2473 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit: BPF prog-id=76 op=LOAD
Dec 13 02:24:03.433000 audit[2473]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000215278 items=0 ppid=2351 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266376234343262336262653838633839323836653931636562333932
Dec 13 02:24:03.433000 audit: BPF prog-id=76 op=UNLOAD
Dec 13 02:24:03.433000 audit: BPF prog-id=75 op=UNLOAD
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { bpf } for  pid=2473 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { bpf } for  pid=2473 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { bpf } for  pid=2473 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { perfmon } for  pid=2473 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { perfmon } for  pid=2473 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { perfmon } for  pid=2473 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { perfmon } for  pid=2473 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { perfmon } for  pid=2473 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { bpf } for  pid=2473 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit[2473]: AVC avc:  denied  { bpf } for  pid=2473 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.433000 audit: BPF prog-id=77 op=LOAD
Dec 13 02:24:03.433000 audit[2473]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000215688 items=0 ppid=2351 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266376234343262336262653838633839323836653931636562333932
Dec 13 02:24:03.449000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.449000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.449000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.449000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.449000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.449000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.449000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.449000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.449000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.450000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.450000 audit: BPF prog-id=78 op=LOAD
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { bpf } for  pid=2491 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2347 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166303965373931323930643337656361643934363037303831666336
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { perfmon } for  pid=2491 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2347 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166303965373931323930643337656361643934363037303831666336
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { bpf } for  pid=2491 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { bpf } for  pid=2491 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { bpf } for  pid=2491 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { perfmon } for  pid=2491 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { perfmon } for  pid=2491 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { perfmon } for  pid=2491 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { perfmon } for  pid=2491 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { perfmon } for  pid=2491 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { bpf } for  pid=2491 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { bpf } for  pid=2491 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit: BPF prog-id=79 op=LOAD
Dec 13 02:24:03.451000 audit[2491]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001a2540 items=0 ppid=2347 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166303965373931323930643337656361643934363037303831666336
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { bpf } for  pid=2491 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { bpf } for  pid=2491 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { perfmon } for  pid=2491 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { perfmon } for  pid=2491 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { perfmon } for  pid=2491 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { perfmon } for  pid=2491 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { perfmon } for  pid=2491 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { bpf } for  pid=2491 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { bpf } for  pid=2491 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit: BPF prog-id=80 op=LOAD
Dec 13 02:24:03.451000 audit[2491]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001a2588 items=0 ppid=2347 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166303965373931323930643337656361643934363037303831666336
Dec 13 02:24:03.451000 audit: BPF prog-id=80 op=UNLOAD
Dec 13 02:24:03.451000 audit: BPF prog-id=79 op=UNLOAD
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { bpf } for  pid=2491 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { bpf } for  pid=2491 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { bpf } for  pid=2491 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { perfmon } for  pid=2491 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { perfmon } for  pid=2491 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { perfmon } for  pid=2491 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { perfmon } for  pid=2491 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { perfmon } for  pid=2491 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { bpf } for  pid=2491 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit[2491]: AVC avc:  denied  { bpf } for  pid=2491 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:03.451000 audit: BPF prog-id=81 op=LOAD
Dec 13 02:24:03.451000 audit[2491]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001a2998 items=0 ppid=2347 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:03.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166303965373931323930643337656361643934363037303831666336
Dec 13 02:24:03.511660 env[1728]: time="2024-12-13T02:24:03.511592914Z" level=info msg="StartContainer for \"2f7b442b3bbe88c89286e91ceb392c9707737214968eb593c4073b575f048792\" returns successfully"
Dec 13 02:24:03.529110 env[1728]: time="2024-12-13T02:24:03.528921232Z" level=info msg="StartContainer for \"af09e791290d37ecad94607081fc685227a7edfc0c844de0e204cb6c5654899a\" returns successfully"
Dec 13 02:24:03.997033 kubelet[2282]: E1213 02:24:03.996978    2282 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.10:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-10?timeout=10s\": dial tcp 172.31.27.10:6443: connect: connection refused" interval="3.2s"
Dec 13 02:24:04.243434 kubelet[2282]: W1213 02:24:04.243388    2282 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.27.10:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.31.27.10:6443: connect: connection refused
Dec 13 02:24:04.243687 kubelet[2282]: E1213 02:24:04.243539    2282 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.31.27.10:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.27.10:6443: connect: connection refused" logger="UnhandledError"
Dec 13 02:24:04.268998 kubelet[2282]: I1213 02:24:04.268894    2282 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-27-10"
Dec 13 02:24:04.269499 kubelet[2282]: E1213 02:24:04.269350    2282 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.27.10:6443/api/v1/nodes\": dial tcp 172.31.27.10:6443: connect: connection refused" node="ip-172-31-27-10"
Dec 13 02:24:04.712954 kubelet[2282]: W1213 02:24:04.712833    2282 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.27.10:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-10&limit=500&resourceVersion=0": dial tcp 172.31.27.10:6443: connect: connection refused
Dec 13 02:24:04.712954 kubelet[2282]: E1213 02:24:04.712891    2282 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.31.27.10:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-10&limit=500&resourceVersion=0\": dial tcp 172.31.27.10:6443: connect: connection refused" logger="UnhandledError"
Dec 13 02:24:04.926000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:24:04.941310 kernel: kauditd_printk_skb: 412 callbacks suppressed
Dec 13 02:24:04.941526 kernel: audit: type=1400 audit(1734056644.926:565): avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:24:04.941605 kernel: audit: type=1300 audit(1734056644.926:565): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000aa4cc0 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:24:04.926000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000aa4cc0 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:24:04.926000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:24:04.952186 kernel: audit: type=1327 audit(1734056644.926:565): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:24:04.952322 kernel: audit: type=1400 audit(1734056644.927:566): avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:24:04.927000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:24:04.958142 kernel: audit: type=1300 audit(1734056644.927:566): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000adf200 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:24:04.927000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000adf200 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:24:04.927000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:24:04.963185 kernel: audit: type=1327 audit(1734056644.927:566): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:24:06.247000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:24:06.259475 kernel: audit: type=1400 audit(1734056646.247:567): avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:24:06.259686 kernel: audit: type=1300 audit(1734056646.247:567): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0039c0ae0 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:24:06.247000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0039c0ae0 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:24:06.247000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:24:06.274354 kernel: audit: type=1327 audit(1734056646.247:567): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:24:06.274518 kernel: audit: type=1400 audit(1734056646.247:568): avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:24:06.247000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:24:06.247000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0031c7e80 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:24:06.247000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:24:06.247000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:24:06.247000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00704eb70 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:24:06.247000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:24:06.253000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:24:06.253000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c00704ed20 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:24:06.253000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:24:06.309000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:24:06.309000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c002d02c40 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:24:06.309000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:24:06.310000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:24:06.310000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c00704fa70 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:24:06.310000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:24:06.796163 kubelet[2282]: E1213 02:24:06.796107    2282 csi_plugin.go:305] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ip-172-31-27-10" not found
Dec 13 02:24:07.158654 kubelet[2282]: E1213 02:24:07.158535    2282 csi_plugin.go:305] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ip-172-31-27-10" not found
Dec 13 02:24:07.202606 kubelet[2282]: E1213 02:24:07.202564    2282 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-27-10\" not found" node="ip-172-31-27-10"
Dec 13 02:24:07.471815 kubelet[2282]: I1213 02:24:07.471715    2282 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-27-10"
Dec 13 02:24:07.490593 kubelet[2282]: I1213 02:24:07.490554    2282 kubelet_node_status.go:75] "Successfully registered node" node="ip-172-31-27-10"
Dec 13 02:24:07.490593 kubelet[2282]: E1213 02:24:07.490596    2282 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"ip-172-31-27-10\": node \"ip-172-31-27-10\" not found"
Dec 13 02:24:07.511396 kubelet[2282]: E1213 02:24:07.511358    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:07.611958 kubelet[2282]: E1213 02:24:07.611915    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:07.712951 kubelet[2282]: E1213 02:24:07.712910    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:07.813930 kubelet[2282]: E1213 02:24:07.813892    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:07.914802 kubelet[2282]: E1213 02:24:07.914765    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:08.015029 kubelet[2282]: E1213 02:24:08.014990    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:08.115789 amazon-ssm-agent[1710]: 2024-12-13 02:24:08 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated
Dec 13 02:24:08.116473 kubelet[2282]: E1213 02:24:08.116445    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:08.217834 kubelet[2282]: E1213 02:24:08.217674    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:08.318767 kubelet[2282]: E1213 02:24:08.318720    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:08.419295 kubelet[2282]: E1213 02:24:08.419037    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:08.520382 kubelet[2282]: E1213 02:24:08.520332    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:08.621044 kubelet[2282]: E1213 02:24:08.621001    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:08.722224 kubelet[2282]: E1213 02:24:08.722093    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:08.822845 kubelet[2282]: E1213 02:24:08.822800    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:08.923643 kubelet[2282]: E1213 02:24:08.923596    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:09.024332 kubelet[2282]: E1213 02:24:09.024263    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:09.029496 systemd[1]: Reloading.
Dec 13 02:24:09.125096 update_engine[1723]: I1213 02:24:09.123968  1723 update_attempter.cc:509] Updating boot flags...
Dec 13 02:24:09.125980 kubelet[2282]: E1213 02:24:09.125932    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:09.226275 kubelet[2282]: E1213 02:24:09.226222    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:09.227338 /usr/lib/systemd/system-generators/torcx-generator[2573]: time="2024-12-13T02:24:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]"
Dec 13 02:24:09.227378 /usr/lib/systemd/system-generators/torcx-generator[2573]: time="2024-12-13T02:24:09Z" level=info msg="torcx already run"
Dec 13 02:24:09.327090 kubelet[2282]: E1213 02:24:09.326457    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:09.427541 kubelet[2282]: E1213 02:24:09.427480    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:09.511348 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Dec 13 02:24:09.511370 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Dec 13 02:24:09.527837 kubelet[2282]: E1213 02:24:09.527765    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:09.534185 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Dec 13 02:24:09.628735 kubelet[2282]: E1213 02:24:09.628620    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:09.634000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.634000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.634000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.634000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.634000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.634000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.634000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.634000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.634000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.634000 audit: BPF prog-id=82 op=LOAD
Dec 13 02:24:09.634000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.634000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.634000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.634000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.634000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.634000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.634000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.634000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.634000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.634000 audit: BPF prog-id=83 op=LOAD
Dec 13 02:24:09.634000 audit: BPF prog-id=43 op=UNLOAD
Dec 13 02:24:09.634000 audit: BPF prog-id=44 op=UNLOAD
Dec 13 02:24:09.637000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.637000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.637000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.637000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.637000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.637000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.637000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.637000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.637000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.637000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.637000 audit: BPF prog-id=84 op=LOAD
Dec 13 02:24:09.637000 audit: BPF prog-id=58 op=UNLOAD
Dec 13 02:24:09.638000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.638000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.638000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.638000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.638000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.638000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.638000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.638000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.638000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.638000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.638000 audit: BPF prog-id=85 op=LOAD
Dec 13 02:24:09.638000 audit: BPF prog-id=45 op=UNLOAD
Dec 13 02:24:09.639000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.639000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.639000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.639000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.639000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.639000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.639000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.639000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.639000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.640000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.640000 audit: BPF prog-id=86 op=LOAD
Dec 13 02:24:09.640000 audit: BPF prog-id=46 op=UNLOAD
Dec 13 02:24:09.640000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.640000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.640000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.640000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.640000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.640000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.640000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.640000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.640000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.640000 audit: BPF prog-id=87 op=LOAD
Dec 13 02:24:09.640000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.640000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.640000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.640000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.640000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.640000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.640000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.640000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.640000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.640000 audit: BPF prog-id=88 op=LOAD
Dec 13 02:24:09.640000 audit: BPF prog-id=47 op=UNLOAD
Dec 13 02:24:09.640000 audit: BPF prog-id=48 op=UNLOAD
Dec 13 02:24:09.645000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.645000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.645000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.645000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.645000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.645000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.645000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.645000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.645000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.645000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.645000 audit: BPF prog-id=89 op=LOAD
Dec 13 02:24:09.645000 audit: BPF prog-id=78 op=UNLOAD
Dec 13 02:24:09.646000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.646000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.646000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.646000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.646000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.646000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.646000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.646000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.646000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.646000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.646000 audit: BPF prog-id=90 op=LOAD
Dec 13 02:24:09.646000 audit: BPF prog-id=49 op=UNLOAD
Dec 13 02:24:09.647000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.647000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.647000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.647000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.647000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.647000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.647000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.647000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.647000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.647000 audit: BPF prog-id=91 op=LOAD
Dec 13 02:24:09.647000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.647000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.647000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.647000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.647000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.647000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.647000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.647000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.647000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.647000 audit: BPF prog-id=92 op=LOAD
Dec 13 02:24:09.647000 audit: BPF prog-id=50 op=UNLOAD
Dec 13 02:24:09.647000 audit: BPF prog-id=51 op=UNLOAD
Dec 13 02:24:09.648000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.648000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.648000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.648000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.648000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.648000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.648000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.648000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.648000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.648000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.648000 audit: BPF prog-id=93 op=LOAD
Dec 13 02:24:09.648000 audit: BPF prog-id=70 op=UNLOAD
Dec 13 02:24:09.651000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.651000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.651000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.651000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.651000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.651000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.651000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.651000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.651000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.651000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.651000 audit: BPF prog-id=94 op=LOAD
Dec 13 02:24:09.651000 audit: BPF prog-id=52 op=UNLOAD
Dec 13 02:24:09.652000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.652000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.652000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.652000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.652000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.652000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.652000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.652000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.652000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.653000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.653000 audit: BPF prog-id=95 op=LOAD
Dec 13 02:24:09.653000 audit: BPF prog-id=53 op=UNLOAD
Dec 13 02:24:09.653000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.653000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.653000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.653000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.653000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.653000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.653000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.653000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.653000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.654000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.654000 audit: BPF prog-id=96 op=LOAD
Dec 13 02:24:09.654000 audit: BPF prog-id=66 op=UNLOAD
Dec 13 02:24:09.655000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.655000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.655000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.655000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.655000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.655000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.655000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.655000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.655000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.655000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.655000 audit: BPF prog-id=97 op=LOAD
Dec 13 02:24:09.655000 audit: BPF prog-id=54 op=UNLOAD
Dec 13 02:24:09.655000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.656000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.656000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.656000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.656000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.656000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.656000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.656000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.656000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.656000 audit: BPF prog-id=98 op=LOAD
Dec 13 02:24:09.656000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.656000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.656000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.656000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.656000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.656000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.656000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.656000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.656000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.656000 audit: BPF prog-id=99 op=LOAD
Dec 13 02:24:09.656000 audit: BPF prog-id=55 op=UNLOAD
Dec 13 02:24:09.656000 audit: BPF prog-id=56 op=UNLOAD
Dec 13 02:24:09.658000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.658000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.658000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.658000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.658000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.658000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.658000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.658000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.658000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.658000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.658000 audit: BPF prog-id=100 op=LOAD
Dec 13 02:24:09.658000 audit: BPF prog-id=74 op=UNLOAD
Dec 13 02:24:09.659000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.659000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.659000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.659000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.659000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.659000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.659000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.659000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.659000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.659000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.659000 audit: BPF prog-id=101 op=LOAD
Dec 13 02:24:09.659000 audit: BPF prog-id=57 op=UNLOAD
Dec 13 02:24:09.660000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.660000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.660000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.660000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.660000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.660000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.660000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.660000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.660000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.660000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:09.660000 audit: BPF prog-id=102 op=LOAD
Dec 13 02:24:09.660000 audit: BPF prog-id=62 op=UNLOAD
Dec 13 02:24:09.721440 systemd[1]: Stopping kubelet.service...
Dec 13 02:24:09.733848 kubelet[2282]: E1213 02:24:09.733816    2282 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:09.757560 systemd[1]: kubelet.service: Deactivated successfully.
Dec 13 02:24:09.757875 systemd[1]: Stopped kubelet.service.
Dec 13 02:24:09.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:24:09.761945 systemd[1]: Starting kubelet.service...
Dec 13 02:24:10.739000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:24:10.742331 kernel: kauditd_printk_skb: 259 callbacks suppressed
Dec 13 02:24:10.742433 kernel: audit: type=1400 audit(1734056650.739:818): avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:24:10.739000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0009ba1a0 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:24:10.756675 kernel: audit: type=1300 audit(1734056650.739:818): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0009ba1a0 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:24:10.739000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:24:10.771988 kernel: audit: type=1327 audit(1734056650.739:818): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:24:10.772115 kernel: audit: type=1400 audit(1734056650.745:819): avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:24:10.745000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:24:10.745000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0008e0060 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:24:10.786506 kernel: audit: type=1300 audit(1734056650.745:819): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0008e0060 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:24:10.786651 kernel: audit: type=1327 audit(1734056650.745:819): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:24:10.745000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:24:10.791770 kernel: audit: type=1400 audit(1734056650.745:820): avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:24:10.745000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:24:10.799193 kernel: audit: type=1300 audit(1734056650.745:820): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0008e0080 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:24:10.745000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0008e0080 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:24:10.745000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:24:10.811183 kernel: audit: type=1327 audit(1734056650.745:820): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:24:10.745000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:24:10.819175 kernel: audit: type=1400 audit(1734056650.745:821): avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:24:10.745000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0008e0220 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:24:10.745000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:24:11.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:24:11.587184 systemd[1]: Started kubelet.service.
Dec 13 02:24:11.722939 kubelet[2727]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Dec 13 02:24:11.722939 kubelet[2727]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI.
Dec 13 02:24:11.722939 kubelet[2727]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Dec 13 02:24:11.730282 kubelet[2727]: I1213 02:24:11.730206    2727 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime"
Dec 13 02:24:11.748213 kubelet[2727]: I1213 02:24:11.747729    2727 server.go:486] "Kubelet version" kubeletVersion="v1.31.0"
Dec 13 02:24:11.748213 kubelet[2727]: I1213 02:24:11.747840    2727 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
Dec 13 02:24:11.750559 kubelet[2727]: I1213 02:24:11.750535    2727 server.go:929] "Client rotation is on, will bootstrap in background"
Dec 13 02:24:11.758105 kubelet[2727]: I1213 02:24:11.757587    2727 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem".
Dec 13 02:24:11.761974 kubelet[2727]: I1213 02:24:11.760622    2727 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Dec 13 02:24:11.770391 kubelet[2727]: E1213 02:24:11.770209    2727 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService"
Dec 13 02:24:11.770606 kubelet[2727]: I1213 02:24:11.770585    2727 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config."
Dec 13 02:24:11.774650 kubelet[2727]: I1213 02:24:11.774629    2727 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified.  defaulting to /"
Dec 13 02:24:11.774908 kubelet[2727]: I1213 02:24:11.774896    2727 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority"
Dec 13 02:24:11.775179 kubelet[2727]: I1213 02:24:11.775125    2727 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[]
Dec 13 02:24:11.775457 kubelet[2727]: I1213 02:24:11.775282    2727 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-27-10","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2}
Dec 13 02:24:11.775593 kubelet[2727]: I1213 02:24:11.775583    2727 topology_manager.go:138] "Creating topology manager with none policy"
Dec 13 02:24:11.775712 kubelet[2727]: I1213 02:24:11.775704    2727 container_manager_linux.go:300] "Creating device plugin manager"
Dec 13 02:24:11.775816 kubelet[2727]: I1213 02:24:11.775806    2727 state_mem.go:36] "Initialized new in-memory state store"
Dec 13 02:24:11.779001 kubelet[2727]: I1213 02:24:11.778980    2727 kubelet.go:408] "Attempting to sync node with API server"
Dec 13 02:24:11.779211 kubelet[2727]: I1213 02:24:11.779192    2727 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests"
Dec 13 02:24:11.779274 kubelet[2727]: I1213 02:24:11.779244    2727 kubelet.go:314] "Adding apiserver pod source"
Dec 13 02:24:11.779274 kubelet[2727]: I1213 02:24:11.779263    2727 apiserver.go:42] "Waiting for node sync before watching apiserver pods"
Dec 13 02:24:11.784381 kubelet[2727]: I1213 02:24:11.784356    2727 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1"
Dec 13 02:24:11.785058 kubelet[2727]: I1213 02:24:11.785042    2727 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode"
Dec 13 02:24:11.798092 kubelet[2727]: I1213 02:24:11.798051    2727 server.go:1269] "Started kubelet"
Dec 13 02:24:11.814000 audit[2727]: AVC avc:  denied  { mac_admin } for  pid=2727 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:11.814000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Dec 13 02:24:11.814000 audit[2727]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b55950 a1=c000bd1a28 a2=c000b55920 a3=25 items=0 ppid=1 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:11.814000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Dec 13 02:24:11.814000 audit[2727]: AVC avc:  denied  { mac_admin } for  pid=2727 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:11.814000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Dec 13 02:24:11.814000 audit[2727]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bf84c0 a1=c000bd1a40 a2=c000b559e0 a3=25 items=0 ppid=1 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:11.814000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Dec 13 02:24:11.816985 kubelet[2727]: I1213 02:24:11.815817    2727 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument"
Dec 13 02:24:11.816985 kubelet[2727]: I1213 02:24:11.815885    2727 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument"
Dec 13 02:24:11.816985 kubelet[2727]: I1213 02:24:11.815930    2727 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer"
Dec 13 02:24:11.827896 kubelet[2727]: I1213 02:24:11.827812    2727 server.go:163] "Starting to listen" address="0.0.0.0" port=10250
Dec 13 02:24:11.834774 kubelet[2727]: I1213 02:24:11.834745    2727 server.go:460] "Adding debug handlers to kubelet server"
Dec 13 02:24:11.836813 kubelet[2727]: I1213 02:24:11.836660    2727 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10
Dec 13 02:24:11.837424 kubelet[2727]: I1213 02:24:11.837387    2727 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock"
Dec 13 02:24:11.841504 kubelet[2727]: I1213 02:24:11.841478    2727 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key"
Dec 13 02:24:11.847211 kubelet[2727]: I1213 02:24:11.844443    2727 volume_manager.go:289] "Starting Kubelet Volume Manager"
Dec 13 02:24:11.847834 kubelet[2727]: E1213 02:24:11.847808    2727 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:11.859461 kubelet[2727]: I1213 02:24:11.859425    2727 desired_state_of_world_populator.go:146] "Desired state populator starts to run"
Dec 13 02:24:11.859632 kubelet[2727]: I1213 02:24:11.859616    2727 reconciler.go:26] "Reconciler: start to sync state"
Dec 13 02:24:11.884263 kubelet[2727]: I1213 02:24:11.884213    2727 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4"
Dec 13 02:24:11.894281 kubelet[2727]: I1213 02:24:11.894106    2727 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6"
Dec 13 02:24:11.894281 kubelet[2727]: I1213 02:24:11.894175    2727 status_manager.go:217] "Starting to sync pod status with apiserver"
Dec 13 02:24:11.894281 kubelet[2727]: I1213 02:24:11.894206    2727 kubelet.go:2321] "Starting kubelet main sync loop"
Dec 13 02:24:11.894281 kubelet[2727]: E1213 02:24:11.894275    2727 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]"
Dec 13 02:24:11.948312 kubelet[2727]: E1213 02:24:11.948041    2727 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-27-10\" not found"
Dec 13 02:24:11.963224 kubelet[2727]: I1213 02:24:11.963192    2727 factory.go:221] Registration of the systemd container factory successfully
Dec 13 02:24:11.963526 kubelet[2727]: I1213 02:24:11.963503    2727 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory
Dec 13 02:24:11.971755 kubelet[2727]: I1213 02:24:11.971356    2727 factory.go:221] Registration of the containerd container factory successfully
Dec 13 02:24:11.985404 kubelet[2727]: E1213 02:24:11.985023    2727 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem"
Dec 13 02:24:12.004379 kubelet[2727]: E1213 02:24:12.004343    2727 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet"
Dec 13 02:24:12.122684 kubelet[2727]: I1213 02:24:12.122491    2727 cpu_manager.go:214] "Starting CPU manager" policy="none"
Dec 13 02:24:12.122870 kubelet[2727]: I1213 02:24:12.122853    2727 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s"
Dec 13 02:24:12.122962 kubelet[2727]: I1213 02:24:12.122952    2727 state_mem.go:36] "Initialized new in-memory state store"
Dec 13 02:24:12.123650 kubelet[2727]: I1213 02:24:12.123624    2727 state_mem.go:88] "Updated default CPUSet" cpuSet=""
Dec 13 02:24:12.123862 kubelet[2727]: I1213 02:24:12.123817    2727 state_mem.go:96] "Updated CPUSet assignments" assignments={}
Dec 13 02:24:12.123965 kubelet[2727]: I1213 02:24:12.123950    2727 policy_none.go:49] "None policy: Start"
Dec 13 02:24:12.134105 kubelet[2727]: I1213 02:24:12.134079    2727 memory_manager.go:170] "Starting memorymanager" policy="None"
Dec 13 02:24:12.134325 kubelet[2727]: I1213 02:24:12.134315    2727 state_mem.go:35] "Initializing new in-memory state store"
Dec 13 02:24:12.134825 kubelet[2727]: I1213 02:24:12.134807    2727 state_mem.go:75] "Updated machine memory state"
Dec 13 02:24:12.150571 kubelet[2727]: I1213 02:24:12.150543    2727 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found"
Dec 13 02:24:12.151009 kubelet[2727]: I1213 02:24:12.150989    2727 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument"
Dec 13 02:24:12.151432 kubelet[2727]: I1213 02:24:12.151417    2727 eviction_manager.go:189] "Eviction manager: starting control loop"
Dec 13 02:24:12.149000 audit[2727]: AVC avc:  denied  { mac_admin } for  pid=2727 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:12.149000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Dec 13 02:24:12.149000 audit[2727]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0011358f0 a1=c0011a2a08 a2=c0011358c0 a3=25 items=0 ppid=1 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:12.149000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Dec 13 02:24:12.151799 kubelet[2727]: I1213 02:24:12.151766    2727 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s"
Dec 13 02:24:12.153406 kubelet[2727]: I1213 02:24:12.152797    2727 plugin_manager.go:118] "Starting Kubelet Plugin Manager"
Dec 13 02:24:12.261872 kubelet[2727]: I1213 02:24:12.261814    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d54f93ed8d6d7cbe6e96341180cd9061-ca-certs\") pod \"kube-apiserver-ip-172-31-27-10\" (UID: \"d54f93ed8d6d7cbe6e96341180cd9061\") " pod="kube-system/kube-apiserver-ip-172-31-27-10"
Dec 13 02:24:12.262185 kubelet[2727]: I1213 02:24:12.261878    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d54f93ed8d6d7cbe6e96341180cd9061-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-27-10\" (UID: \"d54f93ed8d6d7cbe6e96341180cd9061\") " pod="kube-system/kube-apiserver-ip-172-31-27-10"
Dec 13 02:24:12.262185 kubelet[2727]: I1213 02:24:12.262027    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/54d5102484490a22a8b100edef22d00d-k8s-certs\") pod \"kube-controller-manager-ip-172-31-27-10\" (UID: \"54d5102484490a22a8b100edef22d00d\") " pod="kube-system/kube-controller-manager-ip-172-31-27-10"
Dec 13 02:24:12.262185 kubelet[2727]: I1213 02:24:12.262054    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/54d5102484490a22a8b100edef22d00d-kubeconfig\") pod \"kube-controller-manager-ip-172-31-27-10\" (UID: \"54d5102484490a22a8b100edef22d00d\") " pod="kube-system/kube-controller-manager-ip-172-31-27-10"
Dec 13 02:24:12.262185 kubelet[2727]: I1213 02:24:12.262096    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/54d5102484490a22a8b100edef22d00d-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-27-10\" (UID: \"54d5102484490a22a8b100edef22d00d\") " pod="kube-system/kube-controller-manager-ip-172-31-27-10"
Dec 13 02:24:12.262185 kubelet[2727]: I1213 02:24:12.262120    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d54f93ed8d6d7cbe6e96341180cd9061-k8s-certs\") pod \"kube-apiserver-ip-172-31-27-10\" (UID: \"d54f93ed8d6d7cbe6e96341180cd9061\") " pod="kube-system/kube-apiserver-ip-172-31-27-10"
Dec 13 02:24:12.262533 kubelet[2727]: I1213 02:24:12.262142    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/54d5102484490a22a8b100edef22d00d-ca-certs\") pod \"kube-controller-manager-ip-172-31-27-10\" (UID: \"54d5102484490a22a8b100edef22d00d\") " pod="kube-system/kube-controller-manager-ip-172-31-27-10"
Dec 13 02:24:12.262533 kubelet[2727]: I1213 02:24:12.262192    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/54d5102484490a22a8b100edef22d00d-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-27-10\" (UID: \"54d5102484490a22a8b100edef22d00d\") " pod="kube-system/kube-controller-manager-ip-172-31-27-10"
Dec 13 02:24:12.262533 kubelet[2727]: I1213 02:24:12.262219    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/115a04a48bb535fc3ffadc24a16eb6b9-kubeconfig\") pod \"kube-scheduler-ip-172-31-27-10\" (UID: \"115a04a48bb535fc3ffadc24a16eb6b9\") " pod="kube-system/kube-scheduler-ip-172-31-27-10"
Dec 13 02:24:12.265000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0
Dec 13 02:24:12.265000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0009edc00 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:24:12.265000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:24:12.273947 kubelet[2727]: I1213 02:24:12.273544    2727 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-27-10"
Dec 13 02:24:12.286539 kubelet[2727]: I1213 02:24:12.285726    2727 kubelet_node_status.go:111] "Node was previously registered" node="ip-172-31-27-10"
Dec 13 02:24:12.286539 kubelet[2727]: I1213 02:24:12.286475    2727 kubelet_node_status.go:75] "Successfully registered node" node="ip-172-31-27-10"
Dec 13 02:24:12.799103 kubelet[2727]: I1213 02:24:12.799070    2727 apiserver.go:52] "Watching apiserver"
Dec 13 02:24:12.860307 kubelet[2727]: I1213 02:24:12.860265    2727 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world"
Dec 13 02:24:12.920245 kubelet[2727]: I1213 02:24:12.920179    2727 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-27-10" podStartSLOduration=0.920135344 podStartE2EDuration="920.135344ms" podCreationTimestamp="2024-12-13 02:24:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:24:12.896922099 +0000 UTC m=+1.272744535" watchObservedRunningTime="2024-12-13 02:24:12.920135344 +0000 UTC m=+1.295957772"
Dec 13 02:24:12.938266 kubelet[2727]: I1213 02:24:12.938206    2727 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-27-10" podStartSLOduration=0.938184717 podStartE2EDuration="938.184717ms" podCreationTimestamp="2024-12-13 02:24:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:24:12.921345078 +0000 UTC m=+1.297167514" watchObservedRunningTime="2024-12-13 02:24:12.938184717 +0000 UTC m=+1.314007154"
Dec 13 02:24:12.966336 kubelet[2727]: I1213 02:24:12.966278    2727 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-27-10" podStartSLOduration=0.966257041 podStartE2EDuration="966.257041ms" podCreationTimestamp="2024-12-13 02:24:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:24:12.940472048 +0000 UTC m=+1.316294485" watchObservedRunningTime="2024-12-13 02:24:12.966257041 +0000 UTC m=+1.342079477"
Dec 13 02:24:15.550702 kubelet[2727]: I1213 02:24:15.550671    2727 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24"
Dec 13 02:24:15.551336 env[1728]: time="2024-12-13T02:24:15.551198737Z" level=info msg="No cni config template is specified, wait for other system components to drop the config."
Dec 13 02:24:15.551785 kubelet[2727]: I1213 02:24:15.551558    2727 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24"
Dec 13 02:24:16.169295 systemd[1]: Created slice kubepods-besteffort-pod8822f9c7_d7de_476a_b6b9_c3247c923427.slice.
Dec 13 02:24:16.193410 kubelet[2727]: I1213 02:24:16.193366    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/8822f9c7-d7de-476a-b6b9-c3247c923427-kube-proxy\") pod \"kube-proxy-t4frv\" (UID: \"8822f9c7-d7de-476a-b6b9-c3247c923427\") " pod="kube-system/kube-proxy-t4frv"
Dec 13 02:24:16.193410 kubelet[2727]: I1213 02:24:16.193418    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8822f9c7-d7de-476a-b6b9-c3247c923427-xtables-lock\") pod \"kube-proxy-t4frv\" (UID: \"8822f9c7-d7de-476a-b6b9-c3247c923427\") " pod="kube-system/kube-proxy-t4frv"
Dec 13 02:24:16.193753 kubelet[2727]: I1213 02:24:16.193480    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8822f9c7-d7de-476a-b6b9-c3247c923427-lib-modules\") pod \"kube-proxy-t4frv\" (UID: \"8822f9c7-d7de-476a-b6b9-c3247c923427\") " pod="kube-system/kube-proxy-t4frv"
Dec 13 02:24:16.193753 kubelet[2727]: I1213 02:24:16.193505    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wsnlh\" (UniqueName: \"kubernetes.io/projected/8822f9c7-d7de-476a-b6b9-c3247c923427-kube-api-access-wsnlh\") pod \"kube-proxy-t4frv\" (UID: \"8822f9c7-d7de-476a-b6b9-c3247c923427\") " pod="kube-system/kube-proxy-t4frv"
Dec 13 02:24:16.328793 kubelet[2727]: I1213 02:24:16.328751    2727 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory"
Dec 13 02:24:16.484980 env[1728]: time="2024-12-13T02:24:16.484853859Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-t4frv,Uid:8822f9c7-d7de-476a-b6b9-c3247c923427,Namespace:kube-system,Attempt:0,}"
Dec 13 02:24:16.531560 env[1728]: time="2024-12-13T02:24:16.531462383Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 02:24:16.531738 env[1728]: time="2024-12-13T02:24:16.531573395Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 02:24:16.531738 env[1728]: time="2024-12-13T02:24:16.531602216Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 02:24:16.532051 env[1728]: time="2024-12-13T02:24:16.531996848Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/28ecfa237118b0d75d69c1b7e42eb152fb5493e1b9c02675da3d3db21b379762 pid=2778 runtime=io.containerd.runc.v2
Dec 13 02:24:16.622340 systemd[1]: run-containerd-runc-k8s.io-28ecfa237118b0d75d69c1b7e42eb152fb5493e1b9c02675da3d3db21b379762-runc.SvkcaE.mount: Deactivated successfully.
Dec 13 02:24:16.640859 systemd[1]: Started cri-containerd-28ecfa237118b0d75d69c1b7e42eb152fb5493e1b9c02675da3d3db21b379762.scope.
Dec 13 02:24:16.655816 systemd[1]: Created slice kubepods-besteffort-pod5ec17f2e_0db3_41d3_a84c_8cdfb52d050a.slice.
Dec 13 02:24:16.698403 kubelet[2727]: I1213 02:24:16.698360    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-764jz\" (UniqueName: \"kubernetes.io/projected/5ec17f2e-0db3-41d3-a84c-8cdfb52d050a-kube-api-access-764jz\") pod \"tigera-operator-76c4976dd7-zn4h6\" (UID: \"5ec17f2e-0db3-41d3-a84c-8cdfb52d050a\") " pod="tigera-operator/tigera-operator-76c4976dd7-zn4h6"
Dec 13 02:24:16.698903 kubelet[2727]: I1213 02:24:16.698414    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5ec17f2e-0db3-41d3-a84c-8cdfb52d050a-var-lib-calico\") pod \"tigera-operator-76c4976dd7-zn4h6\" (UID: \"5ec17f2e-0db3-41d3-a84c-8cdfb52d050a\") " pod="tigera-operator/tigera-operator-76c4976dd7-zn4h6"
Dec 13 02:24:16.814597 kernel: kauditd_printk_skb: 18 callbacks suppressed
Dec 13 02:24:16.814846 kernel: audit: type=1400 audit(1734056656.806:827): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.806000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.806000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.833179 kernel: audit: type=1400 audit(1734056656.806:828): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.806000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.856174 kernel: audit: type=1400 audit(1734056656.806:829): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.806000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.868274 kernel: audit: type=1400 audit(1734056656.806:830): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.806000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.883324 kernel: audit: type=1400 audit(1734056656.806:831): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.883476 kernel: audit: type=1400 audit(1734056656.806:832): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.806000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.888572 kernel: audit: type=1400 audit(1734056656.806:833): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.806000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.806000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.896164 kernel: audit: type=1400 audit(1734056656.806:834): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.806000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.901168 kernel: audit: type=1400 audit(1734056656.806:835): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.806000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.806000 audit: BPF prog-id=103 op=LOAD
Dec 13 02:24:16.910228 kernel: audit: type=1400 audit(1734056656.806:836): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.817000 audit[2787]: AVC avc:  denied  { bpf } for  pid=2787 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.817000 audit[2787]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2778 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:16.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238656366613233373131386230643735643639633162376534326562
Dec 13 02:24:16.817000 audit[2787]: AVC avc:  denied  { perfmon } for  pid=2787 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.817000 audit[2787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2778 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:16.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238656366613233373131386230643735643639633162376534326562
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { bpf } for  pid=2787 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { bpf } for  pid=2787 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { bpf } for  pid=2787 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { perfmon } for  pid=2787 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { perfmon } for  pid=2787 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { perfmon } for  pid=2787 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { perfmon } for  pid=2787 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { perfmon } for  pid=2787 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { bpf } for  pid=2787 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { bpf } for  pid=2787 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit: BPF prog-id=104 op=LOAD
Dec 13 02:24:16.818000 audit[2787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000097220 items=0 ppid=2778 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:16.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238656366613233373131386230643735643639633162376534326562
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { bpf } for  pid=2787 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { bpf } for  pid=2787 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { perfmon } for  pid=2787 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { perfmon } for  pid=2787 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { perfmon } for  pid=2787 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { perfmon } for  pid=2787 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { perfmon } for  pid=2787 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { bpf } for  pid=2787 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { bpf } for  pid=2787 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit: BPF prog-id=105 op=LOAD
Dec 13 02:24:16.818000 audit[2787]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000097268 items=0 ppid=2778 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:16.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238656366613233373131386230643735643639633162376534326562
Dec 13 02:24:16.818000 audit: BPF prog-id=105 op=UNLOAD
Dec 13 02:24:16.818000 audit: BPF prog-id=104 op=UNLOAD
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { bpf } for  pid=2787 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { bpf } for  pid=2787 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { bpf } for  pid=2787 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { perfmon } for  pid=2787 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { perfmon } for  pid=2787 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { perfmon } for  pid=2787 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { perfmon } for  pid=2787 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { perfmon } for  pid=2787 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { bpf } for  pid=2787 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit[2787]: AVC avc:  denied  { bpf } for  pid=2787 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:16.818000 audit: BPF prog-id=106 op=LOAD
Dec 13 02:24:16.818000 audit[2787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000097678 items=0 ppid=2778 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:16.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238656366613233373131386230643735643639633162376534326562
Dec 13 02:24:16.940219 env[1728]: time="2024-12-13T02:24:16.940169590Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-t4frv,Uid:8822f9c7-d7de-476a-b6b9-c3247c923427,Namespace:kube-system,Attempt:0,} returns sandbox id \"28ecfa237118b0d75d69c1b7e42eb152fb5493e1b9c02675da3d3db21b379762\""
Dec 13 02:24:16.959009 env[1728]: time="2024-12-13T02:24:16.958964960Z" level=info msg="CreateContainer within sandbox \"28ecfa237118b0d75d69c1b7e42eb152fb5493e1b9c02675da3d3db21b379762\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}"
Dec 13 02:24:16.960871 env[1728]: time="2024-12-13T02:24:16.960769667Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-zn4h6,Uid:5ec17f2e-0db3-41d3-a84c-8cdfb52d050a,Namespace:tigera-operator,Attempt:0,}"
Dec 13 02:24:16.987771 env[1728]: time="2024-12-13T02:24:16.987648218Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 02:24:16.988005 env[1728]: time="2024-12-13T02:24:16.987733990Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 02:24:16.988005 env[1728]: time="2024-12-13T02:24:16.987749654Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 02:24:16.988276 env[1728]: time="2024-12-13T02:24:16.988199341Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e6ab6c94821a6fc4dd20090004c5836a34a8e6bb15c06c26d592e1de8a1c4220 pid=2825 runtime=io.containerd.runc.v2
Dec 13 02:24:16.990751 env[1728]: time="2024-12-13T02:24:16.990700033Z" level=info msg="CreateContainer within sandbox \"28ecfa237118b0d75d69c1b7e42eb152fb5493e1b9c02675da3d3db21b379762\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d776a8b7b2dc7b5632514f0cee325e194be66eaf82c6133f8d486fca5a4f08ed\""
Dec 13 02:24:16.992047 env[1728]: time="2024-12-13T02:24:16.992015916Z" level=info msg="StartContainer for \"d776a8b7b2dc7b5632514f0cee325e194be66eaf82c6133f8d486fca5a4f08ed\""
Dec 13 02:24:17.020870 systemd[1]: Started cri-containerd-e6ab6c94821a6fc4dd20090004c5836a34a8e6bb15c06c26d592e1de8a1c4220.scope.
Dec 13 02:24:17.060350 systemd[1]: Started cri-containerd-d776a8b7b2dc7b5632514f0cee325e194be66eaf82c6133f8d486fca5a4f08ed.scope.
Dec 13 02:24:17.119000 audit[2850]: AVC avc:  denied  { perfmon } for  pid=2850 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.119000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f0d14ea1d28 items=0 ppid=2778 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:17.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437373661386237623264633762353633323531346630636565333235
Dec 13 02:24:17.119000 audit[2850]: AVC avc:  denied  { bpf } for  pid=2850 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.119000 audit[2850]: AVC avc:  denied  { bpf } for  pid=2850 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.119000 audit[2850]: AVC avc:  denied  { bpf } for  pid=2850 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.119000 audit[2850]: AVC avc:  denied  { perfmon } for  pid=2850 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.119000 audit[2850]: AVC avc:  denied  { perfmon } for  pid=2850 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.119000 audit[2850]: AVC avc:  denied  { perfmon } for  pid=2850 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.119000 audit[2850]: AVC avc:  denied  { perfmon } for  pid=2850 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.119000 audit[2850]: AVC avc:  denied  { perfmon } for  pid=2850 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.119000 audit[2850]: AVC avc:  denied  { bpf } for  pid=2850 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.119000 audit[2850]: AVC avc:  denied  { bpf } for  pid=2850 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.119000 audit: BPF prog-id=107 op=LOAD
Dec 13 02:24:17.119000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003972f8 items=0 ppid=2778 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:17.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437373661386237623264633762353633323531346630636565333235
Dec 13 02:24:17.119000 audit[2850]: AVC avc:  denied  { bpf } for  pid=2850 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.119000 audit[2850]: AVC avc:  denied  { bpf } for  pid=2850 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.119000 audit[2850]: AVC avc:  denied  { perfmon } for  pid=2850 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.119000 audit[2850]: AVC avc:  denied  { perfmon } for  pid=2850 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.119000 audit[2850]: AVC avc:  denied  { perfmon } for  pid=2850 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.119000 audit[2850]: AVC avc:  denied  { perfmon } for  pid=2850 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.119000 audit[2850]: AVC avc:  denied  { perfmon } for  pid=2850 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.119000 audit[2850]: AVC avc:  denied  { bpf } for  pid=2850 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.119000 audit[2850]: AVC avc:  denied  { bpf } for  pid=2850 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.119000 audit: BPF prog-id=108 op=LOAD
Dec 13 02:24:17.119000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000397348 items=0 ppid=2778 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:17.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437373661386237623264633762353633323531346630636565333235
Dec 13 02:24:17.119000 audit: BPF prog-id=108 op=UNLOAD
Dec 13 02:24:17.119000 audit: BPF prog-id=107 op=UNLOAD
Dec 13 02:24:17.120000 audit[2850]: AVC avc:  denied  { bpf } for  pid=2850 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.120000 audit[2850]: AVC avc:  denied  { bpf } for  pid=2850 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.120000 audit[2850]: AVC avc:  denied  { bpf } for  pid=2850 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.120000 audit[2850]: AVC avc:  denied  { perfmon } for  pid=2850 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.120000 audit[2850]: AVC avc:  denied  { perfmon } for  pid=2850 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.120000 audit[2850]: AVC avc:  denied  { perfmon } for  pid=2850 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.120000 audit[2850]: AVC avc:  denied  { perfmon } for  pid=2850 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.120000 audit[2850]: AVC avc:  denied  { perfmon } for  pid=2850 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.120000 audit[2850]: AVC avc:  denied  { bpf } for  pid=2850 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.120000 audit[2850]: AVC avc:  denied  { bpf } for  pid=2850 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.120000 audit: BPF prog-id=109 op=LOAD
Dec 13 02:24:17.120000 audit[2850]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003973d8 items=0 ppid=2778 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:17.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437373661386237623264633762353633323531346630636565333235
Dec 13 02:24:17.170037 env[1728]: time="2024-12-13T02:24:17.169823658Z" level=info msg="StartContainer for \"d776a8b7b2dc7b5632514f0cee325e194be66eaf82c6133f8d486fca5a4f08ed\" returns successfully"
Dec 13 02:24:17.174000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.174000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.174000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.174000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.174000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.174000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.174000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.174000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.174000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.174000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.174000 audit: BPF prog-id=110 op=LOAD
Dec 13 02:24:17.175000 audit[2836]: AVC avc:  denied  { bpf } for  pid=2836 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.175000 audit[2836]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2825 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:17.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536616236633934383231613666633464643230303930303034633538
Dec 13 02:24:17.181000 audit[2836]: AVC avc:  denied  { perfmon } for  pid=2836 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.181000 audit[2836]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2825 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:17.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536616236633934383231613666633464643230303930303034633538
Dec 13 02:24:17.181000 audit[2836]: AVC avc:  denied  { bpf } for  pid=2836 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.181000 audit[2836]: AVC avc:  denied  { bpf } for  pid=2836 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.181000 audit[2836]: AVC avc:  denied  { bpf } for  pid=2836 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.181000 audit[2836]: AVC avc:  denied  { perfmon } for  pid=2836 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.181000 audit[2836]: AVC avc:  denied  { perfmon } for  pid=2836 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.181000 audit[2836]: AVC avc:  denied  { perfmon } for  pid=2836 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.181000 audit[2836]: AVC avc:  denied  { perfmon } for  pid=2836 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.181000 audit[2836]: AVC avc:  denied  { perfmon } for  pid=2836 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.181000 audit[2836]: AVC avc:  denied  { bpf } for  pid=2836 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.181000 audit[2836]: AVC avc:  denied  { bpf } for  pid=2836 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.181000 audit: BPF prog-id=111 op=LOAD
Dec 13 02:24:17.181000 audit[2836]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001d4d30 items=0 ppid=2825 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:17.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536616236633934383231613666633464643230303930303034633538
Dec 13 02:24:17.183000 audit[2836]: AVC avc:  denied  { bpf } for  pid=2836 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.183000 audit[2836]: AVC avc:  denied  { bpf } for  pid=2836 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.183000 audit[2836]: AVC avc:  denied  { perfmon } for  pid=2836 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.183000 audit[2836]: AVC avc:  denied  { perfmon } for  pid=2836 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.183000 audit[2836]: AVC avc:  denied  { perfmon } for  pid=2836 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.183000 audit[2836]: AVC avc:  denied  { perfmon } for  pid=2836 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.183000 audit[2836]: AVC avc:  denied  { perfmon } for  pid=2836 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.183000 audit[2836]: AVC avc:  denied  { bpf } for  pid=2836 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.183000 audit[2836]: AVC avc:  denied  { bpf } for  pid=2836 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.183000 audit: BPF prog-id=112 op=LOAD
Dec 13 02:24:17.183000 audit[2836]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001d4d78 items=0 ppid=2825 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:17.183000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536616236633934383231613666633464643230303930303034633538
Dec 13 02:24:17.185000 audit: BPF prog-id=112 op=UNLOAD
Dec 13 02:24:17.185000 audit: BPF prog-id=111 op=UNLOAD
Dec 13 02:24:17.185000 audit[2836]: AVC avc:  denied  { bpf } for  pid=2836 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.185000 audit[2836]: AVC avc:  denied  { bpf } for  pid=2836 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.185000 audit[2836]: AVC avc:  denied  { bpf } for  pid=2836 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.185000 audit[2836]: AVC avc:  denied  { perfmon } for  pid=2836 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.185000 audit[2836]: AVC avc:  denied  { perfmon } for  pid=2836 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.185000 audit[2836]: AVC avc:  denied  { perfmon } for  pid=2836 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.185000 audit[2836]: AVC avc:  denied  { perfmon } for  pid=2836 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.185000 audit[2836]: AVC avc:  denied  { perfmon } for  pid=2836 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.185000 audit[2836]: AVC avc:  denied  { bpf } for  pid=2836 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.185000 audit[2836]: AVC avc:  denied  { bpf } for  pid=2836 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:17.185000 audit: BPF prog-id=113 op=LOAD
Dec 13 02:24:17.185000 audit[2836]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001d5188 items=0 ppid=2825 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:17.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536616236633934383231613666633464643230303930303034633538
Dec 13 02:24:17.306592 env[1728]: time="2024-12-13T02:24:17.306550397Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-zn4h6,Uid:5ec17f2e-0db3-41d3-a84c-8cdfb52d050a,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"e6ab6c94821a6fc4dd20090004c5836a34a8e6bb15c06c26d592e1de8a1c4220\""
Dec 13 02:24:17.314203 env[1728]: time="2024-12-13T02:24:17.314160631Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\""
Dec 13 02:24:17.997306 sudo[2015]: pam_unix(sudo:session): session closed for user root
Dec 13 02:24:17.996000 audit[2015]: USER_END pid=2015 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 02:24:17.996000 audit[2015]: CRED_DISP pid=2015 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 02:24:18.025181 sshd[2012]: pam_unix(sshd:session): session closed for user core
Dec 13 02:24:18.025000 audit[2012]: USER_END pid=2012 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:24:18.025000 audit[2012]: CRED_DISP pid=2012 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:24:18.028854 systemd[1]: sshd@6-172.31.27.10:22-139.178.68.195:36496.service: Deactivated successfully.
Dec 13 02:24:18.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.10:22-139.178.68.195:36496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:24:18.029854 systemd[1]: session-7.scope: Deactivated successfully.
Dec 13 02:24:18.030053 systemd[1]: session-7.scope: Consumed 5.513s CPU time.
Dec 13 02:24:18.030914 systemd-logind[1722]: Session 7 logged out. Waiting for processes to exit.
Dec 13 02:24:18.032231 systemd-logind[1722]: Removed session 7.
Dec 13 02:24:18.153000 audit[2949]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2949 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.153000 audit[2949]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1af3e650 a2=0 a3=7ffd1af3e63c items=0 ppid=2876 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.153000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Dec 13 02:24:18.157000 audit[2950]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2950 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.157000 audit[2950]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbda9f690 a2=0 a3=7ffdbda9f67c items=0 ppid=2876 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.157000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Dec 13 02:24:18.159000 audit[2951]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2951 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.159000 audit[2951]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc9d1e8070 a2=0 a3=7ffc9d1e805c items=0 ppid=2876 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.159000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Dec 13 02:24:18.160000 audit[2952]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2952 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.160000 audit[2952]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3abf6800 a2=0 a3=7ffe3abf67ec items=0 ppid=2876 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.160000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Dec 13 02:24:18.162000 audit[2953]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2953 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.162000 audit[2953]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe487d7510 a2=0 a3=7ffe487d74fc items=0 ppid=2876 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.162000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Dec 13 02:24:18.164000 audit[2954]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2954 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.164000 audit[2954]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd009d0050 a2=0 a3=7ffd009d003c items=0 ppid=2876 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.164000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Dec 13 02:24:18.267000 audit[2955]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2955 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.267000 audit[2955]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcf18d9c20 a2=0 a3=7ffcf18d9c0c items=0 ppid=2876 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.267000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Dec 13 02:24:18.274000 audit[2957]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2957 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.274000 audit[2957]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd12e27140 a2=0 a3=7ffd12e2712c items=0 ppid=2876 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.274000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365
Dec 13 02:24:18.279000 audit[2960]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2960 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.279000 audit[2960]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd65c5c1e0 a2=0 a3=7ffd65c5c1cc items=0 ppid=2876 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.279000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669
Dec 13 02:24:18.281000 audit[2961]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2961 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.281000 audit[2961]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe72cb63e0 a2=0 a3=7ffe72cb63cc items=0 ppid=2876 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.281000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Dec 13 02:24:18.284000 audit[2963]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2963 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.284000 audit[2963]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc5c926650 a2=0 a3=7ffc5c92663c items=0 ppid=2876 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.284000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Dec 13 02:24:18.286000 audit[2964]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2964 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.286000 audit[2964]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffddb8e5e90 a2=0 a3=7ffddb8e5e7c items=0 ppid=2876 pid=2964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Dec 13 02:24:18.289000 audit[2966]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2966 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.289000 audit[2966]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe6d0d85f0 a2=0 a3=7ffe6d0d85dc items=0 ppid=2876 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.289000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Dec 13 02:24:18.294000 audit[2969]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2969 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.294000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe7201b9a0 a2=0 a3=7ffe7201b98c items=0 ppid=2876 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.294000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53
Dec 13 02:24:18.296000 audit[2970]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2970 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.296000 audit[2970]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0d08aa70 a2=0 a3=7ffe0d08aa5c items=0 ppid=2876 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.296000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Dec 13 02:24:18.300000 audit[2972]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2972 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.300000 audit[2972]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd9f3da340 a2=0 a3=7ffd9f3da32c items=0 ppid=2876 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.300000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Dec 13 02:24:18.302000 audit[2973]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2973 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.302000 audit[2973]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc8edd6f0 a2=0 a3=7ffdc8edd6dc items=0 ppid=2876 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.302000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Dec 13 02:24:18.306000 audit[2975]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2975 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.306000 audit[2975]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe61fe1080 a2=0 a3=7ffe61fe106c items=0 ppid=2876 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.306000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Dec 13 02:24:18.315000 audit[2978]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2978 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.315000 audit[2978]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe821c5950 a2=0 a3=7ffe821c593c items=0 ppid=2876 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.315000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Dec 13 02:24:18.321000 audit[2981]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2981 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.321000 audit[2981]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd960bb00 a2=0 a3=7fffd960baec items=0 ppid=2876 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.321000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Dec 13 02:24:18.325000 audit[2982]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2982 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.325000 audit[2982]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffef4c95110 a2=0 a3=7ffef4c950fc items=0 ppid=2876 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.325000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Dec 13 02:24:18.329000 audit[2984]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2984 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.329000 audit[2984]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffdc51dbda0 a2=0 a3=7ffdc51dbd8c items=0 ppid=2876 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.329000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Dec 13 02:24:18.343000 audit[2987]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2987 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.343000 audit[2987]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff2c4a4ce0 a2=0 a3=7fff2c4a4ccc items=0 ppid=2876 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Dec 13 02:24:18.345000 audit[2988]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2988 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.345000 audit[2988]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9b3b6050 a2=0 a3=7ffc9b3b603c items=0 ppid=2876 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.345000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Dec 13 02:24:18.348000 audit[2990]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2990 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:24:18.348000 audit[2990]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fffbb7b0ee0 a2=0 a3=7fffbb7b0ecc items=0 ppid=2876 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.348000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Dec 13 02:24:18.386000 audit[2996]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2996 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:18.386000 audit[2996]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fffd179f340 a2=0 a3=7fffd179f32c items=0 ppid=2876 pid=2996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.386000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:18.398000 audit[2996]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2996 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:18.398000 audit[2996]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fffd179f340 a2=0 a3=7fffd179f32c items=0 ppid=2876 pid=2996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.398000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:18.400000 audit[3001]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3001 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.400000 audit[3001]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff300db4e0 a2=0 a3=7fff300db4cc items=0 ppid=2876 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.400000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Dec 13 02:24:18.403000 audit[3003]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3003 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.403000 audit[3003]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdc5621950 a2=0 a3=7ffdc562193c items=0 ppid=2876 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.403000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963
Dec 13 02:24:18.408000 audit[3006]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3006 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.408000 audit[3006]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffed6dffd0 a2=0 a3=7fffed6dffbc items=0 ppid=2876 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.408000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276
Dec 13 02:24:18.409000 audit[3007]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3007 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.409000 audit[3007]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf793a860 a2=0 a3=7ffcf793a84c items=0 ppid=2876 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.409000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Dec 13 02:24:18.412000 audit[3009]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3009 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.412000 audit[3009]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdc26fbda0 a2=0 a3=7ffdc26fbd8c items=0 ppid=2876 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.412000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Dec 13 02:24:18.414000 audit[3010]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3010 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.414000 audit[3010]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc639a7bb0 a2=0 a3=7ffc639a7b9c items=0 ppid=2876 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.414000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Dec 13 02:24:18.417000 audit[3012]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3012 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.417000 audit[3012]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe06c71d00 a2=0 a3=7ffe06c71cec items=0 ppid=2876 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.417000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245
Dec 13 02:24:18.422000 audit[3015]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3015 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.422000 audit[3015]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc38126f60 a2=0 a3=7ffc38126f4c items=0 ppid=2876 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.422000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Dec 13 02:24:18.423000 audit[3016]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3016 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.423000 audit[3016]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffde0d3a60 a2=0 a3=7fffde0d3a4c items=0 ppid=2876 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.423000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Dec 13 02:24:18.428000 audit[3018]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3018 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.428000 audit[3018]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff774888b0 a2=0 a3=7fff7748889c items=0 ppid=2876 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.428000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Dec 13 02:24:18.430000 audit[3019]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3019 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.430000 audit[3019]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc26d3f610 a2=0 a3=7ffc26d3f5fc items=0 ppid=2876 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.430000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Dec 13 02:24:18.433000 audit[3021]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3021 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.433000 audit[3021]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffecc55bbb0 a2=0 a3=7ffecc55bb9c items=0 ppid=2876 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Dec 13 02:24:18.439000 audit[3024]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3024 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.439000 audit[3024]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd3d4d7480 a2=0 a3=7ffd3d4d746c items=0 ppid=2876 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Dec 13 02:24:18.444000 audit[3027]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3027 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.444000 audit[3027]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe832e4cd0 a2=0 a3=7ffe832e4cbc items=0 ppid=2876 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.444000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C
Dec 13 02:24:18.446000 audit[3028]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3028 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.446000 audit[3028]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffece62e690 a2=0 a3=7ffece62e67c items=0 ppid=2876 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.446000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Dec 13 02:24:18.449000 audit[3030]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3030 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.449000 audit[3030]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffee07a1340 a2=0 a3=7ffee07a132c items=0 ppid=2876 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Dec 13 02:24:18.454000 audit[3033]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3033 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.454000 audit[3033]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc1bd70d60 a2=0 a3=7ffc1bd70d4c items=0 ppid=2876 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.454000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Dec 13 02:24:18.456000 audit[3034]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3034 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.456000 audit[3034]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef318ab80 a2=0 a3=7ffef318ab6c items=0 ppid=2876 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.456000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Dec 13 02:24:18.458000 audit[3036]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3036 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.458000 audit[3036]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcbd8ba6d0 a2=0 a3=7ffcbd8ba6bc items=0 ppid=2876 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.458000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Dec 13 02:24:18.460000 audit[3037]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3037 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.460000 audit[3037]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee7fd6e80 a2=0 a3=7ffee7fd6e6c items=0 ppid=2876 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.460000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Dec 13 02:24:18.464000 audit[3039]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3039 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.464000 audit[3039]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffebe6e7360 a2=0 a3=7ffebe6e734c items=0 ppid=2876 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.464000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Dec 13 02:24:18.468000 audit[3042]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3042 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:24:18.468000 audit[3042]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffff907b540 a2=0 a3=7ffff907b52c items=0 ppid=2876 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.468000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Dec 13 02:24:18.475000 audit[3044]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3044 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Dec 13 02:24:18.475000 audit[3044]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff23949df0 a2=0 a3=7fff23949ddc items=0 ppid=2876 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.475000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:18.476000 audit[3044]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3044 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Dec 13 02:24:18.476000 audit[3044]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff23949df0 a2=0 a3=7fff23949ddc items=0 ppid=2876 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:18.476000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:18.831327 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount346998425.mount: Deactivated successfully.
Dec 13 02:24:19.717369 env[1728]: time="2024-12-13T02:24:19.717315779Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:19.728617 env[1728]: time="2024-12-13T02:24:19.728569919Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:19.740521 env[1728]: time="2024-12-13T02:24:19.737935499Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:19.741702 env[1728]: time="2024-12-13T02:24:19.741659646Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:19.742604 env[1728]: time="2024-12-13T02:24:19.742563918Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\""
Dec 13 02:24:19.750254 env[1728]: time="2024-12-13T02:24:19.750211875Z" level=info msg="CreateContainer within sandbox \"e6ab6c94821a6fc4dd20090004c5836a34a8e6bb15c06c26d592e1de8a1c4220\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}"
Dec 13 02:24:19.773067 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2204730802.mount: Deactivated successfully.
Dec 13 02:24:19.785400 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount635622709.mount: Deactivated successfully.
Dec 13 02:24:19.799486 env[1728]: time="2024-12-13T02:24:19.799407093Z" level=info msg="CreateContainer within sandbox \"e6ab6c94821a6fc4dd20090004c5836a34a8e6bb15c06c26d592e1de8a1c4220\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"62d08311b598f0a00ada6bec0ff74cc753abfce4b93e6ca58fdb60200172eeb1\""
Dec 13 02:24:19.802531 env[1728]: time="2024-12-13T02:24:19.801299615Z" level=info msg="StartContainer for \"62d08311b598f0a00ada6bec0ff74cc753abfce4b93e6ca58fdb60200172eeb1\""
Dec 13 02:24:19.842179 systemd[1]: Started cri-containerd-62d08311b598f0a00ada6bec0ff74cc753abfce4b93e6ca58fdb60200172eeb1.scope.
Dec 13 02:24:19.866000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.866000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.866000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.866000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.866000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.866000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.866000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.866000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.866000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.866000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.866000 audit: BPF prog-id=114 op=LOAD
Dec 13 02:24:19.867000 audit[3052]: AVC avc:  denied  { bpf } for  pid=3052 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.867000 audit[3052]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2825 pid=3052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:19.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632643038333131623539386630613030616461366265633066663734
Dec 13 02:24:19.868000 audit[3052]: AVC avc:  denied  { perfmon } for  pid=3052 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.868000 audit[3052]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2825 pid=3052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:19.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632643038333131623539386630613030616461366265633066663734
Dec 13 02:24:19.868000 audit[3052]: AVC avc:  denied  { bpf } for  pid=3052 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.868000 audit[3052]: AVC avc:  denied  { bpf } for  pid=3052 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.868000 audit[3052]: AVC avc:  denied  { bpf } for  pid=3052 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.868000 audit[3052]: AVC avc:  denied  { perfmon } for  pid=3052 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.868000 audit[3052]: AVC avc:  denied  { perfmon } for  pid=3052 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.868000 audit[3052]: AVC avc:  denied  { perfmon } for  pid=3052 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.868000 audit[3052]: AVC avc:  denied  { perfmon } for  pid=3052 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.868000 audit[3052]: AVC avc:  denied  { perfmon } for  pid=3052 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.868000 audit[3052]: AVC avc:  denied  { bpf } for  pid=3052 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.868000 audit[3052]: AVC avc:  denied  { bpf } for  pid=3052 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.868000 audit: BPF prog-id=115 op=LOAD
Dec 13 02:24:19.868000 audit[3052]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000af380 items=0 ppid=2825 pid=3052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:19.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632643038333131623539386630613030616461366265633066663734
Dec 13 02:24:19.869000 audit[3052]: AVC avc:  denied  { bpf } for  pid=3052 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.869000 audit[3052]: AVC avc:  denied  { bpf } for  pid=3052 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.869000 audit[3052]: AVC avc:  denied  { perfmon } for  pid=3052 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.869000 audit[3052]: AVC avc:  denied  { perfmon } for  pid=3052 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.869000 audit[3052]: AVC avc:  denied  { perfmon } for  pid=3052 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.869000 audit[3052]: AVC avc:  denied  { perfmon } for  pid=3052 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.869000 audit[3052]: AVC avc:  denied  { perfmon } for  pid=3052 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.869000 audit[3052]: AVC avc:  denied  { bpf } for  pid=3052 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.869000 audit[3052]: AVC avc:  denied  { bpf } for  pid=3052 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.869000 audit: BPF prog-id=116 op=LOAD
Dec 13 02:24:19.869000 audit[3052]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000af3c8 items=0 ppid=2825 pid=3052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:19.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632643038333131623539386630613030616461366265633066663734
Dec 13 02:24:19.869000 audit: BPF prog-id=116 op=UNLOAD
Dec 13 02:24:19.869000 audit: BPF prog-id=115 op=UNLOAD
Dec 13 02:24:19.869000 audit[3052]: AVC avc:  denied  { bpf } for  pid=3052 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.869000 audit[3052]: AVC avc:  denied  { bpf } for  pid=3052 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.869000 audit[3052]: AVC avc:  denied  { bpf } for  pid=3052 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.869000 audit[3052]: AVC avc:  denied  { perfmon } for  pid=3052 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.869000 audit[3052]: AVC avc:  denied  { perfmon } for  pid=3052 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.869000 audit[3052]: AVC avc:  denied  { perfmon } for  pid=3052 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.869000 audit[3052]: AVC avc:  denied  { perfmon } for  pid=3052 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.869000 audit[3052]: AVC avc:  denied  { perfmon } for  pid=3052 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.869000 audit[3052]: AVC avc:  denied  { bpf } for  pid=3052 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.869000 audit[3052]: AVC avc:  denied  { bpf } for  pid=3052 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:19.869000 audit: BPF prog-id=117 op=LOAD
Dec 13 02:24:19.869000 audit[3052]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000af7d8 items=0 ppid=2825 pid=3052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:19.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632643038333131623539386630613030616461366265633066663734
Dec 13 02:24:19.893543 env[1728]: time="2024-12-13T02:24:19.893069325Z" level=info msg="StartContainer for \"62d08311b598f0a00ada6bec0ff74cc753abfce4b93e6ca58fdb60200172eeb1\" returns successfully"
Dec 13 02:24:20.115065 kubelet[2727]: I1213 02:24:20.114985    2727 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-t4frv" podStartSLOduration=4.114959454 podStartE2EDuration="4.114959454s" podCreationTimestamp="2024-12-13 02:24:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:24:18.10264414 +0000 UTC m=+6.478466576" watchObservedRunningTime="2024-12-13 02:24:20.114959454 +0000 UTC m=+8.490781894"
Dec 13 02:24:21.921933 kubelet[2727]: I1213 02:24:21.921831    2727 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4976dd7-zn4h6" podStartSLOduration=3.489915028 podStartE2EDuration="5.921789478s" podCreationTimestamp="2024-12-13 02:24:16 +0000 UTC" firstStartedPulling="2024-12-13 02:24:17.312671297 +0000 UTC m=+5.688493710" lastFinishedPulling="2024-12-13 02:24:19.744545733 +0000 UTC m=+8.120368160" observedRunningTime="2024-12-13 02:24:20.116920842 +0000 UTC m=+8.492743278" watchObservedRunningTime="2024-12-13 02:24:21.921789478 +0000 UTC m=+10.297611912"
Dec 13 02:24:23.300944 kernel: kauditd_printk_skb: 362 callbacks suppressed
Dec 13 02:24:23.301142 kernel: audit: type=1325 audit(1734056663.290:943): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3087 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:23.301210 kernel: audit: type=1300 audit(1734056663.290:943): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcaeb7a5f0 a2=0 a3=7ffcaeb7a5dc items=0 ppid=2876 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:23.290000 audit[3087]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3087 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:23.290000 audit[3087]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcaeb7a5f0 a2=0 a3=7ffcaeb7a5dc items=0 ppid=2876 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:23.290000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:23.305176 kernel: audit: type=1327 audit(1734056663.290:943): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:23.310000 audit[3087]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3087 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:23.310000 audit[3087]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcaeb7a5f0 a2=0 a3=0 items=0 ppid=2876 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:23.319264 kernel: audit: type=1325 audit(1734056663.310:944): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3087 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:23.319404 kernel: audit: type=1300 audit(1734056663.310:944): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcaeb7a5f0 a2=0 a3=0 items=0 ppid=2876 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:23.310000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:23.323181 kernel: audit: type=1327 audit(1734056663.310:944): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:23.341000 audit[3089]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3089 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:23.346183 kernel: audit: type=1325 audit(1734056663.341:945): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3089 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:23.355316 kernel: audit: type=1300 audit(1734056663.341:945): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffef27f2260 a2=0 a3=7ffef27f224c items=0 ppid=2876 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:23.355469 kernel: audit: type=1327 audit(1734056663.341:945): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:23.341000 audit[3089]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffef27f2260 a2=0 a3=7ffef27f224c items=0 ppid=2876 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:23.341000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:23.356000 audit[3089]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3089 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:23.356000 audit[3089]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffef27f2260 a2=0 a3=0 items=0 ppid=2876 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:23.356000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:23.361181 kernel: audit: type=1325 audit(1734056663.356:946): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3089 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:23.568506 systemd[1]: Created slice kubepods-besteffort-pod23afd315_c19a_4938_8320_784e5e6f40aa.slice.
Dec 13 02:24:23.663563 kubelet[2727]: I1213 02:24:23.663430    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/23afd315-c19a-4938-8320-784e5e6f40aa-typha-certs\") pod \"calico-typha-7646875947-vlsg6\" (UID: \"23afd315-c19a-4938-8320-784e5e6f40aa\") " pod="calico-system/calico-typha-7646875947-vlsg6"
Dec 13 02:24:23.664276 kubelet[2727]: I1213 02:24:23.664252    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/23afd315-c19a-4938-8320-784e5e6f40aa-tigera-ca-bundle\") pod \"calico-typha-7646875947-vlsg6\" (UID: \"23afd315-c19a-4938-8320-784e5e6f40aa\") " pod="calico-system/calico-typha-7646875947-vlsg6"
Dec 13 02:24:23.664413 kubelet[2727]: I1213 02:24:23.664396    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fgq4d\" (UniqueName: \"kubernetes.io/projected/23afd315-c19a-4938-8320-784e5e6f40aa-kube-api-access-fgq4d\") pod \"calico-typha-7646875947-vlsg6\" (UID: \"23afd315-c19a-4938-8320-784e5e6f40aa\") " pod="calico-system/calico-typha-7646875947-vlsg6"
Dec 13 02:24:23.719965 systemd[1]: Created slice kubepods-besteffort-pod16710728_0edb_4fe1_9afd_444c5bb8dc10.slice.
Dec 13 02:24:23.866137 kubelet[2727]: I1213 02:24:23.866014    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/16710728-0edb-4fe1-9afd-444c5bb8dc10-var-lib-calico\") pod \"calico-node-8tvz9\" (UID: \"16710728-0edb-4fe1-9afd-444c5bb8dc10\") " pod="calico-system/calico-node-8tvz9"
Dec 13 02:24:23.866373 kubelet[2727]: I1213 02:24:23.866346    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dmd52\" (UniqueName: \"kubernetes.io/projected/16710728-0edb-4fe1-9afd-444c5bb8dc10-kube-api-access-dmd52\") pod \"calico-node-8tvz9\" (UID: \"16710728-0edb-4fe1-9afd-444c5bb8dc10\") " pod="calico-system/calico-node-8tvz9"
Dec 13 02:24:23.866543 kubelet[2727]: I1213 02:24:23.866526    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/16710728-0edb-4fe1-9afd-444c5bb8dc10-var-run-calico\") pod \"calico-node-8tvz9\" (UID: \"16710728-0edb-4fe1-9afd-444c5bb8dc10\") " pod="calico-system/calico-node-8tvz9"
Dec 13 02:24:23.866689 kubelet[2727]: I1213 02:24:23.866672    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/16710728-0edb-4fe1-9afd-444c5bb8dc10-lib-modules\") pod \"calico-node-8tvz9\" (UID: \"16710728-0edb-4fe1-9afd-444c5bb8dc10\") " pod="calico-system/calico-node-8tvz9"
Dec 13 02:24:23.866812 kubelet[2727]: I1213 02:24:23.866797    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/16710728-0edb-4fe1-9afd-444c5bb8dc10-cni-log-dir\") pod \"calico-node-8tvz9\" (UID: \"16710728-0edb-4fe1-9afd-444c5bb8dc10\") " pod="calico-system/calico-node-8tvz9"
Dec 13 02:24:23.866912 kubelet[2727]: I1213 02:24:23.866898    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/16710728-0edb-4fe1-9afd-444c5bb8dc10-xtables-lock\") pod \"calico-node-8tvz9\" (UID: \"16710728-0edb-4fe1-9afd-444c5bb8dc10\") " pod="calico-system/calico-node-8tvz9"
Dec 13 02:24:23.867110 kubelet[2727]: I1213 02:24:23.866999    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/16710728-0edb-4fe1-9afd-444c5bb8dc10-flexvol-driver-host\") pod \"calico-node-8tvz9\" (UID: \"16710728-0edb-4fe1-9afd-444c5bb8dc10\") " pod="calico-system/calico-node-8tvz9"
Dec 13 02:24:23.867256 kubelet[2727]: I1213 02:24:23.867240    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/16710728-0edb-4fe1-9afd-444c5bb8dc10-policysync\") pod \"calico-node-8tvz9\" (UID: \"16710728-0edb-4fe1-9afd-444c5bb8dc10\") " pod="calico-system/calico-node-8tvz9"
Dec 13 02:24:23.867350 kubelet[2727]: I1213 02:24:23.867336    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/16710728-0edb-4fe1-9afd-444c5bb8dc10-tigera-ca-bundle\") pod \"calico-node-8tvz9\" (UID: \"16710728-0edb-4fe1-9afd-444c5bb8dc10\") " pod="calico-system/calico-node-8tvz9"
Dec 13 02:24:23.867438 kubelet[2727]: I1213 02:24:23.867422    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/16710728-0edb-4fe1-9afd-444c5bb8dc10-node-certs\") pod \"calico-node-8tvz9\" (UID: \"16710728-0edb-4fe1-9afd-444c5bb8dc10\") " pod="calico-system/calico-node-8tvz9"
Dec 13 02:24:23.867528 kubelet[2727]: I1213 02:24:23.867515    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/16710728-0edb-4fe1-9afd-444c5bb8dc10-cni-bin-dir\") pod \"calico-node-8tvz9\" (UID: \"16710728-0edb-4fe1-9afd-444c5bb8dc10\") " pod="calico-system/calico-node-8tvz9"
Dec 13 02:24:23.867753 kubelet[2727]: I1213 02:24:23.867722    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/16710728-0edb-4fe1-9afd-444c5bb8dc10-cni-net-dir\") pod \"calico-node-8tvz9\" (UID: \"16710728-0edb-4fe1-9afd-444c5bb8dc10\") " pod="calico-system/calico-node-8tvz9"
Dec 13 02:24:23.876227 env[1728]: time="2024-12-13T02:24:23.876176249Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7646875947-vlsg6,Uid:23afd315-c19a-4938-8320-784e5e6f40aa,Namespace:calico-system,Attempt:0,}"
Dec 13 02:24:23.877611 kubelet[2727]: E1213 02:24:23.877547    2727 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qcbrg" podUID="a3fa05f4-3a10-4b1c-869c-713b8a907f16"
Dec 13 02:24:23.920070 env[1728]: time="2024-12-13T02:24:23.919988599Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 02:24:23.920640 env[1728]: time="2024-12-13T02:24:23.920127510Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 02:24:23.920771 env[1728]: time="2024-12-13T02:24:23.920671319Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 02:24:23.921023 env[1728]: time="2024-12-13T02:24:23.920975991Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c4ac80bde30c4dce6e2c3ef727e24bfebe40428dd70155044b10971267049837 pid=3098 runtime=io.containerd.runc.v2
Dec 13 02:24:23.970531 systemd[1]: Started cri-containerd-c4ac80bde30c4dce6e2c3ef727e24bfebe40428dd70155044b10971267049837.scope.
Dec 13 02:24:23.977942 kubelet[2727]: E1213 02:24:23.977899    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:23.977942 kubelet[2727]: W1213 02:24:23.977939    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:23.978378 kubelet[2727]: E1213 02:24:23.977971    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:23.978467 kubelet[2727]: E1213 02:24:23.978428    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:23.978467 kubelet[2727]: W1213 02:24:23.978459    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:23.979691 kubelet[2727]: E1213 02:24:23.978574    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:23.979691 kubelet[2727]: E1213 02:24:23.978752    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:23.979691 kubelet[2727]: W1213 02:24:23.978760    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:23.979691 kubelet[2727]: E1213 02:24:23.978855    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:23.979691 kubelet[2727]: E1213 02:24:23.979017    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:23.979691 kubelet[2727]: W1213 02:24:23.979026    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:23.979691 kubelet[2727]: E1213 02:24:23.979108    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:23.979691 kubelet[2727]: E1213 02:24:23.979292    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:23.979691 kubelet[2727]: W1213 02:24:23.979301    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:23.979691 kubelet[2727]: E1213 02:24:23.979324    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:23.981736 kubelet[2727]: E1213 02:24:23.979598    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:23.981736 kubelet[2727]: W1213 02:24:23.979609    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:23.981736 kubelet[2727]: E1213 02:24:23.979627    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:23.982382 kubelet[2727]: E1213 02:24:23.982365    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:23.982542 kubelet[2727]: W1213 02:24:23.982527    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:23.982689 kubelet[2727]: E1213 02:24:23.982648    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:23.983202 kubelet[2727]: E1213 02:24:23.983133    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:23.983339 kubelet[2727]: W1213 02:24:23.983323    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:23.983503 kubelet[2727]: E1213 02:24:23.983488    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:23.990362 kubelet[2727]: E1213 02:24:23.990332    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:23.990636 kubelet[2727]: W1213 02:24:23.990612    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:23.990786 kubelet[2727]: E1213 02:24:23.990764    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:23.993930 kubelet[2727]: E1213 02:24:23.993904    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:23.994088 kubelet[2727]: W1213 02:24:23.994072    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:23.994208 kubelet[2727]: E1213 02:24:23.994192    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.011000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.011000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.011000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.011000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.011000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.012000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.012000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.012000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.012000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.012000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.012000 audit: BPF prog-id=118 op=LOAD
Dec 13 02:24:24.013000 audit[3107]: AVC avc:  denied  { bpf } for  pid=3107 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.013000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=3098 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:24.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334616338306264653330633464636536653263336566373237653234
Dec 13 02:24:24.013000 audit[3107]: AVC avc:  denied  { perfmon } for  pid=3107 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.013000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=3098 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:24.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334616338306264653330633464636536653263336566373237653234
Dec 13 02:24:24.013000 audit[3107]: AVC avc:  denied  { bpf } for  pid=3107 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.013000 audit[3107]: AVC avc:  denied  { bpf } for  pid=3107 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.013000 audit[3107]: AVC avc:  denied  { bpf } for  pid=3107 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.013000 audit[3107]: AVC avc:  denied  { perfmon } for  pid=3107 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.013000 audit[3107]: AVC avc:  denied  { perfmon } for  pid=3107 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.013000 audit[3107]: AVC avc:  denied  { perfmon } for  pid=3107 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.013000 audit[3107]: AVC avc:  denied  { perfmon } for  pid=3107 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.013000 audit[3107]: AVC avc:  denied  { perfmon } for  pid=3107 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.013000 audit[3107]: AVC avc:  denied  { bpf } for  pid=3107 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.013000 audit[3107]: AVC avc:  denied  { bpf } for  pid=3107 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.013000 audit: BPF prog-id=119 op=LOAD
Dec 13 02:24:24.013000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000298de0 items=0 ppid=3098 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:24.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334616338306264653330633464636536653263336566373237653234
Dec 13 02:24:24.013000 audit[3107]: AVC avc:  denied  { bpf } for  pid=3107 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.013000 audit[3107]: AVC avc:  denied  { bpf } for  pid=3107 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.013000 audit[3107]: AVC avc:  denied  { perfmon } for  pid=3107 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.013000 audit[3107]: AVC avc:  denied  { perfmon } for  pid=3107 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.013000 audit[3107]: AVC avc:  denied  { perfmon } for  pid=3107 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.013000 audit[3107]: AVC avc:  denied  { perfmon } for  pid=3107 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.013000 audit[3107]: AVC avc:  denied  { perfmon } for  pid=3107 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.013000 audit[3107]: AVC avc:  denied  { bpf } for  pid=3107 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.013000 audit[3107]: AVC avc:  denied  { bpf } for  pid=3107 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.013000 audit: BPF prog-id=120 op=LOAD
Dec 13 02:24:24.013000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000298e28 items=0 ppid=3098 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:24.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334616338306264653330633464636536653263336566373237653234
Dec 13 02:24:24.014000 audit: BPF prog-id=120 op=UNLOAD
Dec 13 02:24:24.014000 audit: BPF prog-id=119 op=UNLOAD
Dec 13 02:24:24.014000 audit[3107]: AVC avc:  denied  { bpf } for  pid=3107 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.014000 audit[3107]: AVC avc:  denied  { bpf } for  pid=3107 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.014000 audit[3107]: AVC avc:  denied  { bpf } for  pid=3107 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.014000 audit[3107]: AVC avc:  denied  { perfmon } for  pid=3107 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.014000 audit[3107]: AVC avc:  denied  { perfmon } for  pid=3107 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.014000 audit[3107]: AVC avc:  denied  { perfmon } for  pid=3107 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.014000 audit[3107]: AVC avc:  denied  { perfmon } for  pid=3107 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.014000 audit[3107]: AVC avc:  denied  { perfmon } for  pid=3107 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.014000 audit[3107]: AVC avc:  denied  { bpf } for  pid=3107 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.014000 audit[3107]: AVC avc:  denied  { bpf } for  pid=3107 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.014000 audit: BPF prog-id=121 op=LOAD
Dec 13 02:24:24.014000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c000299238 items=0 ppid=3098 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:24.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334616338306264653330633464636536653263336566373237653234
Dec 13 02:24:24.028892 kubelet[2727]: E1213 02:24:24.028868    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.029238 kubelet[2727]: W1213 02:24:24.029222    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.029399 kubelet[2727]: E1213 02:24:24.029383    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.076425 kubelet[2727]: E1213 02:24:24.076395    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.076642 kubelet[2727]: W1213 02:24:24.076626    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.076754 kubelet[2727]: E1213 02:24:24.076738    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.076855 kubelet[2727]: I1213 02:24:24.076840    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/a3fa05f4-3a10-4b1c-869c-713b8a907f16-kubelet-dir\") pod \"csi-node-driver-qcbrg\" (UID: \"a3fa05f4-3a10-4b1c-869c-713b8a907f16\") " pod="calico-system/csi-node-driver-qcbrg"
Dec 13 02:24:24.077413 kubelet[2727]: E1213 02:24:24.077395    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.077615 kubelet[2727]: W1213 02:24:24.077598    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.078110 kubelet[2727]: E1213 02:24:24.077698    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.078352 kubelet[2727]: E1213 02:24:24.078340    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.078450 kubelet[2727]: W1213 02:24:24.078437    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.078689 kubelet[2727]: E1213 02:24:24.078672    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.079017 kubelet[2727]: E1213 02:24:24.079006    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.079117 kubelet[2727]: W1213 02:24:24.079106    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.079223 kubelet[2727]: E1213 02:24:24.079211    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.079479 kubelet[2727]: I1213 02:24:24.079315    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/a3fa05f4-3a10-4b1c-869c-713b8a907f16-registration-dir\") pod \"csi-node-driver-qcbrg\" (UID: \"a3fa05f4-3a10-4b1c-869c-713b8a907f16\") " pod="calico-system/csi-node-driver-qcbrg"
Dec 13 02:24:24.079816 kubelet[2727]: E1213 02:24:24.079792    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.079932 kubelet[2727]: W1213 02:24:24.079921    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.080008 kubelet[2727]: E1213 02:24:24.079998    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.080539 kubelet[2727]: E1213 02:24:24.080524    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.080677 kubelet[2727]: W1213 02:24:24.080662    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.080776 kubelet[2727]: E1213 02:24:24.080764    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.081119 kubelet[2727]: I1213 02:24:24.081095    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tzjr8\" (UniqueName: \"kubernetes.io/projected/a3fa05f4-3a10-4b1c-869c-713b8a907f16-kube-api-access-tzjr8\") pod \"csi-node-driver-qcbrg\" (UID: \"a3fa05f4-3a10-4b1c-869c-713b8a907f16\") " pod="calico-system/csi-node-driver-qcbrg"
Dec 13 02:24:24.081355 kubelet[2727]: E1213 02:24:24.081334    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.081470 kubelet[2727]: W1213 02:24:24.081458    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.081552 kubelet[2727]: E1213 02:24:24.081541    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.082088 kubelet[2727]: E1213 02:24:24.082073    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.082345 kubelet[2727]: W1213 02:24:24.082330    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.082483 kubelet[2727]: E1213 02:24:24.082470    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.082810 kubelet[2727]: I1213 02:24:24.082793    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/a3fa05f4-3a10-4b1c-869c-713b8a907f16-varrun\") pod \"csi-node-driver-qcbrg\" (UID: \"a3fa05f4-3a10-4b1c-869c-713b8a907f16\") " pod="calico-system/csi-node-driver-qcbrg"
Dec 13 02:24:24.083329 kubelet[2727]: E1213 02:24:24.083234    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.083452 kubelet[2727]: W1213 02:24:24.083440    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.084757 kubelet[2727]: E1213 02:24:24.084739    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.086108 kubelet[2727]: E1213 02:24:24.086088    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.086552 kubelet[2727]: W1213 02:24:24.086503    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.087330 kubelet[2727]: E1213 02:24:24.086641    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.088605 kubelet[2727]: E1213 02:24:24.088584    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.090291 kubelet[2727]: W1213 02:24:24.089201    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.090291 kubelet[2727]: E1213 02:24:24.089225    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.090291 kubelet[2727]: I1213 02:24:24.089262    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/a3fa05f4-3a10-4b1c-869c-713b8a907f16-socket-dir\") pod \"csi-node-driver-qcbrg\" (UID: \"a3fa05f4-3a10-4b1c-869c-713b8a907f16\") " pod="calico-system/csi-node-driver-qcbrg"
Dec 13 02:24:24.091772 kubelet[2727]: E1213 02:24:24.090563    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.091772 kubelet[2727]: W1213 02:24:24.090577    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.091772 kubelet[2727]: E1213 02:24:24.090594    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.091772 kubelet[2727]: E1213 02:24:24.091582    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.091772 kubelet[2727]: W1213 02:24:24.091599    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.091772 kubelet[2727]: E1213 02:24:24.091620    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.097421 kubelet[2727]: E1213 02:24:24.091997    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.097421 kubelet[2727]: W1213 02:24:24.092007    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.097421 kubelet[2727]: E1213 02:24:24.092112    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.097421 kubelet[2727]: E1213 02:24:24.092736    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.097421 kubelet[2727]: W1213 02:24:24.092748    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.097421 kubelet[2727]: E1213 02:24:24.092975    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.108030 env[1728]: time="2024-12-13T02:24:24.107976314Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7646875947-vlsg6,Uid:23afd315-c19a-4938-8320-784e5e6f40aa,Namespace:calico-system,Attempt:0,} returns sandbox id \"c4ac80bde30c4dce6e2c3ef727e24bfebe40428dd70155044b10971267049837\""
Dec 13 02:24:24.112702 env[1728]: time="2024-12-13T02:24:24.112647196Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\""
Dec 13 02:24:24.191962 kubelet[2727]: E1213 02:24:24.191860    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.191962 kubelet[2727]: W1213 02:24:24.191884    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.191962 kubelet[2727]: E1213 02:24:24.191907    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.192420 kubelet[2727]: E1213 02:24:24.192406    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.192554 kubelet[2727]: W1213 02:24:24.192535    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.192664 kubelet[2727]: E1213 02:24:24.192651    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.193193 kubelet[2727]: E1213 02:24:24.193163    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.193996 kubelet[2727]: W1213 02:24:24.193977    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.194105 kubelet[2727]: E1213 02:24:24.194092    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.194561 kubelet[2727]: E1213 02:24:24.194549    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.194777 kubelet[2727]: W1213 02:24:24.194761    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.194956 kubelet[2727]: E1213 02:24:24.194942    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.195255 kubelet[2727]: E1213 02:24:24.195244    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.195354 kubelet[2727]: W1213 02:24:24.195342    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.195515 kubelet[2727]: E1213 02:24:24.195502    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.195732 kubelet[2727]: E1213 02:24:24.195722    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.195818 kubelet[2727]: W1213 02:24:24.195807    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.195971 kubelet[2727]: E1213 02:24:24.195958    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.196218 kubelet[2727]: E1213 02:24:24.196207    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.196318 kubelet[2727]: W1213 02:24:24.196306    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.196472 kubelet[2727]: E1213 02:24:24.196460    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.196691 kubelet[2727]: E1213 02:24:24.196670    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.196778 kubelet[2727]: W1213 02:24:24.196767    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.196991 kubelet[2727]: E1213 02:24:24.196979    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.197416 kubelet[2727]: E1213 02:24:24.197404    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.197527 kubelet[2727]: W1213 02:24:24.197515    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.197663 kubelet[2727]: E1213 02:24:24.197650    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.197976 kubelet[2727]: E1213 02:24:24.197963    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.198077 kubelet[2727]: W1213 02:24:24.198066    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.198265 kubelet[2727]: E1213 02:24:24.198251    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.198488 kubelet[2727]: E1213 02:24:24.198478    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.198643 kubelet[2727]: W1213 02:24:24.198629    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.198809 kubelet[2727]: E1213 02:24:24.198794    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.199021 kubelet[2727]: E1213 02:24:24.199011    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.199107 kubelet[2727]: W1213 02:24:24.199095    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.199310 kubelet[2727]: E1213 02:24:24.199298    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.199528 kubelet[2727]: E1213 02:24:24.199518    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.199612 kubelet[2727]: W1213 02:24:24.199601    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.199856 kubelet[2727]: E1213 02:24:24.199841    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.200099 kubelet[2727]: E1213 02:24:24.200089    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.200241 kubelet[2727]: W1213 02:24:24.200229    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.200409 kubelet[2727]: E1213 02:24:24.200396    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.200722 kubelet[2727]: E1213 02:24:24.200710    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.200829 kubelet[2727]: W1213 02:24:24.200815    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.201004 kubelet[2727]: E1213 02:24:24.200991    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.201978 kubelet[2727]: E1213 02:24:24.201964    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.202087 kubelet[2727]: W1213 02:24:24.202073    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.202266 kubelet[2727]: E1213 02:24:24.202252    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.203842 kubelet[2727]: E1213 02:24:24.203827    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.204078 kubelet[2727]: W1213 02:24:24.204037    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.204333 kubelet[2727]: E1213 02:24:24.204318    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.204596 kubelet[2727]: E1213 02:24:24.204586    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.204698 kubelet[2727]: W1213 02:24:24.204677    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.204877 kubelet[2727]: E1213 02:24:24.204864    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.205089 kubelet[2727]: E1213 02:24:24.205079    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.206004 kubelet[2727]: W1213 02:24:24.205988    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.206277 kubelet[2727]: E1213 02:24:24.206260    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.206551 kubelet[2727]: E1213 02:24:24.206539    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.206751 kubelet[2727]: W1213 02:24:24.206704    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.206953 kubelet[2727]: E1213 02:24:24.206939    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.207257 kubelet[2727]: E1213 02:24:24.207245    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.207348 kubelet[2727]: W1213 02:24:24.207335    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.207521 kubelet[2727]: E1213 02:24:24.207509    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.207757 kubelet[2727]: E1213 02:24:24.207745    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.207850 kubelet[2727]: W1213 02:24:24.207838    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.208019 kubelet[2727]: E1213 02:24:24.208005    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.210367 kubelet[2727]: E1213 02:24:24.209230    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.210367 kubelet[2727]: W1213 02:24:24.209246    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.210588 kubelet[2727]: E1213 02:24:24.210573    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.210861 kubelet[2727]: E1213 02:24:24.210848    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.210962 kubelet[2727]: W1213 02:24:24.210949    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.211075 kubelet[2727]: E1213 02:24:24.211060    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.211467 kubelet[2727]: E1213 02:24:24.211454    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.211572 kubelet[2727]: W1213 02:24:24.211560    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.211653 kubelet[2727]: E1213 02:24:24.211641    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.228852 kubelet[2727]: E1213 02:24:24.228245    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:24.228852 kubelet[2727]: W1213 02:24:24.228280    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:24.228852 kubelet[2727]: E1213 02:24:24.228304    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:24.324620 env[1728]: time="2024-12-13T02:24:24.324570811Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8tvz9,Uid:16710728-0edb-4fe1-9afd-444c5bb8dc10,Namespace:calico-system,Attempt:0,}"
Dec 13 02:24:24.354099 env[1728]: time="2024-12-13T02:24:24.354016166Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 02:24:24.354376 env[1728]: time="2024-12-13T02:24:24.354114213Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 02:24:24.354376 env[1728]: time="2024-12-13T02:24:24.354242271Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 02:24:24.354484 env[1728]: time="2024-12-13T02:24:24.354415221Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0b629e820bfae74ba4ae8757d001ecad4bb1c39d4a3ab1b43136896d06124b63 pid=3195 runtime=io.containerd.runc.v2
Dec 13 02:24:24.372292 systemd[1]: Started cri-containerd-0b629e820bfae74ba4ae8757d001ecad4bb1c39d4a3ab1b43136896d06124b63.scope.
Dec 13 02:24:24.424000 audit[3223]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=3223 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:24.424000 audit[3223]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd8f551460 a2=0 a3=7ffd8f55144c items=0 ppid=2876 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:24.424000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:24.427000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.427000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.427000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.427000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.427000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.427000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.427000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.427000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.427000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.428000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.428000 audit: BPF prog-id=122 op=LOAD
Dec 13 02:24:24.429000 audit[3206]: AVC avc:  denied  { bpf } for  pid=3206 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.429000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3195 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:24.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062363239653832306266616537346261346165383735376430303165
Dec 13 02:24:24.429000 audit[3206]: AVC avc:  denied  { perfmon } for  pid=3206 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.429000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3195 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:24.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062363239653832306266616537346261346165383735376430303165
Dec 13 02:24:24.429000 audit[3206]: AVC avc:  denied  { bpf } for  pid=3206 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.429000 audit[3206]: AVC avc:  denied  { bpf } for  pid=3206 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.429000 audit[3206]: AVC avc:  denied  { bpf } for  pid=3206 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.429000 audit[3206]: AVC avc:  denied  { perfmon } for  pid=3206 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.429000 audit[3206]: AVC avc:  denied  { perfmon } for  pid=3206 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.429000 audit[3206]: AVC avc:  denied  { perfmon } for  pid=3206 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.429000 audit[3206]: AVC avc:  denied  { perfmon } for  pid=3206 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.429000 audit[3206]: AVC avc:  denied  { perfmon } for  pid=3206 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.429000 audit[3206]: AVC avc:  denied  { bpf } for  pid=3206 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.429000 audit[3206]: AVC avc:  denied  { bpf } for  pid=3206 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.429000 audit: BPF prog-id=123 op=LOAD
Dec 13 02:24:24.430000 audit[3223]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3223 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:24.430000 audit[3223]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd8f551460 a2=0 a3=0 items=0 ppid=2876 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:24.430000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:24.429000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025130 items=0 ppid=3195 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:24.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062363239653832306266616537346261346165383735376430303165
Dec 13 02:24:24.431000 audit[3206]: AVC avc:  denied  { bpf } for  pid=3206 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.431000 audit[3206]: AVC avc:  denied  { bpf } for  pid=3206 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.431000 audit[3206]: AVC avc:  denied  { perfmon } for  pid=3206 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.431000 audit[3206]: AVC avc:  denied  { perfmon } for  pid=3206 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.431000 audit[3206]: AVC avc:  denied  { perfmon } for  pid=3206 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.431000 audit[3206]: AVC avc:  denied  { perfmon } for  pid=3206 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.431000 audit[3206]: AVC avc:  denied  { perfmon } for  pid=3206 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.431000 audit[3206]: AVC avc:  denied  { bpf } for  pid=3206 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.431000 audit[3206]: AVC avc:  denied  { bpf } for  pid=3206 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.431000 audit: BPF prog-id=124 op=LOAD
Dec 13 02:24:24.431000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025178 items=0 ppid=3195 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:24.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062363239653832306266616537346261346165383735376430303165
Dec 13 02:24:24.435000 audit: BPF prog-id=124 op=UNLOAD
Dec 13 02:24:24.435000 audit: BPF prog-id=123 op=UNLOAD
Dec 13 02:24:24.435000 audit[3206]: AVC avc:  denied  { bpf } for  pid=3206 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.435000 audit[3206]: AVC avc:  denied  { bpf } for  pid=3206 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.435000 audit[3206]: AVC avc:  denied  { bpf } for  pid=3206 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.435000 audit[3206]: AVC avc:  denied  { perfmon } for  pid=3206 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.435000 audit[3206]: AVC avc:  denied  { perfmon } for  pid=3206 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.435000 audit[3206]: AVC avc:  denied  { perfmon } for  pid=3206 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.435000 audit[3206]: AVC avc:  denied  { perfmon } for  pid=3206 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.435000 audit[3206]: AVC avc:  denied  { perfmon } for  pid=3206 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.435000 audit[3206]: AVC avc:  denied  { bpf } for  pid=3206 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.435000 audit[3206]: AVC avc:  denied  { bpf } for  pid=3206 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:24.435000 audit: BPF prog-id=125 op=LOAD
Dec 13 02:24:24.435000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025588 items=0 ppid=3195 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:24.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062363239653832306266616537346261346165383735376430303165
Dec 13 02:24:24.476602 env[1728]: time="2024-12-13T02:24:24.476464028Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8tvz9,Uid:16710728-0edb-4fe1-9afd-444c5bb8dc10,Namespace:calico-system,Attempt:0,} returns sandbox id \"0b629e820bfae74ba4ae8757d001ecad4bb1c39d4a3ab1b43136896d06124b63\""
Dec 13 02:24:24.799857 systemd[1]: run-containerd-runc-k8s.io-c4ac80bde30c4dce6e2c3ef727e24bfebe40428dd70155044b10971267049837-runc.26Hstv.mount: Deactivated successfully.
Dec 13 02:24:25.455779 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount578586745.mount: Deactivated successfully.
Dec 13 02:24:25.895559 kubelet[2727]: E1213 02:24:25.895512    2727 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qcbrg" podUID="a3fa05f4-3a10-4b1c-869c-713b8a907f16"
Dec 13 02:24:26.528213 env[1728]: time="2024-12-13T02:24:26.528168863Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:26.533347 env[1728]: time="2024-12-13T02:24:26.533300293Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:26.536864 env[1728]: time="2024-12-13T02:24:26.536823084Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:26.541403 env[1728]: time="2024-12-13T02:24:26.541361391Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:26.541700 env[1728]: time="2024-12-13T02:24:26.541669597Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\""
Dec 13 02:24:26.545232 env[1728]: time="2024-12-13T02:24:26.544049414Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\""
Dec 13 02:24:26.573447 env[1728]: time="2024-12-13T02:24:26.573402328Z" level=info msg="CreateContainer within sandbox \"c4ac80bde30c4dce6e2c3ef727e24bfebe40428dd70155044b10971267049837\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}"
Dec 13 02:24:26.596126 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3912874930.mount: Deactivated successfully.
Dec 13 02:24:26.604221 env[1728]: time="2024-12-13T02:24:26.604171242Z" level=info msg="CreateContainer within sandbox \"c4ac80bde30c4dce6e2c3ef727e24bfebe40428dd70155044b10971267049837\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730\""
Dec 13 02:24:26.606277 env[1728]: time="2024-12-13T02:24:26.605015477Z" level=info msg="StartContainer for \"bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730\""
Dec 13 02:24:26.653457 systemd[1]: Started cri-containerd-bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730.scope.
Dec 13 02:24:26.710000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.710000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.710000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.710000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.710000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.710000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.710000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.710000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.710000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.710000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.710000 audit: BPF prog-id=126 op=LOAD
Dec 13 02:24:26.713000 audit[3240]: AVC avc:  denied  { bpf } for  pid=3240 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.713000 audit[3240]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3098 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:26.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266633632616162386432383632646166376633613131613762306436
Dec 13 02:24:26.713000 audit[3240]: AVC avc:  denied  { perfmon } for  pid=3240 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.713000 audit[3240]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=3098 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:26.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266633632616162386432383632646166376633613131613762306436
Dec 13 02:24:26.713000 audit[3240]: AVC avc:  denied  { bpf } for  pid=3240 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.713000 audit[3240]: AVC avc:  denied  { bpf } for  pid=3240 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.713000 audit[3240]: AVC avc:  denied  { bpf } for  pid=3240 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.713000 audit[3240]: AVC avc:  denied  { perfmon } for  pid=3240 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.713000 audit[3240]: AVC avc:  denied  { perfmon } for  pid=3240 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.713000 audit[3240]: AVC avc:  denied  { perfmon } for  pid=3240 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.713000 audit[3240]: AVC avc:  denied  { perfmon } for  pid=3240 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.713000 audit[3240]: AVC avc:  denied  { perfmon } for  pid=3240 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.713000 audit[3240]: AVC avc:  denied  { bpf } for  pid=3240 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.713000 audit[3240]: AVC avc:  denied  { bpf } for  pid=3240 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.713000 audit: BPF prog-id=127 op=LOAD
Dec 13 02:24:26.713000 audit[3240]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000216ba0 items=0 ppid=3098 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:26.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266633632616162386432383632646166376633613131613762306436
Dec 13 02:24:26.713000 audit[3240]: AVC avc:  denied  { bpf } for  pid=3240 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.713000 audit[3240]: AVC avc:  denied  { bpf } for  pid=3240 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.713000 audit[3240]: AVC avc:  denied  { perfmon } for  pid=3240 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.713000 audit[3240]: AVC avc:  denied  { perfmon } for  pid=3240 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.713000 audit[3240]: AVC avc:  denied  { perfmon } for  pid=3240 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.713000 audit[3240]: AVC avc:  denied  { perfmon } for  pid=3240 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.713000 audit[3240]: AVC avc:  denied  { perfmon } for  pid=3240 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.713000 audit[3240]: AVC avc:  denied  { bpf } for  pid=3240 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.713000 audit[3240]: AVC avc:  denied  { bpf } for  pid=3240 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.713000 audit: BPF prog-id=128 op=LOAD
Dec 13 02:24:26.713000 audit[3240]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000216be8 items=0 ppid=3098 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:26.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266633632616162386432383632646166376633613131613762306436
Dec 13 02:24:26.713000 audit: BPF prog-id=128 op=UNLOAD
Dec 13 02:24:26.713000 audit: BPF prog-id=127 op=UNLOAD
Dec 13 02:24:26.714000 audit[3240]: AVC avc:  denied  { bpf } for  pid=3240 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.714000 audit[3240]: AVC avc:  denied  { bpf } for  pid=3240 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.714000 audit[3240]: AVC avc:  denied  { bpf } for  pid=3240 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.714000 audit[3240]: AVC avc:  denied  { perfmon } for  pid=3240 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.714000 audit[3240]: AVC avc:  denied  { perfmon } for  pid=3240 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.714000 audit[3240]: AVC avc:  denied  { perfmon } for  pid=3240 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.714000 audit[3240]: AVC avc:  denied  { perfmon } for  pid=3240 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.714000 audit[3240]: AVC avc:  denied  { perfmon } for  pid=3240 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.714000 audit[3240]: AVC avc:  denied  { bpf } for  pid=3240 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.714000 audit[3240]: AVC avc:  denied  { bpf } for  pid=3240 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:26.714000 audit: BPF prog-id=129 op=LOAD
Dec 13 02:24:26.714000 audit[3240]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000216ff8 items=0 ppid=3098 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:26.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266633632616162386432383632646166376633613131613762306436
Dec 13 02:24:26.815537 env[1728]: time="2024-12-13T02:24:26.812423628Z" level=info msg="StartContainer for \"bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730\" returns successfully"
Dec 13 02:24:27.188982 kubelet[2727]: I1213 02:24:27.188826    2727 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-7646875947-vlsg6" podStartSLOduration=1.75756763 podStartE2EDuration="4.188802389s" podCreationTimestamp="2024-12-13 02:24:23 +0000 UTC" firstStartedPulling="2024-12-13 02:24:24.112077907 +0000 UTC m=+12.487900325" lastFinishedPulling="2024-12-13 02:24:26.543312648 +0000 UTC m=+14.919135084" observedRunningTime="2024-12-13 02:24:27.188037184 +0000 UTC m=+15.563859631" watchObservedRunningTime="2024-12-13 02:24:27.188802389 +0000 UTC m=+15.564624826"
Dec 13 02:24:27.220137 kubelet[2727]: E1213 02:24:27.220070    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.220137 kubelet[2727]: W1213 02:24:27.220134    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.221621 kubelet[2727]: E1213 02:24:27.220205    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.221908 kubelet[2727]: E1213 02:24:27.221885    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.221908 kubelet[2727]: W1213 02:24:27.221909    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.222063 kubelet[2727]: E1213 02:24:27.221932    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.222348 kubelet[2727]: E1213 02:24:27.222326    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.222348 kubelet[2727]: W1213 02:24:27.222347    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.222545 kubelet[2727]: E1213 02:24:27.222364    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.222794 kubelet[2727]: E1213 02:24:27.222779    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.222879 kubelet[2727]: W1213 02:24:27.222797    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.222879 kubelet[2727]: E1213 02:24:27.222813    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.223176 kubelet[2727]: E1213 02:24:27.223160    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.223272 kubelet[2727]: W1213 02:24:27.223178    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.223272 kubelet[2727]: E1213 02:24:27.223192    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.223569 kubelet[2727]: E1213 02:24:27.223554    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.223655 kubelet[2727]: W1213 02:24:27.223570    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.223655 kubelet[2727]: E1213 02:24:27.223583    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.223917 kubelet[2727]: E1213 02:24:27.223894    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.223987 kubelet[2727]: W1213 02:24:27.223918    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.223987 kubelet[2727]: E1213 02:24:27.223931    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.224261 kubelet[2727]: E1213 02:24:27.224246    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.224346 kubelet[2727]: W1213 02:24:27.224262    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.224346 kubelet[2727]: E1213 02:24:27.224275    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.224618 kubelet[2727]: E1213 02:24:27.224603    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.224710 kubelet[2727]: W1213 02:24:27.224619    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.224710 kubelet[2727]: E1213 02:24:27.224632    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.224996 kubelet[2727]: E1213 02:24:27.224974    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.225083 kubelet[2727]: W1213 02:24:27.225003    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.225083 kubelet[2727]: E1213 02:24:27.225017    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.225412 kubelet[2727]: E1213 02:24:27.225365    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.225412 kubelet[2727]: W1213 02:24:27.225376    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.225412 kubelet[2727]: E1213 02:24:27.225389    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.225787 kubelet[2727]: E1213 02:24:27.225771    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.225787 kubelet[2727]: W1213 02:24:27.225787    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.225920 kubelet[2727]: E1213 02:24:27.225800    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.226235 kubelet[2727]: E1213 02:24:27.226118    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.226235 kubelet[2727]: W1213 02:24:27.226207    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.226235 kubelet[2727]: E1213 02:24:27.226223    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.226656 kubelet[2727]: E1213 02:24:27.226643    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.226772 kubelet[2727]: W1213 02:24:27.226757    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.226849 kubelet[2727]: E1213 02:24:27.226839    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.227240 kubelet[2727]: E1213 02:24:27.227227    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.227335 kubelet[2727]: W1213 02:24:27.227322    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.227404 kubelet[2727]: E1213 02:24:27.227395    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.227925 kubelet[2727]: E1213 02:24:27.227913    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.228392 kubelet[2727]: W1213 02:24:27.228378    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.228477 kubelet[2727]: E1213 02:24:27.228467    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.229268 kubelet[2727]: E1213 02:24:27.229254    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.229363 kubelet[2727]: W1213 02:24:27.229351    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.229471 kubelet[2727]: E1213 02:24:27.229458    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.229776 kubelet[2727]: E1213 02:24:27.229759    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.229850 kubelet[2727]: W1213 02:24:27.229777    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.229850 kubelet[2727]: E1213 02:24:27.229795    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.230501 kubelet[2727]: E1213 02:24:27.230481    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.230501 kubelet[2727]: W1213 02:24:27.230499    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.230644 kubelet[2727]: E1213 02:24:27.230519    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.230923 kubelet[2727]: E1213 02:24:27.230888    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.230923 kubelet[2727]: W1213 02:24:27.230903    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.231048 kubelet[2727]: E1213 02:24:27.230999    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.231286 kubelet[2727]: E1213 02:24:27.231271    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.231286 kubelet[2727]: W1213 02:24:27.231286    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.231436 kubelet[2727]: E1213 02:24:27.231381    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.231926 kubelet[2727]: E1213 02:24:27.231905    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.231926 kubelet[2727]: W1213 02:24:27.231921    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.232092 kubelet[2727]: E1213 02:24:27.232047    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.232325 kubelet[2727]: E1213 02:24:27.232313    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.232427 kubelet[2727]: W1213 02:24:27.232414    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.232513 kubelet[2727]: E1213 02:24:27.232501    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.233284 kubelet[2727]: E1213 02:24:27.233270    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.233426 kubelet[2727]: W1213 02:24:27.233387    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.233595 kubelet[2727]: E1213 02:24:27.233581    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.233941 kubelet[2727]: E1213 02:24:27.233927    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.234052 kubelet[2727]: W1213 02:24:27.234038    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.234135 kubelet[2727]: E1213 02:24:27.234126    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.234544 kubelet[2727]: E1213 02:24:27.234530    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.234640 kubelet[2727]: W1213 02:24:27.234626    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.234718 kubelet[2727]: E1213 02:24:27.234706    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.235370 kubelet[2727]: E1213 02:24:27.235356    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.235463 kubelet[2727]: W1213 02:24:27.235451    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.235530 kubelet[2727]: E1213 02:24:27.235518    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.235800 kubelet[2727]: E1213 02:24:27.235789    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.235873 kubelet[2727]: W1213 02:24:27.235864    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.235934 kubelet[2727]: E1213 02:24:27.235926    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.236223 kubelet[2727]: E1213 02:24:27.236212    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.236296 kubelet[2727]: W1213 02:24:27.236288    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.236347 kubelet[2727]: E1213 02:24:27.236340    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.236595 kubelet[2727]: E1213 02:24:27.236586    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.236705 kubelet[2727]: W1213 02:24:27.236695    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.236762 kubelet[2727]: E1213 02:24:27.236755    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.237226 kubelet[2727]: E1213 02:24:27.237216    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.237293 kubelet[2727]: W1213 02:24:27.237285    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.237353 kubelet[2727]: E1213 02:24:27.237345    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.237653 kubelet[2727]: E1213 02:24:27.237644    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.237716 kubelet[2727]: W1213 02:24:27.237708    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.237789 kubelet[2727]: E1213 02:24:27.237777    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.238069 kubelet[2727]: E1213 02:24:27.238059    2727 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:24:27.238140 kubelet[2727]: W1213 02:24:27.238131    2727 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:24:27.238241 kubelet[2727]: E1213 02:24:27.238229    2727 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:24:27.882573 env[1728]: time="2024-12-13T02:24:27.882521672Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:27.885505 env[1728]: time="2024-12-13T02:24:27.885458239Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:27.887660 env[1728]: time="2024-12-13T02:24:27.887617924Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:27.890067 env[1728]: time="2024-12-13T02:24:27.890010243Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:27.890485 env[1728]: time="2024-12-13T02:24:27.890445870Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\""
Dec 13 02:24:27.895394 kubelet[2727]: E1213 02:24:27.895321    2727 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qcbrg" podUID="a3fa05f4-3a10-4b1c-869c-713b8a907f16"
Dec 13 02:24:27.902113 env[1728]: time="2024-12-13T02:24:27.902062906Z" level=info msg="CreateContainer within sandbox \"0b629e820bfae74ba4ae8757d001ecad4bb1c39d4a3ab1b43136896d06124b63\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}"
Dec 13 02:24:27.924245 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1379802037.mount: Deactivated successfully.
Dec 13 02:24:27.933869 env[1728]: time="2024-12-13T02:24:27.933806542Z" level=info msg="CreateContainer within sandbox \"0b629e820bfae74ba4ae8757d001ecad4bb1c39d4a3ab1b43136896d06124b63\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"05b39c8c1028b00501d8d2f8ecd3716827e9bec062b2a401d14aa1337f920754\""
Dec 13 02:24:27.936777 env[1728]: time="2024-12-13T02:24:27.936732220Z" level=info msg="StartContainer for \"05b39c8c1028b00501d8d2f8ecd3716827e9bec062b2a401d14aa1337f920754\""
Dec 13 02:24:27.987113 systemd[1]: Started cri-containerd-05b39c8c1028b00501d8d2f8ecd3716827e9bec062b2a401d14aa1337f920754.scope.
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { perfmon } for  pid=3313 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f34533e3e48 items=0 ppid=3195 pid=3313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:28.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035623339633863313032386230303530316438643266386563643337
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { bpf } for  pid=3313 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { bpf } for  pid=3313 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { bpf } for  pid=3313 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { perfmon } for  pid=3313 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { perfmon } for  pid=3313 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { perfmon } for  pid=3313 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { perfmon } for  pid=3313 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { perfmon } for  pid=3313 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { bpf } for  pid=3313 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { bpf } for  pid=3313 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit: BPF prog-id=130 op=LOAD
Dec 13 02:24:28.033000 audit[3313]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003989b8 items=0 ppid=3195 pid=3313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:28.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035623339633863313032386230303530316438643266386563643337
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { bpf } for  pid=3313 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { bpf } for  pid=3313 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { perfmon } for  pid=3313 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { perfmon } for  pid=3313 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { perfmon } for  pid=3313 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { perfmon } for  pid=3313 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { perfmon } for  pid=3313 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { bpf } for  pid=3313 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { bpf } for  pid=3313 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit: BPF prog-id=131 op=LOAD
Dec 13 02:24:28.033000 audit[3313]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000398a08 items=0 ppid=3195 pid=3313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:28.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035623339633863313032386230303530316438643266386563643337
Dec 13 02:24:28.033000 audit: BPF prog-id=131 op=UNLOAD
Dec 13 02:24:28.033000 audit: BPF prog-id=130 op=UNLOAD
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { bpf } for  pid=3313 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { bpf } for  pid=3313 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { bpf } for  pid=3313 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { perfmon } for  pid=3313 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { perfmon } for  pid=3313 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { perfmon } for  pid=3313 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { perfmon } for  pid=3313 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { perfmon } for  pid=3313 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { bpf } for  pid=3313 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit[3313]: AVC avc:  denied  { bpf } for  pid=3313 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:28.033000 audit: BPF prog-id=132 op=LOAD
Dec 13 02:24:28.033000 audit[3313]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000398a98 items=0 ppid=3195 pid=3313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:28.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035623339633863313032386230303530316438643266386563643337
Dec 13 02:24:28.084133 env[1728]: time="2024-12-13T02:24:28.084081152Z" level=info msg="StartContainer for \"05b39c8c1028b00501d8d2f8ecd3716827e9bec062b2a401d14aa1337f920754\" returns successfully"
Dec 13 02:24:28.117705 systemd[1]: cri-containerd-05b39c8c1028b00501d8d2f8ecd3716827e9bec062b2a401d14aa1337f920754.scope: Deactivated successfully.
Dec 13 02:24:28.120000 audit: BPF prog-id=132 op=UNLOAD
Dec 13 02:24:28.190531 env[1728]: time="2024-12-13T02:24:28.190266661Z" level=info msg="shim disconnected" id=05b39c8c1028b00501d8d2f8ecd3716827e9bec062b2a401d14aa1337f920754
Dec 13 02:24:28.190531 env[1728]: time="2024-12-13T02:24:28.190443216Z" level=warning msg="cleaning up after shim disconnected" id=05b39c8c1028b00501d8d2f8ecd3716827e9bec062b2a401d14aa1337f920754 namespace=k8s.io
Dec 13 02:24:28.190531 env[1728]: time="2024-12-13T02:24:28.190457359Z" level=info msg="cleaning up dead shim"
Dec 13 02:24:28.196577 kubelet[2727]: I1213 02:24:28.194586    2727 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness"
Dec 13 02:24:28.211203 env[1728]: time="2024-12-13T02:24:28.209899252Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:24:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3352 runtime=io.containerd.runc.v2\n"
Dec 13 02:24:28.555526 systemd[1]: run-containerd-runc-k8s.io-05b39c8c1028b00501d8d2f8ecd3716827e9bec062b2a401d14aa1337f920754-runc.69Qx8W.mount: Deactivated successfully.
Dec 13 02:24:28.556317 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-05b39c8c1028b00501d8d2f8ecd3716827e9bec062b2a401d14aa1337f920754-rootfs.mount: Deactivated successfully.
Dec 13 02:24:29.208696 env[1728]: time="2024-12-13T02:24:29.208653085Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\""
Dec 13 02:24:29.895380 kubelet[2727]: E1213 02:24:29.895064    2727 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qcbrg" podUID="a3fa05f4-3a10-4b1c-869c-713b8a907f16"
Dec 13 02:24:31.899173 kubelet[2727]: E1213 02:24:31.899118    2727 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qcbrg" podUID="a3fa05f4-3a10-4b1c-869c-713b8a907f16"
Dec 13 02:24:33.896363 kubelet[2727]: E1213 02:24:33.896228    2727 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qcbrg" podUID="a3fa05f4-3a10-4b1c-869c-713b8a907f16"
Dec 13 02:24:34.546385 env[1728]: time="2024-12-13T02:24:34.546335455Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:34.549054 env[1728]: time="2024-12-13T02:24:34.549011220Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:34.551362 env[1728]: time="2024-12-13T02:24:34.551318061Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:34.553346 env[1728]: time="2024-12-13T02:24:34.553308917Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:34.553915 env[1728]: time="2024-12-13T02:24:34.553879201Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\""
Dec 13 02:24:34.558263 env[1728]: time="2024-12-13T02:24:34.558211373Z" level=info msg="CreateContainer within sandbox \"0b629e820bfae74ba4ae8757d001ecad4bb1c39d4a3ab1b43136896d06124b63\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}"
Dec 13 02:24:34.585077 env[1728]: time="2024-12-13T02:24:34.585023302Z" level=info msg="CreateContainer within sandbox \"0b629e820bfae74ba4ae8757d001ecad4bb1c39d4a3ab1b43136896d06124b63\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"fb878208435bc4d3356f174bd5b46848add77dd3c5125238cf8ce86407bb9859\""
Dec 13 02:24:34.586355 env[1728]: time="2024-12-13T02:24:34.586323922Z" level=info msg="StartContainer for \"fb878208435bc4d3356f174bd5b46848add77dd3c5125238cf8ce86407bb9859\""
Dec 13 02:24:34.623226 systemd[1]: Started cri-containerd-fb878208435bc4d3356f174bd5b46848add77dd3c5125238cf8ce86407bb9859.scope.
Dec 13 02:24:34.641420 systemd[1]: run-containerd-runc-k8s.io-fb878208435bc4d3356f174bd5b46848add77dd3c5125238cf8ce86407bb9859-runc.w3oX8h.mount: Deactivated successfully.
Dec 13 02:24:34.684478 kernel: kauditd_printk_skb: 223 callbacks suppressed
Dec 13 02:24:34.684702 kernel: audit: type=1400 audit(1734056674.677:1010): avc:  denied  { perfmon } for  pid=3381 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.677000 audit[3381]: AVC avc:  denied  { perfmon } for  pid=3381 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.677000 audit[3381]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f09246a28f8 items=0 ppid=3195 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:34.693246 kernel: audit: type=1300 audit(1734056674.677:1010): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f09246a28f8 items=0 ppid=3195 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:34.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662383738323038343335626334643333353666313734626435623436
Dec 13 02:24:34.706215 kernel: audit: type=1327 audit(1734056674.677:1010): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662383738323038343335626334643333353666313734626435623436
Dec 13 02:24:34.706431 kernel: audit: type=1400 audit(1734056674.677:1011): avc:  denied  { bpf } for  pid=3381 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.677000 audit[3381]: AVC avc:  denied  { bpf } for  pid=3381 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.710857 kernel: audit: type=1400 audit(1734056674.677:1011): avc:  denied  { bpf } for  pid=3381 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.677000 audit[3381]: AVC avc:  denied  { bpf } for  pid=3381 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.677000 audit[3381]: AVC avc:  denied  { bpf } for  pid=3381 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.715204 kernel: audit: type=1400 audit(1734056674.677:1011): avc:  denied  { bpf } for  pid=3381 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.677000 audit[3381]: AVC avc:  denied  { perfmon } for  pid=3381 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.723707 kernel: audit: type=1400 audit(1734056674.677:1011): avc:  denied  { perfmon } for  pid=3381 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.723898 kernel: audit: type=1400 audit(1734056674.677:1011): avc:  denied  { perfmon } for  pid=3381 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.677000 audit[3381]: AVC avc:  denied  { perfmon } for  pid=3381 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.724009 env[1728]: time="2024-12-13T02:24:34.720436805Z" level=info msg="StartContainer for \"fb878208435bc4d3356f174bd5b46848add77dd3c5125238cf8ce86407bb9859\" returns successfully"
Dec 13 02:24:34.677000 audit[3381]: AVC avc:  denied  { perfmon } for  pid=3381 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.734323 kernel: audit: type=1400 audit(1734056674.677:1011): avc:  denied  { perfmon } for  pid=3381 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.677000 audit[3381]: AVC avc:  denied  { perfmon } for  pid=3381 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.742212 kernel: audit: type=1400 audit(1734056674.677:1011): avc:  denied  { perfmon } for  pid=3381 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.677000 audit[3381]: AVC avc:  denied  { perfmon } for  pid=3381 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.677000 audit[3381]: AVC avc:  denied  { bpf } for  pid=3381 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.677000 audit[3381]: AVC avc:  denied  { bpf } for  pid=3381 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.677000 audit: BPF prog-id=133 op=LOAD
Dec 13 02:24:34.677000 audit[3381]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000e9ba8 items=0 ppid=3195 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:34.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662383738323038343335626334643333353666313734626435623436
Dec 13 02:24:34.683000 audit[3381]: AVC avc:  denied  { bpf } for  pid=3381 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.683000 audit[3381]: AVC avc:  denied  { bpf } for  pid=3381 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.683000 audit[3381]: AVC avc:  denied  { perfmon } for  pid=3381 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.683000 audit[3381]: AVC avc:  denied  { perfmon } for  pid=3381 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.683000 audit[3381]: AVC avc:  denied  { perfmon } for  pid=3381 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.683000 audit[3381]: AVC avc:  denied  { perfmon } for  pid=3381 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.683000 audit[3381]: AVC avc:  denied  { perfmon } for  pid=3381 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.683000 audit[3381]: AVC avc:  denied  { bpf } for  pid=3381 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.683000 audit[3381]: AVC avc:  denied  { bpf } for  pid=3381 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.683000 audit: BPF prog-id=134 op=LOAD
Dec 13 02:24:34.683000 audit[3381]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000e9bf8 items=0 ppid=3195 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:34.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662383738323038343335626334643333353666313734626435623436
Dec 13 02:24:34.683000 audit: BPF prog-id=134 op=UNLOAD
Dec 13 02:24:34.683000 audit: BPF prog-id=133 op=UNLOAD
Dec 13 02:24:34.683000 audit[3381]: AVC avc:  denied  { bpf } for  pid=3381 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.683000 audit[3381]: AVC avc:  denied  { bpf } for  pid=3381 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.683000 audit[3381]: AVC avc:  denied  { bpf } for  pid=3381 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.683000 audit[3381]: AVC avc:  denied  { perfmon } for  pid=3381 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.683000 audit[3381]: AVC avc:  denied  { perfmon } for  pid=3381 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.683000 audit[3381]: AVC avc:  denied  { perfmon } for  pid=3381 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.683000 audit[3381]: AVC avc:  denied  { perfmon } for  pid=3381 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.683000 audit[3381]: AVC avc:  denied  { perfmon } for  pid=3381 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.683000 audit[3381]: AVC avc:  denied  { bpf } for  pid=3381 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.683000 audit[3381]: AVC avc:  denied  { bpf } for  pid=3381 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:34.683000 audit: BPF prog-id=135 op=LOAD
Dec 13 02:24:34.683000 audit[3381]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000e9c88 items=0 ppid=3195 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:34.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662383738323038343335626334643333353666313734626435623436
Dec 13 02:24:35.722173 env[1728]: time="2024-12-13T02:24:35.722090126Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Dec 13 02:24:35.725395 systemd[1]: cri-containerd-fb878208435bc4d3356f174bd5b46848add77dd3c5125238cf8ce86407bb9859.scope: Deactivated successfully.
Dec 13 02:24:35.729000 audit: BPF prog-id=135 op=UNLOAD
Dec 13 02:24:35.757855 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fb878208435bc4d3356f174bd5b46848add77dd3c5125238cf8ce86407bb9859-rootfs.mount: Deactivated successfully.
Dec 13 02:24:35.760925 env[1728]: time="2024-12-13T02:24:35.760874253Z" level=info msg="shim disconnected" id=fb878208435bc4d3356f174bd5b46848add77dd3c5125238cf8ce86407bb9859
Dec 13 02:24:35.760925 env[1728]: time="2024-12-13T02:24:35.760925628Z" level=warning msg="cleaning up after shim disconnected" id=fb878208435bc4d3356f174bd5b46848add77dd3c5125238cf8ce86407bb9859 namespace=k8s.io
Dec 13 02:24:35.761316 env[1728]: time="2024-12-13T02:24:35.760937147Z" level=info msg="cleaning up dead shim"
Dec 13 02:24:35.771288 env[1728]: time="2024-12-13T02:24:35.771126651Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:24:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3419 runtime=io.containerd.runc.v2\n"
Dec 13 02:24:35.794709 kubelet[2727]: I1213 02:24:35.794599    2727 kubelet_node_status.go:488] "Fast updating node status as it just became ready"
Dec 13 02:24:35.874948 systemd[1]: Created slice kubepods-burstable-pod2a602144_c33c_4da8_88d8_1d35cd28e74d.slice.
Dec 13 02:24:35.885495 systemd[1]: Created slice kubepods-burstable-podb041a7c4_d9f0_4862_b845_5a767cf888b6.slice.
Dec 13 02:24:35.894756 systemd[1]: Created slice kubepods-besteffort-pod227ce0a8_6cb4_46e0_88a7_c73f2e8d5e2d.slice.
Dec 13 02:24:35.907134 systemd[1]: Created slice kubepods-besteffort-pod451fe638_c64f_4a5e_b8f8_88ad281bca14.slice.
Dec 13 02:24:35.915058 systemd[1]: Created slice kubepods-besteffort-pod73f8d749_4aed_4686_b899_a4512456e6f4.slice.
Dec 13 02:24:35.924843 systemd[1]: Created slice kubepods-besteffort-poda3fa05f4_3a10_4b1c_869c_713b8a907f16.slice.
Dec 13 02:24:35.929482 env[1728]: time="2024-12-13T02:24:35.928730578Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qcbrg,Uid:a3fa05f4-3a10-4b1c-869c-713b8a907f16,Namespace:calico-system,Attempt:0,}"
Dec 13 02:24:36.033823 kubelet[2727]: I1213 02:24:36.033773    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7txs7\" (UniqueName: \"kubernetes.io/projected/73f8d749-4aed-4686-b899-a4512456e6f4-kube-api-access-7txs7\") pod \"calico-kube-controllers-d49669cd5-nhvrl\" (UID: \"73f8d749-4aed-4686-b899-a4512456e6f4\") " pod="calico-system/calico-kube-controllers-d49669cd5-nhvrl"
Dec 13 02:24:36.033823 kubelet[2727]: I1213 02:24:36.033827    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/451fe638-c64f-4a5e-b8f8-88ad281bca14-calico-apiserver-certs\") pod \"calico-apiserver-74bf487454-f5nw8\" (UID: \"451fe638-c64f-4a5e-b8f8-88ad281bca14\") " pod="calico-apiserver/calico-apiserver-74bf487454-f5nw8"
Dec 13 02:24:36.034062 kubelet[2727]: I1213 02:24:36.033854    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mnhtv\" (UniqueName: \"kubernetes.io/projected/451fe638-c64f-4a5e-b8f8-88ad281bca14-kube-api-access-mnhtv\") pod \"calico-apiserver-74bf487454-f5nw8\" (UID: \"451fe638-c64f-4a5e-b8f8-88ad281bca14\") " pod="calico-apiserver/calico-apiserver-74bf487454-f5nw8"
Dec 13 02:24:36.034062 kubelet[2727]: I1213 02:24:36.033894    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b041a7c4-d9f0-4862-b845-5a767cf888b6-config-volume\") pod \"coredns-6f6b679f8f-n7sz7\" (UID: \"b041a7c4-d9f0-4862-b845-5a767cf888b6\") " pod="kube-system/coredns-6f6b679f8f-n7sz7"
Dec 13 02:24:36.034062 kubelet[2727]: I1213 02:24:36.033918    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/2a602144-c33c-4da8-88d8-1d35cd28e74d-config-volume\") pod \"coredns-6f6b679f8f-9xkb6\" (UID: \"2a602144-c33c-4da8-88d8-1d35cd28e74d\") " pod="kube-system/coredns-6f6b679f8f-9xkb6"
Dec 13 02:24:36.034062 kubelet[2727]: I1213 02:24:36.033944    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r5n2x\" (UniqueName: \"kubernetes.io/projected/227ce0a8-6cb4-46e0-88a7-c73f2e8d5e2d-kube-api-access-r5n2x\") pod \"calico-apiserver-74bf487454-wz4kv\" (UID: \"227ce0a8-6cb4-46e0-88a7-c73f2e8d5e2d\") " pod="calico-apiserver/calico-apiserver-74bf487454-wz4kv"
Dec 13 02:24:36.034062 kubelet[2727]: I1213 02:24:36.033970    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/73f8d749-4aed-4686-b899-a4512456e6f4-tigera-ca-bundle\") pod \"calico-kube-controllers-d49669cd5-nhvrl\" (UID: \"73f8d749-4aed-4686-b899-a4512456e6f4\") " pod="calico-system/calico-kube-controllers-d49669cd5-nhvrl"
Dec 13 02:24:36.034389 kubelet[2727]: I1213 02:24:36.033992    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/227ce0a8-6cb4-46e0-88a7-c73f2e8d5e2d-calico-apiserver-certs\") pod \"calico-apiserver-74bf487454-wz4kv\" (UID: \"227ce0a8-6cb4-46e0-88a7-c73f2e8d5e2d\") " pod="calico-apiserver/calico-apiserver-74bf487454-wz4kv"
Dec 13 02:24:36.034389 kubelet[2727]: I1213 02:24:36.034019    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6ttvz\" (UniqueName: \"kubernetes.io/projected/b041a7c4-d9f0-4862-b845-5a767cf888b6-kube-api-access-6ttvz\") pod \"coredns-6f6b679f8f-n7sz7\" (UID: \"b041a7c4-d9f0-4862-b845-5a767cf888b6\") " pod="kube-system/coredns-6f6b679f8f-n7sz7"
Dec 13 02:24:36.034389 kubelet[2727]: I1213 02:24:36.034044    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j9z5n\" (UniqueName: \"kubernetes.io/projected/2a602144-c33c-4da8-88d8-1d35cd28e74d-kube-api-access-j9z5n\") pod \"coredns-6f6b679f8f-9xkb6\" (UID: \"2a602144-c33c-4da8-88d8-1d35cd28e74d\") " pod="kube-system/coredns-6f6b679f8f-9xkb6"
Dec 13 02:24:36.213243 env[1728]: time="2024-12-13T02:24:36.212867371Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74bf487454-f5nw8,Uid:451fe638-c64f-4a5e-b8f8-88ad281bca14,Namespace:calico-apiserver,Attempt:0,}"
Dec 13 02:24:36.226483 env[1728]: time="2024-12-13T02:24:36.226120460Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-d49669cd5-nhvrl,Uid:73f8d749-4aed-4686-b899-a4512456e6f4,Namespace:calico-system,Attempt:0,}"
Dec 13 02:24:36.265470 env[1728]: time="2024-12-13T02:24:36.265393949Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\""
Dec 13 02:24:36.366277 env[1728]: time="2024-12-13T02:24:36.365204818Z" level=error msg="Failed to destroy network for sandbox \"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.366856 env[1728]: time="2024-12-13T02:24:36.366813431Z" level=error msg="encountered an error cleaning up failed sandbox \"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.367016 env[1728]: time="2024-12-13T02:24:36.366984529Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qcbrg,Uid:a3fa05f4-3a10-4b1c-869c-713b8a907f16,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.369190 kubelet[2727]: E1213 02:24:36.367342    2727 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.369190 kubelet[2727]: E1213 02:24:36.367423    2727 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qcbrg"
Dec 13 02:24:36.369190 kubelet[2727]: E1213 02:24:36.367449    2727 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qcbrg"
Dec 13 02:24:36.369663 kubelet[2727]: E1213 02:24:36.367511    2727 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-qcbrg_calico-system(a3fa05f4-3a10-4b1c-869c-713b8a907f16)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-qcbrg_calico-system(a3fa05f4-3a10-4b1c-869c-713b8a907f16)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qcbrg" podUID="a3fa05f4-3a10-4b1c-869c-713b8a907f16"
Dec 13 02:24:36.440141 env[1728]: time="2024-12-13T02:24:36.440076072Z" level=error msg="Failed to destroy network for sandbox \"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.440777 env[1728]: time="2024-12-13T02:24:36.440727387Z" level=error msg="encountered an error cleaning up failed sandbox \"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.441054 env[1728]: time="2024-12-13T02:24:36.441013643Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74bf487454-f5nw8,Uid:451fe638-c64f-4a5e-b8f8-88ad281bca14,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.441815 kubelet[2727]: E1213 02:24:36.441454    2727 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.441815 kubelet[2727]: E1213 02:24:36.441538    2727 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-74bf487454-f5nw8"
Dec 13 02:24:36.441815 kubelet[2727]: E1213 02:24:36.441595    2727 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-74bf487454-f5nw8"
Dec 13 02:24:36.442034 kubelet[2727]: E1213 02:24:36.441675    2727 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-74bf487454-f5nw8_calico-apiserver(451fe638-c64f-4a5e-b8f8-88ad281bca14)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-74bf487454-f5nw8_calico-apiserver(451fe638-c64f-4a5e-b8f8-88ad281bca14)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-74bf487454-f5nw8" podUID="451fe638-c64f-4a5e-b8f8-88ad281bca14"
Dec 13 02:24:36.453278 env[1728]: time="2024-12-13T02:24:36.453219451Z" level=error msg="Failed to destroy network for sandbox \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.453643 env[1728]: time="2024-12-13T02:24:36.453601921Z" level=error msg="encountered an error cleaning up failed sandbox \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.453735 env[1728]: time="2024-12-13T02:24:36.453666588Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-d49669cd5-nhvrl,Uid:73f8d749-4aed-4686-b899-a4512456e6f4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.454017 kubelet[2727]: E1213 02:24:36.453968    2727 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.454125 kubelet[2727]: E1213 02:24:36.454044    2727 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-d49669cd5-nhvrl"
Dec 13 02:24:36.454125 kubelet[2727]: E1213 02:24:36.454070    2727 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-d49669cd5-nhvrl"
Dec 13 02:24:36.454265 kubelet[2727]: E1213 02:24:36.454128    2727 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-d49669cd5-nhvrl_calico-system(73f8d749-4aed-4686-b899-a4512456e6f4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-d49669cd5-nhvrl_calico-system(73f8d749-4aed-4686-b899-a4512456e6f4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-d49669cd5-nhvrl" podUID="73f8d749-4aed-4686-b899-a4512456e6f4"
Dec 13 02:24:36.484252 env[1728]: time="2024-12-13T02:24:36.484198925Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-9xkb6,Uid:2a602144-c33c-4da8-88d8-1d35cd28e74d,Namespace:kube-system,Attempt:0,}"
Dec 13 02:24:36.505461 env[1728]: time="2024-12-13T02:24:36.505414086Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74bf487454-wz4kv,Uid:227ce0a8-6cb4-46e0-88a7-c73f2e8d5e2d,Namespace:calico-apiserver,Attempt:0,}"
Dec 13 02:24:36.505703 env[1728]: time="2024-12-13T02:24:36.505676707Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-n7sz7,Uid:b041a7c4-d9f0-4862-b845-5a767cf888b6,Namespace:kube-system,Attempt:0,}"
Dec 13 02:24:36.700702 env[1728]: time="2024-12-13T02:24:36.698343110Z" level=error msg="Failed to destroy network for sandbox \"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.701994 env[1728]: time="2024-12-13T02:24:36.701902985Z" level=error msg="encountered an error cleaning up failed sandbox \"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.702433 env[1728]: time="2024-12-13T02:24:36.702383508Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-9xkb6,Uid:2a602144-c33c-4da8-88d8-1d35cd28e74d,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.704328 kubelet[2727]: E1213 02:24:36.704115    2727 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.704505 kubelet[2727]: E1213 02:24:36.704413    2727 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-9xkb6"
Dec 13 02:24:36.704608 kubelet[2727]: E1213 02:24:36.704496    2727 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-9xkb6"
Dec 13 02:24:36.704709 kubelet[2727]: E1213 02:24:36.704667    2727 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-9xkb6_kube-system(2a602144-c33c-4da8-88d8-1d35cd28e74d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-9xkb6_kube-system(2a602144-c33c-4da8-88d8-1d35cd28e74d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-9xkb6" podUID="2a602144-c33c-4da8-88d8-1d35cd28e74d"
Dec 13 02:24:36.773747 env[1728]: time="2024-12-13T02:24:36.773596358Z" level=error msg="Failed to destroy network for sandbox \"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.774173 env[1728]: time="2024-12-13T02:24:36.774061806Z" level=error msg="encountered an error cleaning up failed sandbox \"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.774173 env[1728]: time="2024-12-13T02:24:36.774130670Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-n7sz7,Uid:b041a7c4-d9f0-4862-b845-5a767cf888b6,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.778335 kubelet[2727]: E1213 02:24:36.774685    2727 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.778335 kubelet[2727]: E1213 02:24:36.774773    2727 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-n7sz7"
Dec 13 02:24:36.778335 kubelet[2727]: E1213 02:24:36.774813    2727 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-n7sz7"
Dec 13 02:24:36.778577 kubelet[2727]: E1213 02:24:36.774968    2727 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-n7sz7_kube-system(b041a7c4-d9f0-4862-b845-5a767cf888b6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-n7sz7_kube-system(b041a7c4-d9f0-4862-b845-5a767cf888b6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-n7sz7" podUID="b041a7c4-d9f0-4862-b845-5a767cf888b6"
Dec 13 02:24:36.794047 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440-shm.mount: Deactivated successfully.
Dec 13 02:24:36.805579 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c-shm.mount: Deactivated successfully.
Dec 13 02:24:36.809674 env[1728]: time="2024-12-13T02:24:36.809619572Z" level=error msg="Failed to destroy network for sandbox \"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.814072 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48-shm.mount: Deactivated successfully.
Dec 13 02:24:36.816098 env[1728]: time="2024-12-13T02:24:36.814455451Z" level=error msg="encountered an error cleaning up failed sandbox \"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.816098 env[1728]: time="2024-12-13T02:24:36.814545464Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74bf487454-wz4kv,Uid:227ce0a8-6cb4-46e0-88a7-c73f2e8d5e2d,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.816402 kubelet[2727]: E1213 02:24:36.814823    2727 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:36.816402 kubelet[2727]: E1213 02:24:36.814994    2727 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-74bf487454-wz4kv"
Dec 13 02:24:36.816402 kubelet[2727]: E1213 02:24:36.815029    2727 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-74bf487454-wz4kv"
Dec 13 02:24:36.818504 kubelet[2727]: E1213 02:24:36.815092    2727 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-74bf487454-wz4kv_calico-apiserver(227ce0a8-6cb4-46e0-88a7-c73f2e8d5e2d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-74bf487454-wz4kv_calico-apiserver(227ce0a8-6cb4-46e0-88a7-c73f2e8d5e2d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-74bf487454-wz4kv" podUID="227ce0a8-6cb4-46e0-88a7-c73f2e8d5e2d"
Dec 13 02:24:37.251062 kubelet[2727]: I1213 02:24:37.251027    2727 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440"
Dec 13 02:24:37.278647 kubelet[2727]: I1213 02:24:37.275850    2727 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48"
Dec 13 02:24:37.286071 kubelet[2727]: I1213 02:24:37.286042    2727 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234"
Dec 13 02:24:37.291085 kubelet[2727]: I1213 02:24:37.291055    2727 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92"
Dec 13 02:24:37.293713 kubelet[2727]: I1213 02:24:37.293684    2727 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c"
Dec 13 02:24:37.300232 env[1728]: time="2024-12-13T02:24:37.300188930Z" level=info msg="StopPodSandbox for \"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\""
Dec 13 02:24:37.301718 env[1728]: time="2024-12-13T02:24:37.300257527Z" level=info msg="StopPodSandbox for \"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\""
Dec 13 02:24:37.301959 env[1728]: time="2024-12-13T02:24:37.300731207Z" level=info msg="StopPodSandbox for \"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\""
Dec 13 02:24:37.302809 env[1728]: time="2024-12-13T02:24:37.300671036Z" level=info msg="StopPodSandbox for \"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\""
Dec 13 02:24:37.305307 kubelet[2727]: I1213 02:24:37.305277    2727 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029"
Dec 13 02:24:37.305522 env[1728]: time="2024-12-13T02:24:37.300730917Z" level=info msg="StopPodSandbox for \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\""
Dec 13 02:24:37.308393 env[1728]: time="2024-12-13T02:24:37.308358630Z" level=info msg="StopPodSandbox for \"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\""
Dec 13 02:24:37.547090 env[1728]: time="2024-12-13T02:24:37.546849441Z" level=error msg="StopPodSandbox for \"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\" failed" error="failed to destroy network for sandbox \"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:37.548191 kubelet[2727]: E1213 02:24:37.548007    2727 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c"
Dec 13 02:24:37.550216 kubelet[2727]: E1213 02:24:37.548084    2727 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c"}
Dec 13 02:24:37.550216 kubelet[2727]: E1213 02:24:37.548405    2727 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b041a7c4-d9f0-4862-b845-5a767cf888b6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Dec 13 02:24:37.566773 kubelet[2727]: E1213 02:24:37.566703    2727 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b041a7c4-d9f0-4862-b845-5a767cf888b6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-n7sz7" podUID="b041a7c4-d9f0-4862-b845-5a767cf888b6"
Dec 13 02:24:37.639543 env[1728]: time="2024-12-13T02:24:37.638721906Z" level=error msg="StopPodSandbox for \"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\" failed" error="failed to destroy network for sandbox \"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:37.641553 kubelet[2727]: E1213 02:24:37.641028    2727 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48"
Dec 13 02:24:37.641553 kubelet[2727]: E1213 02:24:37.641158    2727 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48"}
Dec 13 02:24:37.641553 kubelet[2727]: E1213 02:24:37.641361    2727 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"227ce0a8-6cb4-46e0-88a7-c73f2e8d5e2d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Dec 13 02:24:37.641553 kubelet[2727]: E1213 02:24:37.641396    2727 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"227ce0a8-6cb4-46e0-88a7-c73f2e8d5e2d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-74bf487454-wz4kv" podUID="227ce0a8-6cb4-46e0-88a7-c73f2e8d5e2d"
Dec 13 02:24:37.711287 env[1728]: time="2024-12-13T02:24:37.711223641Z" level=error msg="StopPodSandbox for \"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\" failed" error="failed to destroy network for sandbox \"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:37.713749 kubelet[2727]: E1213 02:24:37.713545    2727 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234"
Dec 13 02:24:37.713749 kubelet[2727]: E1213 02:24:37.713613    2727 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234"}
Dec 13 02:24:37.713749 kubelet[2727]: E1213 02:24:37.713656    2727 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"451fe638-c64f-4a5e-b8f8-88ad281bca14\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Dec 13 02:24:37.713749 kubelet[2727]: E1213 02:24:37.713688    2727 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"451fe638-c64f-4a5e-b8f8-88ad281bca14\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-74bf487454-f5nw8" podUID="451fe638-c64f-4a5e-b8f8-88ad281bca14"
Dec 13 02:24:37.715065 env[1728]: time="2024-12-13T02:24:37.715008596Z" level=error msg="StopPodSandbox for \"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\" failed" error="failed to destroy network for sandbox \"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:37.715907 kubelet[2727]: E1213 02:24:37.715384    2727 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440"
Dec 13 02:24:37.715907 kubelet[2727]: E1213 02:24:37.715531    2727 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440"}
Dec 13 02:24:37.715907 kubelet[2727]: E1213 02:24:37.715817    2727 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a3fa05f4-3a10-4b1c-869c-713b8a907f16\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Dec 13 02:24:37.715907 kubelet[2727]: E1213 02:24:37.715855    2727 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a3fa05f4-3a10-4b1c-869c-713b8a907f16\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qcbrg" podUID="a3fa05f4-3a10-4b1c-869c-713b8a907f16"
Dec 13 02:24:37.752302 env[1728]: time="2024-12-13T02:24:37.752239657Z" level=error msg="StopPodSandbox for \"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\" failed" error="failed to destroy network for sandbox \"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:37.752643 kubelet[2727]: E1213 02:24:37.752531    2727 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029"
Dec 13 02:24:37.752853 kubelet[2727]: E1213 02:24:37.752670    2727 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029"}
Dec 13 02:24:37.752853 kubelet[2727]: E1213 02:24:37.752731    2727 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2a602144-c33c-4da8-88d8-1d35cd28e74d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Dec 13 02:24:37.752853 kubelet[2727]: E1213 02:24:37.752762    2727 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2a602144-c33c-4da8-88d8-1d35cd28e74d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-9xkb6" podUID="2a602144-c33c-4da8-88d8-1d35cd28e74d"
Dec 13 02:24:37.759533 env[1728]: time="2024-12-13T02:24:37.759432374Z" level=error msg="StopPodSandbox for \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\" failed" error="failed to destroy network for sandbox \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:24:37.760208 kubelet[2727]: E1213 02:24:37.759985    2727 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92"
Dec 13 02:24:37.760208 kubelet[2727]: E1213 02:24:37.760041    2727 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92"}
Dec 13 02:24:37.760208 kubelet[2727]: E1213 02:24:37.760090    2727 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"73f8d749-4aed-4686-b899-a4512456e6f4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Dec 13 02:24:37.760208 kubelet[2727]: E1213 02:24:37.760122    2727 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"73f8d749-4aed-4686-b899-a4512456e6f4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-d49669cd5-nhvrl" podUID="73f8d749-4aed-4686-b899-a4512456e6f4"
Dec 13 02:24:39.011205 kubelet[2727]: I1213 02:24:39.011159    2727 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness"
Dec 13 02:24:39.169000 audit[3758]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=3758 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:39.169000 audit[3758]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffdbeb89ba0 a2=0 a3=7ffdbeb89b8c items=0 ppid=2876 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:39.169000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:39.175000 audit[3758]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=3758 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:39.175000 audit[3758]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdbeb89ba0 a2=0 a3=0 items=0 ppid=2876 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:39.175000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:39.188000 audit[3760]: NETFILTER_CFG table=filter:97 family=2 entries=18 op=nft_register_rule pid=3760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:39.188000 audit[3760]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fff07a937f0 a2=0 a3=7fff07a937dc items=0 ppid=2876 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:39.188000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:39.196000 audit[3760]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=3760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:39.196000 audit[3760]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff07a937f0 a2=0 a3=0 items=0 ppid=2876 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:39.196000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:40.250074 kernel: kauditd_printk_skb: 46 callbacks suppressed
Dec 13 02:24:40.250255 kernel: audit: type=1325 audit(1734056680.242:1021): table=filter:99 family=2 entries=17 op=nft_register_rule pid=3762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:40.242000 audit[3762]: NETFILTER_CFG table=filter:99 family=2 entries=17 op=nft_register_rule pid=3762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:40.262536 kernel: audit: type=1300 audit(1734056680.242:1021): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd9340a520 a2=0 a3=7ffd9340a50c items=0 ppid=2876 pid=3762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:40.242000 audit[3762]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd9340a520 a2=0 a3=7ffd9340a50c items=0 ppid=2876 pid=3762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:40.242000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:40.270314 kernel: audit: type=1327 audit(1734056680.242:1021): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:40.265000 audit[3762]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=3762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:40.282604 kernel: audit: type=1325 audit(1734056680.265:1022): table=nat:100 family=2 entries=19 op=nft_register_chain pid=3762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:40.265000 audit[3762]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd9340a520 a2=0 a3=7ffd9340a50c items=0 ppid=2876 pid=3762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:40.292723 kernel: audit: type=1300 audit(1734056680.265:1022): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd9340a520 a2=0 a3=7ffd9340a50c items=0 ppid=2876 pid=3762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:40.265000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:40.310123 kernel: audit: type=1327 audit(1734056680.265:1022): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:46.501168 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2267695413.mount: Deactivated successfully.
Dec 13 02:24:46.576602 env[1728]: time="2024-12-13T02:24:46.576552633Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:46.580686 env[1728]: time="2024-12-13T02:24:46.580640070Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:46.583936 env[1728]: time="2024-12-13T02:24:46.583892016Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:46.587669 env[1728]: time="2024-12-13T02:24:46.587623657Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:46.588057 env[1728]: time="2024-12-13T02:24:46.588021932Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\""
Dec 13 02:24:46.618050 env[1728]: time="2024-12-13T02:24:46.617919668Z" level=info msg="CreateContainer within sandbox \"0b629e820bfae74ba4ae8757d001ecad4bb1c39d4a3ab1b43136896d06124b63\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}"
Dec 13 02:24:46.648460 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount834882060.mount: Deactivated successfully.
Dec 13 02:24:46.660034 env[1728]: time="2024-12-13T02:24:46.659977690Z" level=info msg="CreateContainer within sandbox \"0b629e820bfae74ba4ae8757d001ecad4bb1c39d4a3ab1b43136896d06124b63\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"d53caf9c9744f5b12fb6a51542aae0a0ce4d998f225f9e62e7d54a5e8ef24828\""
Dec 13 02:24:46.662391 env[1728]: time="2024-12-13T02:24:46.662314370Z" level=info msg="StartContainer for \"d53caf9c9744f5b12fb6a51542aae0a0ce4d998f225f9e62e7d54a5e8ef24828\""
Dec 13 02:24:46.688165 systemd[1]: Started cri-containerd-d53caf9c9744f5b12fb6a51542aae0a0ce4d998f225f9e62e7d54a5e8ef24828.scope.
Dec 13 02:24:46.733000 audit[3775]: AVC avc:  denied  { perfmon } for  pid=3775 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.741299 kernel: audit: type=1400 audit(1734056686.733:1023): avc:  denied  { perfmon } for  pid=3775 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.741409 kernel: audit: type=1300 audit(1734056686.733:1023): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fdbf8a9c018 items=0 ppid=3195 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:46.733000 audit[3775]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fdbf8a9c018 items=0 ppid=3195 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:46.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336361663963393734346635623132666236613531353432616165
Dec 13 02:24:46.733000 audit[3775]: AVC avc:  denied  { bpf } for  pid=3775 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.762894 kernel: audit: type=1327 audit(1734056686.733:1023): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336361663963393734346635623132666236613531353432616165
Dec 13 02:24:46.763846 kernel: audit: type=1400 audit(1734056686.733:1024): avc:  denied  { bpf } for  pid=3775 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.763907 kernel: audit: type=1400 audit(1734056686.733:1024): avc:  denied  { bpf } for  pid=3775 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.733000 audit[3775]: AVC avc:  denied  { bpf } for  pid=3775 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.733000 audit[3775]: AVC avc:  denied  { bpf } for  pid=3775 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.733000 audit[3775]: AVC avc:  denied  { perfmon } for  pid=3775 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.772974 kernel: audit: type=1400 audit(1734056686.733:1024): avc:  denied  { bpf } for  pid=3775 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.773081 kernel: audit: type=1400 audit(1734056686.733:1024): avc:  denied  { perfmon } for  pid=3775 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.733000 audit[3775]: AVC avc:  denied  { perfmon } for  pid=3775 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.733000 audit[3775]: AVC avc:  denied  { perfmon } for  pid=3775 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.783650 kernel: audit: type=1400 audit(1734056686.733:1024): avc:  denied  { perfmon } for  pid=3775 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.783770 kernel: audit: type=1400 audit(1734056686.733:1024): avc:  denied  { perfmon } for  pid=3775 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.733000 audit[3775]: AVC avc:  denied  { perfmon } for  pid=3775 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.788270 kernel: audit: type=1400 audit(1734056686.733:1024): avc:  denied  { perfmon } for  pid=3775 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.733000 audit[3775]: AVC avc:  denied  { perfmon } for  pid=3775 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.733000 audit[3775]: AVC avc:  denied  { bpf } for  pid=3775 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.733000 audit[3775]: AVC avc:  denied  { bpf } for  pid=3775 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.733000 audit: BPF prog-id=136 op=LOAD
Dec 13 02:24:46.733000 audit[3775]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000388208 items=0 ppid=3195 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:46.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336361663963393734346635623132666236613531353432616165
Dec 13 02:24:46.755000 audit[3775]: AVC avc:  denied  { bpf } for  pid=3775 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.755000 audit[3775]: AVC avc:  denied  { bpf } for  pid=3775 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.755000 audit[3775]: AVC avc:  denied  { perfmon } for  pid=3775 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.755000 audit[3775]: AVC avc:  denied  { perfmon } for  pid=3775 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.755000 audit[3775]: AVC avc:  denied  { perfmon } for  pid=3775 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.755000 audit[3775]: AVC avc:  denied  { perfmon } for  pid=3775 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.755000 audit[3775]: AVC avc:  denied  { perfmon } for  pid=3775 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.755000 audit[3775]: AVC avc:  denied  { bpf } for  pid=3775 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.755000 audit[3775]: AVC avc:  denied  { bpf } for  pid=3775 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.755000 audit: BPF prog-id=137 op=LOAD
Dec 13 02:24:46.755000 audit[3775]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000388258 items=0 ppid=3195 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:46.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336361663963393734346635623132666236613531353432616165
Dec 13 02:24:46.762000 audit: BPF prog-id=137 op=UNLOAD
Dec 13 02:24:46.763000 audit: BPF prog-id=136 op=UNLOAD
Dec 13 02:24:46.763000 audit[3775]: AVC avc:  denied  { bpf } for  pid=3775 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.763000 audit[3775]: AVC avc:  denied  { bpf } for  pid=3775 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.763000 audit[3775]: AVC avc:  denied  { bpf } for  pid=3775 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.763000 audit[3775]: AVC avc:  denied  { perfmon } for  pid=3775 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.763000 audit[3775]: AVC avc:  denied  { perfmon } for  pid=3775 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.763000 audit[3775]: AVC avc:  denied  { perfmon } for  pid=3775 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.763000 audit[3775]: AVC avc:  denied  { perfmon } for  pid=3775 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.763000 audit[3775]: AVC avc:  denied  { perfmon } for  pid=3775 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.763000 audit[3775]: AVC avc:  denied  { bpf } for  pid=3775 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.763000 audit[3775]: AVC avc:  denied  { bpf } for  pid=3775 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:46.763000 audit: BPF prog-id=138 op=LOAD
Dec 13 02:24:46.763000 audit[3775]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003882e8 items=0 ppid=3195 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:46.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336361663963393734346635623132666236613531353432616165
Dec 13 02:24:46.806522 env[1728]: time="2024-12-13T02:24:46.806473587Z" level=info msg="StartContainer for \"d53caf9c9744f5b12fb6a51542aae0a0ce4d998f225f9e62e7d54a5e8ef24828\" returns successfully"
Dec 13 02:24:47.466542 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information.
Dec 13 02:24:47.466963 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
Dec 13 02:24:47.526165 kubelet[2727]: I1213 02:24:47.518867    2727 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-8tvz9" podStartSLOduration=2.406892806 podStartE2EDuration="24.511721948s" podCreationTimestamp="2024-12-13 02:24:23 +0000 UTC" firstStartedPulling="2024-12-13 02:24:24.484340253 +0000 UTC m=+12.860162666" lastFinishedPulling="2024-12-13 02:24:46.589169382 +0000 UTC m=+34.964991808" observedRunningTime="2024-12-13 02:24:47.508694567 +0000 UTC m=+35.884517003" watchObservedRunningTime="2024-12-13 02:24:47.511721948 +0000 UTC m=+35.887544387"
Dec 13 02:24:48.447903 systemd[1]: run-containerd-runc-k8s.io-d53caf9c9744f5b12fb6a51542aae0a0ce4d998f225f9e62e7d54a5e8ef24828-runc.ectFeX.mount: Deactivated successfully.
Dec 13 02:24:48.901713 env[1728]: time="2024-12-13T02:24:48.901667579Z" level=info msg="StopPodSandbox for \"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\""
Dec 13 02:24:49.456000 audit[3962]: AVC avc:  denied  { write } for  pid=3962 comm="tee" name="fd" dev="proc" ino=24392 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Dec 13 02:24:49.456000 audit[3962]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0a519a1a a2=241 a3=1b6 items=1 ppid=3911 pid=3962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:49.456000 audit: CWD cwd="/etc/service/enabled/felix/log"
Dec 13 02:24:49.470000 audit[3960]: AVC avc:  denied  { write } for  pid=3960 comm="tee" name="fd" dev="proc" ino=24396 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Dec 13 02:24:49.456000 audit: PATH item=0 name="/dev/fd/63" inode=24379 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:24:49.456000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Dec 13 02:24:49.470000 audit[3960]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea691da1a a2=241 a3=1b6 items=1 ppid=3915 pid=3960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:49.470000 audit: CWD cwd="/etc/service/enabled/confd/log"
Dec 13 02:24:49.491000 audit[3972]: AVC avc:  denied  { write } for  pid=3972 comm="tee" name="fd" dev="proc" ino=25327 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Dec 13 02:24:49.470000 audit: PATH item=0 name="/dev/fd/63" inode=24376 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:24:49.470000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Dec 13 02:24:49.497000 audit[3968]: AVC avc:  denied  { write } for  pid=3968 comm="tee" name="fd" dev="proc" ino=25345 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Dec 13 02:24:49.491000 audit[3972]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca8cc2a1b a2=241 a3=1b6 items=1 ppid=3921 pid=3972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:49.491000 audit: CWD cwd="/etc/service/enabled/bird/log"
Dec 13 02:24:49.491000 audit: PATH item=0 name="/dev/fd/63" inode=25308 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:24:49.491000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Dec 13 02:24:49.497000 audit[3968]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffffd7ada1c a2=241 a3=1b6 items=1 ppid=3918 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:49.497000 audit: CWD cwd="/etc/service/enabled/cni/log"
Dec 13 02:24:49.497000 audit: PATH item=0 name="/dev/fd/63" inode=25307 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:24:49.497000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Dec 13 02:24:49.541000 audit[3978]: AVC avc:  denied  { write } for  pid=3978 comm="tee" name="fd" dev="proc" ino=25354 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Dec 13 02:24:49.546804 systemd[1]: run-containerd-runc-k8s.io-d53caf9c9744f5b12fb6a51542aae0a0ce4d998f225f9e62e7d54a5e8ef24828-runc.cfTDqM.mount: Deactivated successfully.
Dec 13 02:24:49.582000 audit[3966]: AVC avc:  denied  { write } for  pid=3966 comm="tee" name="fd" dev="proc" ino=25355 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Dec 13 02:24:49.541000 audit[3978]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdcee6aa0a a2=241 a3=1b6 items=1 ppid=3913 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:49.582000 audit[3966]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc90fba1a a2=241 a3=1b6 items=1 ppid=3920 pid=3966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:49.582000 audit: CWD cwd="/etc/service/enabled/bird6/log"
Dec 13 02:24:49.541000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log"
Dec 13 02:24:49.541000 audit: PATH item=0 name="/dev/fd/63" inode=24389 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:24:49.582000 audit: PATH item=0 name="/dev/fd/63" inode=24386 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:24:49.582000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Dec 13 02:24:49.541000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Dec 13 02:24:49.593106 env[1728]: 2024-12-13 02:24:49.036 [INFO][3892] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440"
Dec 13 02:24:49.593106 env[1728]: 2024-12-13 02:24:49.036 [INFO][3892] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" iface="eth0" netns="/var/run/netns/cni-33babf15-6793-5291-0bfb-3f12910e43d3"
Dec 13 02:24:49.593106 env[1728]: 2024-12-13 02:24:49.037 [INFO][3892] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" iface="eth0" netns="/var/run/netns/cni-33babf15-6793-5291-0bfb-3f12910e43d3"
Dec 13 02:24:49.593106 env[1728]: 2024-12-13 02:24:49.041 [INFO][3892] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone.  Nothing to do. ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" iface="eth0" netns="/var/run/netns/cni-33babf15-6793-5291-0bfb-3f12910e43d3"
Dec 13 02:24:49.593106 env[1728]: 2024-12-13 02:24:49.041 [INFO][3892] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440"
Dec 13 02:24:49.593106 env[1728]: 2024-12-13 02:24:49.041 [INFO][3892] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440"
Dec 13 02:24:49.593106 env[1728]: 2024-12-13 02:24:49.533 [INFO][3898] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" HandleID="k8s-pod-network.25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" Workload="ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0"
Dec 13 02:24:49.593106 env[1728]: 2024-12-13 02:24:49.536 [INFO][3898] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:24:49.593106 env[1728]: 2024-12-13 02:24:49.536 [INFO][3898] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:24:49.593106 env[1728]: 2024-12-13 02:24:49.583 [WARNING][3898] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" HandleID="k8s-pod-network.25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" Workload="ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0"
Dec 13 02:24:49.593106 env[1728]: 2024-12-13 02:24:49.583 [INFO][3898] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" HandleID="k8s-pod-network.25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" Workload="ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0"
Dec 13 02:24:49.593106 env[1728]: 2024-12-13 02:24:49.586 [INFO][3898] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:24:49.593106 env[1728]: 2024-12-13 02:24:49.590 [INFO][3892] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440"
Dec 13 02:24:49.596000 audit[3990]: AVC avc:  denied  { write } for  pid=3990 comm="tee" name="fd" dev="proc" ino=25363 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Dec 13 02:24:49.603122 systemd[1]: run-netns-cni\x2d33babf15\x2d6793\x2d5291\x2d0bfb\x2d3f12910e43d3.mount: Deactivated successfully.
Dec 13 02:24:49.605342 env[1728]: time="2024-12-13T02:24:49.605245123Z" level=info msg="TearDown network for sandbox \"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\" successfully"
Dec 13 02:24:49.605582 env[1728]: time="2024-12-13T02:24:49.605341713Z" level=info msg="StopPodSandbox for \"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\" returns successfully"
Dec 13 02:24:49.606443 env[1728]: time="2024-12-13T02:24:49.606408920Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qcbrg,Uid:a3fa05f4-3a10-4b1c-869c-713b8a907f16,Namespace:calico-system,Attempt:1,}"
Dec 13 02:24:49.596000 audit[3990]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc30d0ca0b a2=241 a3=1b6 items=1 ppid=3922 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:49.596000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log"
Dec 13 02:24:49.596000 audit: PATH item=0 name="/dev/fd/63" inode=24399 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:24:49.596000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Dec 13 02:24:49.898870 env[1728]: time="2024-12-13T02:24:49.898829909Z" level=info msg="StopPodSandbox for \"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\""
Dec 13 02:24:50.016253 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Dec 13 02:24:50.016439 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0bc46136f9a: link becomes ready
Dec 13 02:24:50.015764 (udev-worker)[3806]: Network interface NamePolicy= disabled on kernel command line.
Dec 13 02:24:50.023466 systemd-networkd[1457]: cali0bc46136f9a: Link UP
Dec 13 02:24:50.023853 systemd-networkd[1457]: cali0bc46136f9a: Gained carrier
Dec 13 02:24:50.061167 env[1728]: 2024-12-13 02:24:49.700 [INFO][4005] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist
Dec 13 02:24:50.061167 env[1728]: 2024-12-13 02:24:49.726 [INFO][4005] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0 csi-node-driver- calico-system  a3fa05f4-3a10-4b1c-869c-713b8a907f16 791 0 2024-12-13 02:24:23 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s  ip-172-31-27-10  csi-node-driver-qcbrg eth0 csi-node-driver [] []   [kns.calico-system ksa.calico-system.csi-node-driver] cali0bc46136f9a  [] []}} ContainerID="d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd" Namespace="calico-system" Pod="csi-node-driver-qcbrg" WorkloadEndpoint="ip--172--31--27--10-k8s-csi--node--driver--qcbrg-"
Dec 13 02:24:50.061167 env[1728]: 2024-12-13 02:24:49.726 [INFO][4005] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd" Namespace="calico-system" Pod="csi-node-driver-qcbrg" WorkloadEndpoint="ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0"
Dec 13 02:24:50.061167 env[1728]: 2024-12-13 02:24:49.849 [INFO][4022] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd" HandleID="k8s-pod-network.d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd" Workload="ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0"
Dec 13 02:24:50.061167 env[1728]: 2024-12-13 02:24:49.878 [INFO][4022] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd" HandleID="k8s-pod-network.d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd" Workload="ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003a1cc0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-27-10", "pod":"csi-node-driver-qcbrg", "timestamp":"2024-12-13 02:24:49.849784414 +0000 UTC"}, Hostname:"ip-172-31-27-10", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Dec 13 02:24:50.061167 env[1728]: 2024-12-13 02:24:49.878 [INFO][4022] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:24:50.061167 env[1728]: 2024-12-13 02:24:49.878 [INFO][4022] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:24:50.061167 env[1728]: 2024-12-13 02:24:49.879 [INFO][4022] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-10'
Dec 13 02:24:50.061167 env[1728]: 2024-12-13 02:24:49.883 [INFO][4022] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd" host="ip-172-31-27-10"
Dec 13 02:24:50.061167 env[1728]: 2024-12-13 02:24:49.901 [INFO][4022] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-10"
Dec 13 02:24:50.061167 env[1728]: 2024-12-13 02:24:49.917 [INFO][4022] ipam/ipam.go 489: Trying affinity for 192.168.29.0/26 host="ip-172-31-27-10"
Dec 13 02:24:50.061167 env[1728]: 2024-12-13 02:24:49.923 [INFO][4022] ipam/ipam.go 155: Attempting to load block cidr=192.168.29.0/26 host="ip-172-31-27-10"
Dec 13 02:24:50.061167 env[1728]: 2024-12-13 02:24:49.928 [INFO][4022] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.29.0/26 host="ip-172-31-27-10"
Dec 13 02:24:50.061167 env[1728]: 2024-12-13 02:24:49.928 [INFO][4022] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.29.0/26 handle="k8s-pod-network.d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd" host="ip-172-31-27-10"
Dec 13 02:24:50.061167 env[1728]: 2024-12-13 02:24:49.933 [INFO][4022] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd
Dec 13 02:24:50.061167 env[1728]: 2024-12-13 02:24:49.962 [INFO][4022] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.29.0/26 handle="k8s-pod-network.d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd" host="ip-172-31-27-10"
Dec 13 02:24:50.061167 env[1728]: 2024-12-13 02:24:49.984 [INFO][4022] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.29.1/26] block=192.168.29.0/26 handle="k8s-pod-network.d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd" host="ip-172-31-27-10"
Dec 13 02:24:50.061167 env[1728]: 2024-12-13 02:24:49.984 [INFO][4022] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.29.1/26] handle="k8s-pod-network.d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd" host="ip-172-31-27-10"
Dec 13 02:24:50.061167 env[1728]: 2024-12-13 02:24:49.985 [INFO][4022] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:24:50.061167 env[1728]: 2024-12-13 02:24:49.985 [INFO][4022] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.29.1/26] IPv6=[] ContainerID="d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd" HandleID="k8s-pod-network.d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd" Workload="ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0"
Dec 13 02:24:50.063510 env[1728]: 2024-12-13 02:24:49.992 [INFO][4005] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd" Namespace="calico-system" Pod="csi-node-driver-qcbrg" WorkloadEndpoint="ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a3fa05f4-3a10-4b1c-869c-713b8a907f16", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 23, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"", Pod:"csi-node-driver-qcbrg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.29.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0bc46136f9a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:24:50.063510 env[1728]: 2024-12-13 02:24:49.992 [INFO][4005] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.29.1/32] ContainerID="d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd" Namespace="calico-system" Pod="csi-node-driver-qcbrg" WorkloadEndpoint="ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0"
Dec 13 02:24:50.063510 env[1728]: 2024-12-13 02:24:49.992 [INFO][4005] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0bc46136f9a ContainerID="d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd" Namespace="calico-system" Pod="csi-node-driver-qcbrg" WorkloadEndpoint="ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0"
Dec 13 02:24:50.063510 env[1728]: 2024-12-13 02:24:50.025 [INFO][4005] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd" Namespace="calico-system" Pod="csi-node-driver-qcbrg" WorkloadEndpoint="ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0"
Dec 13 02:24:50.063510 env[1728]: 2024-12-13 02:24:50.026 [INFO][4005] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd" Namespace="calico-system" Pod="csi-node-driver-qcbrg" WorkloadEndpoint="ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a3fa05f4-3a10-4b1c-869c-713b8a907f16", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 23, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd", Pod:"csi-node-driver-qcbrg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.29.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0bc46136f9a", MAC:"12:ec:7c:1b:1f:fa", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:24:50.063510 env[1728]: 2024-12-13 02:24:50.052 [INFO][4005] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd" Namespace="calico-system" Pod="csi-node-driver-qcbrg" WorkloadEndpoint="ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0"
Dec 13 02:24:50.173039 env[1728]: time="2024-12-13T02:24:50.172862476Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 02:24:50.173787 env[1728]: time="2024-12-13T02:24:50.173667092Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 02:24:50.174128 env[1728]: time="2024-12-13T02:24:50.174096529Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 02:24:50.182341 env[1728]: time="2024-12-13T02:24:50.182253356Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd pid=4079 runtime=io.containerd.runc.v2
Dec 13 02:24:50.219475 systemd[1]: Started cri-containerd-d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd.scope.
Dec 13 02:24:50.238576 env[1728]: 2024-12-13 02:24:50.065 [INFO][4045] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029"
Dec 13 02:24:50.238576 env[1728]: 2024-12-13 02:24:50.065 [INFO][4045] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" iface="eth0" netns="/var/run/netns/cni-08993f74-6c85-ed26-21a6-40aa3007f387"
Dec 13 02:24:50.238576 env[1728]: 2024-12-13 02:24:50.068 [INFO][4045] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" iface="eth0" netns="/var/run/netns/cni-08993f74-6c85-ed26-21a6-40aa3007f387"
Dec 13 02:24:50.238576 env[1728]: 2024-12-13 02:24:50.068 [INFO][4045] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone.  Nothing to do. ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" iface="eth0" netns="/var/run/netns/cni-08993f74-6c85-ed26-21a6-40aa3007f387"
Dec 13 02:24:50.238576 env[1728]: 2024-12-13 02:24:50.069 [INFO][4045] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029"
Dec 13 02:24:50.238576 env[1728]: 2024-12-13 02:24:50.069 [INFO][4045] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029"
Dec 13 02:24:50.238576 env[1728]: 2024-12-13 02:24:50.204 [INFO][4062] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" HandleID="k8s-pod-network.b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0"
Dec 13 02:24:50.238576 env[1728]: 2024-12-13 02:24:50.205 [INFO][4062] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:24:50.238576 env[1728]: 2024-12-13 02:24:50.205 [INFO][4062] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:24:50.238576 env[1728]: 2024-12-13 02:24:50.227 [WARNING][4062] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" HandleID="k8s-pod-network.b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0"
Dec 13 02:24:50.238576 env[1728]: 2024-12-13 02:24:50.227 [INFO][4062] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" HandleID="k8s-pod-network.b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0"
Dec 13 02:24:50.238576 env[1728]: 2024-12-13 02:24:50.232 [INFO][4062] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:24:50.238576 env[1728]: 2024-12-13 02:24:50.235 [INFO][4045] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029"
Dec 13 02:24:50.239994 env[1728]: time="2024-12-13T02:24:50.239659540Z" level=info msg="TearDown network for sandbox \"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\" successfully"
Dec 13 02:24:50.240490 env[1728]: time="2024-12-13T02:24:50.240457407Z" level=info msg="StopPodSandbox for \"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\" returns successfully"
Dec 13 02:24:50.244094 env[1728]: time="2024-12-13T02:24:50.241843380Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-9xkb6,Uid:2a602144-c33c-4da8-88d8-1d35cd28e74d,Namespace:kube-system,Attempt:1,}"
Dec 13 02:24:50.271000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.271000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.271000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.271000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.271000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.271000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.271000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.271000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.271000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.271000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.271000 audit: BPF prog-id=139 op=LOAD
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { bpf } for  pid=4090 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4079 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434356534376630313334343834666637396161653865313337353339
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { perfmon } for  pid=4090 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=4079 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434356534376630313334343834666637396161653865313337353339
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { bpf } for  pid=4090 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { bpf } for  pid=4090 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { bpf } for  pid=4090 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { perfmon } for  pid=4090 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { perfmon } for  pid=4090 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { perfmon } for  pid=4090 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { perfmon } for  pid=4090 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { perfmon } for  pid=4090 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { bpf } for  pid=4090 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { bpf } for  pid=4090 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit: BPF prog-id=140 op=LOAD
Dec 13 02:24:50.273000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0002ede90 items=0 ppid=4079 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434356534376630313334343834666637396161653865313337353339
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { bpf } for  pid=4090 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { bpf } for  pid=4090 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { perfmon } for  pid=4090 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { perfmon } for  pid=4090 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { perfmon } for  pid=4090 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { perfmon } for  pid=4090 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { perfmon } for  pid=4090 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { bpf } for  pid=4090 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { bpf } for  pid=4090 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit: BPF prog-id=141 op=LOAD
Dec 13 02:24:50.273000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0002eded8 items=0 ppid=4079 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434356534376630313334343834666637396161653865313337353339
Dec 13 02:24:50.273000 audit: BPF prog-id=141 op=UNLOAD
Dec 13 02:24:50.273000 audit: BPF prog-id=140 op=UNLOAD
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { bpf } for  pid=4090 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { bpf } for  pid=4090 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { bpf } for  pid=4090 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { perfmon } for  pid=4090 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { perfmon } for  pid=4090 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { perfmon } for  pid=4090 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { perfmon } for  pid=4090 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { perfmon } for  pid=4090 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { bpf } for  pid=4090 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit[4090]: AVC avc:  denied  { bpf } for  pid=4090 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.273000 audit: BPF prog-id=142 op=LOAD
Dec 13 02:24:50.273000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003462e8 items=0 ppid=4079 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434356534376630313334343834666637396161653865313337353339
Dec 13 02:24:50.302206 env[1728]: time="2024-12-13T02:24:50.299847964Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qcbrg,Uid:a3fa05f4-3a10-4b1c-869c-713b8a907f16,Namespace:calico-system,Attempt:1,} returns sandbox id \"d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd\""
Dec 13 02:24:50.310258 env[1728]: time="2024-12-13T02:24:50.308429069Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\""
Dec 13 02:24:50.518000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.518000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.518000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.518000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.518000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.518000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.518000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.518000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.518000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.518000 audit: BPF prog-id=143 op=LOAD
Dec 13 02:24:50.518000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff754ed760 a2=98 a3=3 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.518000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.518000 audit: BPF prog-id=143 op=UNLOAD
Dec 13 02:24:50.520000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.520000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.520000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.520000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.520000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.520000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.520000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.520000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.520000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.520000 audit: BPF prog-id=144 op=LOAD
Dec 13 02:24:50.520000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff754ed540 a2=74 a3=540051 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.520000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.520000 audit: BPF prog-id=144 op=UNLOAD
Dec 13 02:24:50.520000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.520000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.520000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.520000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.520000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.520000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.520000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.520000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.520000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.520000 audit: BPF prog-id=145 op=LOAD
Dec 13 02:24:50.520000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff754ed570 a2=94 a3=2 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.520000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.520000 audit: BPF prog-id=145 op=UNLOAD
Dec 13 02:24:50.519067 systemd[1]: run-netns-cni\x2d08993f74\x2d6c85\x2ded26\x2d21a6\x2d40aa3007f387.mount: Deactivated successfully.
Dec 13 02:24:50.665181 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4356c2747b1: link becomes ready
Dec 13 02:24:50.665626 systemd-networkd[1457]: cali4356c2747b1: Link UP
Dec 13 02:24:50.665846 systemd-networkd[1457]: cali4356c2747b1: Gained carrier
Dec 13 02:24:50.701573 env[1728]: 2024-12-13 02:24:50.428 [INFO][4109] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0 coredns-6f6b679f8f- kube-system  2a602144-c33c-4da8-88d8-1d35cd28e74d 797 0 2024-12-13 02:24:16 +0000 UTC <nil> <nil> map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s  ip-172-31-27-10  coredns-6f6b679f8f-9xkb6 eth0 coredns [] []   [kns.kube-system ksa.kube-system.coredns] cali4356c2747b1  [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135" Namespace="kube-system" Pod="coredns-6f6b679f8f-9xkb6" WorkloadEndpoint="ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-"
Dec 13 02:24:50.701573 env[1728]: 2024-12-13 02:24:50.428 [INFO][4109] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135" Namespace="kube-system" Pod="coredns-6f6b679f8f-9xkb6" WorkloadEndpoint="ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0"
Dec 13 02:24:50.701573 env[1728]: 2024-12-13 02:24:50.546 [INFO][4152] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135" HandleID="k8s-pod-network.593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0"
Dec 13 02:24:50.701573 env[1728]: 2024-12-13 02:24:50.563 [INFO][4152] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135" HandleID="k8s-pod-network.593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000518c0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-27-10", "pod":"coredns-6f6b679f8f-9xkb6", "timestamp":"2024-12-13 02:24:50.546626789 +0000 UTC"}, Hostname:"ip-172-31-27-10", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Dec 13 02:24:50.701573 env[1728]: 2024-12-13 02:24:50.563 [INFO][4152] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:24:50.701573 env[1728]: 2024-12-13 02:24:50.563 [INFO][4152] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:24:50.701573 env[1728]: 2024-12-13 02:24:50.564 [INFO][4152] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-10'
Dec 13 02:24:50.701573 env[1728]: 2024-12-13 02:24:50.585 [INFO][4152] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135" host="ip-172-31-27-10"
Dec 13 02:24:50.701573 env[1728]: 2024-12-13 02:24:50.594 [INFO][4152] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-10"
Dec 13 02:24:50.701573 env[1728]: 2024-12-13 02:24:50.604 [INFO][4152] ipam/ipam.go 489: Trying affinity for 192.168.29.0/26 host="ip-172-31-27-10"
Dec 13 02:24:50.701573 env[1728]: 2024-12-13 02:24:50.612 [INFO][4152] ipam/ipam.go 155: Attempting to load block cidr=192.168.29.0/26 host="ip-172-31-27-10"
Dec 13 02:24:50.701573 env[1728]: 2024-12-13 02:24:50.619 [INFO][4152] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.29.0/26 host="ip-172-31-27-10"
Dec 13 02:24:50.701573 env[1728]: 2024-12-13 02:24:50.619 [INFO][4152] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.29.0/26 handle="k8s-pod-network.593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135" host="ip-172-31-27-10"
Dec 13 02:24:50.701573 env[1728]: 2024-12-13 02:24:50.637 [INFO][4152] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135
Dec 13 02:24:50.701573 env[1728]: 2024-12-13 02:24:50.645 [INFO][4152] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.29.0/26 handle="k8s-pod-network.593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135" host="ip-172-31-27-10"
Dec 13 02:24:50.701573 env[1728]: 2024-12-13 02:24:50.656 [INFO][4152] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.29.2/26] block=192.168.29.0/26 handle="k8s-pod-network.593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135" host="ip-172-31-27-10"
Dec 13 02:24:50.701573 env[1728]: 2024-12-13 02:24:50.656 [INFO][4152] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.29.2/26] handle="k8s-pod-network.593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135" host="ip-172-31-27-10"
Dec 13 02:24:50.701573 env[1728]: 2024-12-13 02:24:50.656 [INFO][4152] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:24:50.701573 env[1728]: 2024-12-13 02:24:50.656 [INFO][4152] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.29.2/26] IPv6=[] ContainerID="593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135" HandleID="k8s-pod-network.593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0"
Dec 13 02:24:50.705598 env[1728]: 2024-12-13 02:24:50.659 [INFO][4109] cni-plugin/k8s.go 386: Populated endpoint ContainerID="593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135" Namespace="kube-system" Pod="coredns-6f6b679f8f-9xkb6" WorkloadEndpoint="ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"2a602144-c33c-4da8-88d8-1d35cd28e74d", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 16, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"", Pod:"coredns-6f6b679f8f-9xkb6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.29.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4356c2747b1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:24:50.705598 env[1728]: 2024-12-13 02:24:50.659 [INFO][4109] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.29.2/32] ContainerID="593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135" Namespace="kube-system" Pod="coredns-6f6b679f8f-9xkb6" WorkloadEndpoint="ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0"
Dec 13 02:24:50.705598 env[1728]: 2024-12-13 02:24:50.659 [INFO][4109] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4356c2747b1 ContainerID="593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135" Namespace="kube-system" Pod="coredns-6f6b679f8f-9xkb6" WorkloadEndpoint="ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0"
Dec 13 02:24:50.705598 env[1728]: 2024-12-13 02:24:50.665 [INFO][4109] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135" Namespace="kube-system" Pod="coredns-6f6b679f8f-9xkb6" WorkloadEndpoint="ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0"
Dec 13 02:24:50.705598 env[1728]: 2024-12-13 02:24:50.665 [INFO][4109] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135" Namespace="kube-system" Pod="coredns-6f6b679f8f-9xkb6" WorkloadEndpoint="ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"2a602144-c33c-4da8-88d8-1d35cd28e74d", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 16, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135", Pod:"coredns-6f6b679f8f-9xkb6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.29.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4356c2747b1", MAC:"46:fc:20:b0:22:69", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:24:50.705598 env[1728]: 2024-12-13 02:24:50.695 [INFO][4109] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135" Namespace="kube-system" Pod="coredns-6f6b679f8f-9xkb6" WorkloadEndpoint="ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0"
Dec 13 02:24:50.741004 env[1728]: time="2024-12-13T02:24:50.740903436Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 02:24:50.741004 env[1728]: time="2024-12-13T02:24:50.740998916Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 02:24:50.741232 env[1728]: time="2024-12-13T02:24:50.741027762Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 02:24:50.741311 env[1728]: time="2024-12-13T02:24:50.741249916Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135 pid=4179 runtime=io.containerd.runc.v2
Dec 13 02:24:50.781235 systemd[1]: Started cri-containerd-593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135.scope.
Dec 13 02:24:50.825000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.825000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.825000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.825000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.825000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.825000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.825000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.825000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.825000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.825000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.825000 audit: BPF prog-id=146 op=LOAD
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { bpf } for  pid=4187 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4179 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539336230383164306138633966346666353337343965333536653765
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { perfmon } for  pid=4187 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4179 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539336230383164306138633966346666353337343965333536653765
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { bpf } for  pid=4187 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { bpf } for  pid=4187 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { bpf } for  pid=4187 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { perfmon } for  pid=4187 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { perfmon } for  pid=4187 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { perfmon } for  pid=4187 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { perfmon } for  pid=4187 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { perfmon } for  pid=4187 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { bpf } for  pid=4187 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { bpf } for  pid=4187 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit: BPF prog-id=147 op=LOAD
Dec 13 02:24:50.827000 audit[4187]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001fcdd0 items=0 ppid=4179 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539336230383164306138633966346666353337343965333536653765
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { bpf } for  pid=4187 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { bpf } for  pid=4187 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { perfmon } for  pid=4187 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { perfmon } for  pid=4187 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { perfmon } for  pid=4187 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { perfmon } for  pid=4187 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { perfmon } for  pid=4187 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { bpf } for  pid=4187 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { bpf } for  pid=4187 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit: BPF prog-id=148 op=LOAD
Dec 13 02:24:50.827000 audit[4187]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001fce18 items=0 ppid=4179 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539336230383164306138633966346666353337343965333536653765
Dec 13 02:24:50.827000 audit: BPF prog-id=148 op=UNLOAD
Dec 13 02:24:50.827000 audit: BPF prog-id=147 op=UNLOAD
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { bpf } for  pid=4187 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { bpf } for  pid=4187 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { bpf } for  pid=4187 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { perfmon } for  pid=4187 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { perfmon } for  pid=4187 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { perfmon } for  pid=4187 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { perfmon } for  pid=4187 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { perfmon } for  pid=4187 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { bpf } for  pid=4187 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit[4187]: AVC avc:  denied  { bpf } for  pid=4187 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.827000 audit: BPF prog-id=149 op=LOAD
Dec 13 02:24:50.827000 audit[4187]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001fd228 items=0 ppid=4179 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539336230383164306138633966346666353337343965333536653765
Dec 13 02:24:50.847000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.847000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.847000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.847000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.847000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.847000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.847000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.847000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.847000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.847000 audit: BPF prog-id=150 op=LOAD
Dec 13 02:24:50.847000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff754ed430 a2=40 a3=1 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.848000 audit: BPF prog-id=150 op=UNLOAD
Dec 13 02:24:50.848000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.848000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff754ed500 a2=50 a3=7fff754ed5e0 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.848000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.866000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.866000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff754ed440 a2=28 a3=0 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.866000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.866000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.866000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff754ed470 a2=28 a3=0 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.866000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.866000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.866000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff754ed380 a2=28 a3=0 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.866000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.866000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.866000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff754ed490 a2=28 a3=0 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.866000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.866000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.866000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff754ed470 a2=28 a3=0 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.866000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.866000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.866000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff754ed460 a2=28 a3=0 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.866000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.866000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.866000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff754ed490 a2=28 a3=0 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.866000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.866000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.866000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff754ed470 a2=28 a3=0 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.866000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.866000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.866000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff754ed490 a2=28 a3=0 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.866000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.866000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.866000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff754ed460 a2=28 a3=0 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.866000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.866000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.866000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff754ed4d0 a2=28 a3=0 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.866000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff754ed280 a2=50 a3=1 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.867000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit: BPF prog-id=151 op=LOAD
Dec 13 02:24:50.867000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff754ed280 a2=94 a3=5 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.867000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.867000 audit: BPF prog-id=151 op=UNLOAD
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff754ed330 a2=50 a3=1 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.867000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff754ed450 a2=4 a3=38 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.867000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.867000 audit[4161]: AVC avc:  denied  { confidentiality } for  pid=4161 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:24:50.867000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff754ed4a0 a2=94 a3=6 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.867000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { confidentiality } for  pid=4161 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:24:50.868000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff754ecc50 a2=94 a3=83 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.868000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { perfmon } for  pid=4161 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { bpf } for  pid=4161 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.868000 audit[4161]: AVC avc:  denied  { confidentiality } for  pid=4161 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:24:50.868000 audit[4161]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff754ecc50 a2=94 a3=83 items=0 ppid=3912 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.868000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:24:50.902678 env[1728]: time="2024-12-13T02:24:50.902629854Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-9xkb6,Uid:2a602144-c33c-4da8-88d8-1d35cd28e74d,Namespace:kube-system,Attempt:1,} returns sandbox id \"593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135\""
Dec 13 02:24:50.904000 audit[4213]: AVC avc:  denied  { bpf } for  pid=4213 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.904000 audit[4213]: AVC avc:  denied  { bpf } for  pid=4213 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.904000 audit[4213]: AVC avc:  denied  { perfmon } for  pid=4213 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.904000 audit[4213]: AVC avc:  denied  { perfmon } for  pid=4213 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.904000 audit[4213]: AVC avc:  denied  { perfmon } for  pid=4213 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.904000 audit[4213]: AVC avc:  denied  { perfmon } for  pid=4213 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.904000 audit[4213]: AVC avc:  denied  { perfmon } for  pid=4213 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.904000 audit[4213]: AVC avc:  denied  { bpf } for  pid=4213 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.904000 audit[4213]: AVC avc:  denied  { bpf } for  pid=4213 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.904000 audit: BPF prog-id=152 op=LOAD
Dec 13 02:24:50.904000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc1cb6de20 a2=98 a3=1999999999999999 items=0 ppid=3912 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.904000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F
Dec 13 02:24:50.906000 audit: BPF prog-id=152 op=UNLOAD
Dec 13 02:24:50.906000 audit[4213]: AVC avc:  denied  { bpf } for  pid=4213 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.906000 audit[4213]: AVC avc:  denied  { bpf } for  pid=4213 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.906000 audit[4213]: AVC avc:  denied  { perfmon } for  pid=4213 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.906000 audit[4213]: AVC avc:  denied  { perfmon } for  pid=4213 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.906000 audit[4213]: AVC avc:  denied  { perfmon } for  pid=4213 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.906000 audit[4213]: AVC avc:  denied  { perfmon } for  pid=4213 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.906000 audit[4213]: AVC avc:  denied  { perfmon } for  pid=4213 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.906000 audit[4213]: AVC avc:  denied  { bpf } for  pid=4213 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.906000 audit[4213]: AVC avc:  denied  { bpf } for  pid=4213 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.906000 audit: BPF prog-id=153 op=LOAD
Dec 13 02:24:50.906000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc1cb6dd00 a2=74 a3=ffff items=0 ppid=3912 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.906000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F
Dec 13 02:24:50.907000 audit: BPF prog-id=153 op=UNLOAD
Dec 13 02:24:50.907000 audit[4213]: AVC avc:  denied  { bpf } for  pid=4213 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.907000 audit[4213]: AVC avc:  denied  { bpf } for  pid=4213 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.907000 audit[4213]: AVC avc:  denied  { perfmon } for  pid=4213 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.907000 audit[4213]: AVC avc:  denied  { perfmon } for  pid=4213 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.907000 audit[4213]: AVC avc:  denied  { perfmon } for  pid=4213 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.907000 audit[4213]: AVC avc:  denied  { perfmon } for  pid=4213 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.907000 audit[4213]: AVC avc:  denied  { perfmon } for  pid=4213 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.907000 audit[4213]: AVC avc:  denied  { bpf } for  pid=4213 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.907000 audit[4213]: AVC avc:  denied  { bpf } for  pid=4213 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:50.907000 audit: BPF prog-id=154 op=LOAD
Dec 13 02:24:50.907000 audit[4213]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc1cb6dd40 a2=40 a3=7ffc1cb6df20 items=0 ppid=3912 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:50.907000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F
Dec 13 02:24:50.908000 audit: BPF prog-id=154 op=UNLOAD
Dec 13 02:24:50.912260 env[1728]: time="2024-12-13T02:24:50.904324428Z" level=info msg="StopPodSandbox for \"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\""
Dec 13 02:24:50.924835 env[1728]: time="2024-12-13T02:24:50.924621301Z" level=info msg="CreateContainer within sandbox \"593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135\" for container &ContainerMetadata{Name:coredns,Attempt:0,}"
Dec 13 02:24:50.995424 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3792548515.mount: Deactivated successfully.
Dec 13 02:24:51.007818 env[1728]: time="2024-12-13T02:24:51.006056141Z" level=info msg="CreateContainer within sandbox \"593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"75e1b865e01c682935142929dbf419a071c53a62d01f1d371d7ed2f41b992381\""
Dec 13 02:24:51.007818 env[1728]: time="2024-12-13T02:24:51.007328742Z" level=info msg="StartContainer for \"75e1b865e01c682935142929dbf419a071c53a62d01f1d371d7ed2f41b992381\""
Dec 13 02:24:51.088576 systemd-networkd[1457]: cali0bc46136f9a: Gained IPv6LL
Dec 13 02:24:51.121520 systemd-networkd[1457]: vxlan.calico: Link UP
Dec 13 02:24:51.121539 systemd-networkd[1457]: vxlan.calico: Gained carrier
Dec 13 02:24:51.296436 systemd[1]: Started cri-containerd-75e1b865e01c682935142929dbf419a071c53a62d01f1d371d7ed2f41b992381.scope.
Dec 13 02:24:51.315977 env[1728]: 2024-12-13 02:24:51.206 [INFO][4238] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c"
Dec 13 02:24:51.315977 env[1728]: 2024-12-13 02:24:51.207 [INFO][4238] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" iface="eth0" netns="/var/run/netns/cni-29fa745f-d16e-93a4-cdce-e4fc6c5074f6"
Dec 13 02:24:51.315977 env[1728]: 2024-12-13 02:24:51.207 [INFO][4238] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" iface="eth0" netns="/var/run/netns/cni-29fa745f-d16e-93a4-cdce-e4fc6c5074f6"
Dec 13 02:24:51.315977 env[1728]: 2024-12-13 02:24:51.208 [INFO][4238] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone.  Nothing to do. ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" iface="eth0" netns="/var/run/netns/cni-29fa745f-d16e-93a4-cdce-e4fc6c5074f6"
Dec 13 02:24:51.315977 env[1728]: 2024-12-13 02:24:51.208 [INFO][4238] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c"
Dec 13 02:24:51.315977 env[1728]: 2024-12-13 02:24:51.208 [INFO][4238] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c"
Dec 13 02:24:51.315977 env[1728]: 2024-12-13 02:24:51.270 [INFO][4269] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" HandleID="k8s-pod-network.cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0"
Dec 13 02:24:51.315977 env[1728]: 2024-12-13 02:24:51.271 [INFO][4269] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:24:51.315977 env[1728]: 2024-12-13 02:24:51.271 [INFO][4269] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:24:51.315977 env[1728]: 2024-12-13 02:24:51.286 [WARNING][4269] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" HandleID="k8s-pod-network.cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0"
Dec 13 02:24:51.315977 env[1728]: 2024-12-13 02:24:51.287 [INFO][4269] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" HandleID="k8s-pod-network.cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0"
Dec 13 02:24:51.315977 env[1728]: 2024-12-13 02:24:51.289 [INFO][4269] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:24:51.315977 env[1728]: 2024-12-13 02:24:51.305 [INFO][4238] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c"
Dec 13 02:24:51.322569 env[1728]: time="2024-12-13T02:24:51.322402746Z" level=info msg="TearDown network for sandbox \"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\" successfully"
Dec 13 02:24:51.322569 env[1728]: time="2024-12-13T02:24:51.322457860Z" level=info msg="StopPodSandbox for \"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\" returns successfully"
Dec 13 02:24:51.328024 env[1728]: time="2024-12-13T02:24:51.327626587Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-n7sz7,Uid:b041a7c4-d9f0-4862-b845-5a767cf888b6,Namespace:kube-system,Attempt:1,}"
Dec 13 02:24:51.398000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.398000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.398000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.398000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.398000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.398000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.398000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.398000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.398000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.398000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.398000 audit: BPF prog-id=155 op=LOAD
Dec 13 02:24:51.403000 audit[4253]: AVC avc:  denied  { bpf } for  pid=4253 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.403000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4179 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735653162383635653031633638323933353134323932396462663431
Dec 13 02:24:51.404000 audit[4253]: AVC avc:  denied  { perfmon } for  pid=4253 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.404000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4179 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735653162383635653031633638323933353134323932396462663431
Dec 13 02:24:51.404000 audit[4253]: AVC avc:  denied  { bpf } for  pid=4253 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.404000 audit[4253]: AVC avc:  denied  { bpf } for  pid=4253 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.404000 audit[4253]: AVC avc:  denied  { bpf } for  pid=4253 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.404000 audit[4253]: AVC avc:  denied  { perfmon } for  pid=4253 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.404000 audit[4253]: AVC avc:  denied  { perfmon } for  pid=4253 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.404000 audit[4253]: AVC avc:  denied  { perfmon } for  pid=4253 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.404000 audit[4253]: AVC avc:  denied  { perfmon } for  pid=4253 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.404000 audit[4253]: AVC avc:  denied  { perfmon } for  pid=4253 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.404000 audit[4253]: AVC avc:  denied  { bpf } for  pid=4253 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.404000 audit[4253]: AVC avc:  denied  { bpf } for  pid=4253 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.404000 audit: BPF prog-id=156 op=LOAD
Dec 13 02:24:51.404000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000257d40 items=0 ppid=4179 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735653162383635653031633638323933353134323932396462663431
Dec 13 02:24:51.406000 audit[4253]: AVC avc:  denied  { bpf } for  pid=4253 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.406000 audit[4253]: AVC avc:  denied  { bpf } for  pid=4253 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.406000 audit[4253]: AVC avc:  denied  { perfmon } for  pid=4253 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.406000 audit[4253]: AVC avc:  denied  { perfmon } for  pid=4253 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.406000 audit[4253]: AVC avc:  denied  { perfmon } for  pid=4253 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.406000 audit[4253]: AVC avc:  denied  { perfmon } for  pid=4253 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.406000 audit[4253]: AVC avc:  denied  { perfmon } for  pid=4253 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.406000 audit[4253]: AVC avc:  denied  { bpf } for  pid=4253 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.406000 audit[4253]: AVC avc:  denied  { bpf } for  pid=4253 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.406000 audit: BPF prog-id=157 op=LOAD
Dec 13 02:24:51.406000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000257d88 items=0 ppid=4179 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735653162383635653031633638323933353134323932396462663431
Dec 13 02:24:51.407000 audit: BPF prog-id=157 op=UNLOAD
Dec 13 02:24:51.407000 audit: BPF prog-id=156 op=UNLOAD
Dec 13 02:24:51.407000 audit[4253]: AVC avc:  denied  { bpf } for  pid=4253 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.407000 audit[4253]: AVC avc:  denied  { bpf } for  pid=4253 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.407000 audit[4253]: AVC avc:  denied  { bpf } for  pid=4253 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.407000 audit[4253]: AVC avc:  denied  { perfmon } for  pid=4253 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.407000 audit[4253]: AVC avc:  denied  { perfmon } for  pid=4253 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.407000 audit[4253]: AVC avc:  denied  { perfmon } for  pid=4253 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.407000 audit[4253]: AVC avc:  denied  { perfmon } for  pid=4253 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.407000 audit[4253]: AVC avc:  denied  { perfmon } for  pid=4253 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.407000 audit[4253]: AVC avc:  denied  { bpf } for  pid=4253 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.407000 audit[4253]: AVC avc:  denied  { bpf } for  pid=4253 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.407000 audit: BPF prog-id=158 op=LOAD
Dec 13 02:24:51.407000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003a2198 items=0 ppid=4179 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735653162383635653031633638323933353134323932396462663431
Dec 13 02:24:51.416137 (udev-worker)[4073]: Network interface NamePolicy= disabled on kernel command line.
Dec 13 02:24:51.419000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.419000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.419000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.419000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.419000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.419000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.419000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.419000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.419000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.419000 audit: BPF prog-id=159 op=LOAD
Dec 13 02:24:51.419000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffbefe0700 a2=98 a3=ffffffff items=0 ppid=3912 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.419000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:24:51.419000 audit: BPF prog-id=159 op=UNLOAD
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit: BPF prog-id=160 op=LOAD
Dec 13 02:24:51.420000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffbefe0510 a2=74 a3=540051 items=0 ppid=3912 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:24:51.420000 audit: BPF prog-id=160 op=UNLOAD
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit: BPF prog-id=161 op=LOAD
Dec 13 02:24:51.420000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffbefe0540 a2=94 a3=2 items=0 ppid=3912 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:24:51.420000 audit: BPF prog-id=161 op=UNLOAD
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffbefe0410 a2=28 a3=0 items=0 ppid=3912 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffbefe0440 a2=28 a3=0 items=0 ppid=3912 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffbefe0350 a2=28 a3=0 items=0 ppid=3912 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffbefe0460 a2=28 a3=0 items=0 ppid=3912 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffbefe0440 a2=28 a3=0 items=0 ppid=3912 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffbefe0430 a2=28 a3=0 items=0 ppid=3912 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffbefe0460 a2=28 a3=0 items=0 ppid=3912 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffbefe0440 a2=28 a3=0 items=0 ppid=3912 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffbefe0460 a2=28 a3=0 items=0 ppid=3912 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:24:51.420000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.420000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffbefe0430 a2=28 a3=0 items=0 ppid=3912 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:24:51.422000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.422000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffbefe04a0 a2=28 a3=0 items=0 ppid=3912 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:24:51.422000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.422000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.422000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.422000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.422000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.422000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.422000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.422000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.422000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.422000 audit: BPF prog-id=162 op=LOAD
Dec 13 02:24:51.422000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffbefe0310 a2=40 a3=0 items=0 ppid=3912 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:24:51.422000 audit: BPF prog-id=162 op=UNLOAD
Dec 13 02:24:51.423000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.423000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffbefe0300 a2=50 a3=2800 items=0 ppid=3912 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.423000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:24:51.423000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.423000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffbefe0300 a2=50 a3=2800 items=0 ppid=3912 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.423000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:24:51.423000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.423000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.423000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.423000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.423000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.423000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.423000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.423000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.423000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.423000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.423000 audit: BPF prog-id=163 op=LOAD
Dec 13 02:24:51.423000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffbefdfb20 a2=94 a3=2 items=0 ppid=3912 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.423000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:24:51.424000 audit: BPF prog-id=163 op=UNLOAD
Dec 13 02:24:51.424000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.424000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.424000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.424000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.424000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.424000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.424000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.424000 audit[4296]: AVC avc:  denied  { perfmon } for  pid=4296 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.424000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.424000 audit[4296]: AVC avc:  denied  { bpf } for  pid=4296 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.424000 audit: BPF prog-id=164 op=LOAD
Dec 13 02:24:51.424000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffbefdfc20 a2=94 a3=2d items=0 ppid=3912 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.424000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:24:51.448000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.448000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.448000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.448000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.448000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.448000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.448000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.448000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.448000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.448000 audit: BPF prog-id=165 op=LOAD
Dec 13 02:24:51.448000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcad846a20 a2=98 a3=0 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.448000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:51.449000 audit: BPF prog-id=165 op=UNLOAD
Dec 13 02:24:51.449000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.449000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.449000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.449000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.449000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.449000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.449000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.449000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.449000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.449000 audit: BPF prog-id=166 op=LOAD
Dec 13 02:24:51.449000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcad846800 a2=74 a3=540051 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.449000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:51.451000 audit: BPF prog-id=166 op=UNLOAD
Dec 13 02:24:51.451000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.451000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.451000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.451000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.451000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.451000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.451000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.451000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.451000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.451000 audit: BPF prog-id=167 op=LOAD
Dec 13 02:24:51.451000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcad846830 a2=94 a3=2 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.451000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:51.452000 audit: BPF prog-id=167 op=UNLOAD
Dec 13 02:24:51.512992 systemd[1]: run-netns-cni\x2d29fa745f\x2dd16e\x2d93a4\x2dcdce\x2de4fc6c5074f6.mount: Deactivated successfully.
Dec 13 02:24:51.542877 env[1728]: time="2024-12-13T02:24:51.542820964Z" level=info msg="StartContainer for \"75e1b865e01c682935142929dbf419a071c53a62d01f1d371d7ed2f41b992381\" returns successfully"
Dec 13 02:24:51.729529 systemd-networkd[1457]: cali4356c2747b1: Gained IPv6LL
Dec 13 02:24:51.885423 kernel: kauditd_printk_skb: 584 callbacks suppressed
Dec 13 02:24:51.885745 kernel: audit: type=1400 audit(1734056691.870:1154): avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.885812 kernel: audit: type=1400 audit(1734056691.870:1154): avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.870000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.870000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.870000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.898417 kernel: audit: type=1400 audit(1734056691.870:1154): avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.899360 kernel: audit: type=1400 audit(1734056691.870:1154): avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.870000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.913615 kernel: audit: type=1400 audit(1734056691.870:1154): avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.913763 kernel: audit: type=1400 audit(1734056691.870:1154): avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.870000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.870000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.917580 kernel: audit: type=1400 audit(1734056691.870:1154): avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.917717 kernel: audit: type=1400 audit(1734056691.870:1154): avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.870000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.870000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.922265 env[1728]: time="2024-12-13T02:24:51.922139872Z" level=info msg="StopPodSandbox for \"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\""
Dec 13 02:24:51.927042 (udev-worker)[4314]: Network interface NamePolicy= disabled on kernel command line.
Dec 13 02:24:51.870000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.939732 kernel: audit: type=1400 audit(1734056691.870:1154): avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.939831 kernel: audit: type=1334 audit(1734056691.870:1154): prog-id=168 op=LOAD
Dec 13 02:24:51.870000 audit: BPF prog-id=168 op=LOAD
Dec 13 02:24:51.870000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcad8466f0 a2=40 a3=1 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.870000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:51.928000 audit: BPF prog-id=168 op=UNLOAD
Dec 13 02:24:51.928000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.928000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcad8467c0 a2=50 a3=7ffcad8468a0 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.945547 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid433f5e3a52: link becomes ready
Dec 13 02:24:51.928000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:51.935756 systemd-networkd[1457]: calid433f5e3a52: Link UP
Dec 13 02:24:51.944398 systemd-networkd[1457]: calid433f5e3a52: Gained carrier
Dec 13 02:24:51.996000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.996000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcad846700 a2=28 a3=0 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.996000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:51.999000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.999000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcad846730 a2=28 a3=0 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.999000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:51.999000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.999000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcad846640 a2=28 a3=0 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.999000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:51.999000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:51.999000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcad846750 a2=28 a3=0 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:51.999000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:52.001000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.001000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcad846730 a2=28 a3=0 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.001000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:52.001000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.001000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcad846720 a2=28 a3=0 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.001000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:52.001000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.001000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcad846750 a2=28 a3=0 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.001000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:52.001000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.001000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcad846730 a2=28 a3=0 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.001000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:52.001000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.001000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcad846750 a2=28 a3=0 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.001000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:52.001000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.001000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcad846720 a2=28 a3=0 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.001000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:52.001000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.001000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcad846790 a2=28 a3=0 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.001000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:52.003000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.003000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcad846540 a2=50 a3=1 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:52.005000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.005000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.005000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.005000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.005000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.005000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.005000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.005000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.005000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.005000 audit: BPF prog-id=169 op=LOAD
Dec 13 02:24:52.005000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcad846540 a2=94 a3=5 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.005000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:52.007000 audit: BPF prog-id=169 op=UNLOAD
Dec 13 02:24:52.007000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.007000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcad8465f0 a2=50 a3=1 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.007000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:52.007000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.007000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcad846710 a2=4 a3=38 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.007000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { confidentiality } for  pid=4304 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:24:52.009000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcad846760 a2=94 a3=6 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.009000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.017324 env[1728]: 2024-12-13 02:24:51.613 [INFO][4295] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0 coredns-6f6b679f8f- kube-system  b041a7c4-d9f0-4862-b845-5a767cf888b6 809 0 2024-12-13 02:24:16 +0000 UTC <nil> <nil> map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s  ip-172-31-27-10  coredns-6f6b679f8f-n7sz7 eth0 coredns [] []   [kns.kube-system ksa.kube-system.coredns] calid433f5e3a52  [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b" Namespace="kube-system" Pod="coredns-6f6b679f8f-n7sz7" WorkloadEndpoint="ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-"
Dec 13 02:24:52.017324 env[1728]: 2024-12-13 02:24:51.614 [INFO][4295] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b" Namespace="kube-system" Pod="coredns-6f6b679f8f-n7sz7" WorkloadEndpoint="ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0"
Dec 13 02:24:52.017324 env[1728]: 2024-12-13 02:24:51.711 [INFO][4318] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b" HandleID="k8s-pod-network.b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0"
Dec 13 02:24:52.017324 env[1728]: 2024-12-13 02:24:51.747 [INFO][4318] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b" HandleID="k8s-pod-network.b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318810), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-27-10", "pod":"coredns-6f6b679f8f-n7sz7", "timestamp":"2024-12-13 02:24:51.711612395 +0000 UTC"}, Hostname:"ip-172-31-27-10", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Dec 13 02:24:52.017324 env[1728]: 2024-12-13 02:24:51.747 [INFO][4318] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:24:52.017324 env[1728]: 2024-12-13 02:24:51.748 [INFO][4318] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:24:52.017324 env[1728]: 2024-12-13 02:24:51.748 [INFO][4318] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-10'
Dec 13 02:24:52.017324 env[1728]: 2024-12-13 02:24:51.752 [INFO][4318] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b" host="ip-172-31-27-10"
Dec 13 02:24:52.017324 env[1728]: 2024-12-13 02:24:51.771 [INFO][4318] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-10"
Dec 13 02:24:52.017324 env[1728]: 2024-12-13 02:24:51.790 [INFO][4318] ipam/ipam.go 489: Trying affinity for 192.168.29.0/26 host="ip-172-31-27-10"
Dec 13 02:24:52.017324 env[1728]: 2024-12-13 02:24:51.809 [INFO][4318] ipam/ipam.go 155: Attempting to load block cidr=192.168.29.0/26 host="ip-172-31-27-10"
Dec 13 02:24:52.017324 env[1728]: 2024-12-13 02:24:51.836 [INFO][4318] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.29.0/26 host="ip-172-31-27-10"
Dec 13 02:24:52.017324 env[1728]: 2024-12-13 02:24:51.836 [INFO][4318] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.29.0/26 handle="k8s-pod-network.b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b" host="ip-172-31-27-10"
Dec 13 02:24:52.017324 env[1728]: 2024-12-13 02:24:51.840 [INFO][4318] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b
Dec 13 02:24:52.017324 env[1728]: 2024-12-13 02:24:51.858 [INFO][4318] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.29.0/26 handle="k8s-pod-network.b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b" host="ip-172-31-27-10"
Dec 13 02:24:52.017324 env[1728]: 2024-12-13 02:24:51.886 [INFO][4318] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.29.3/26] block=192.168.29.0/26 handle="k8s-pod-network.b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b" host="ip-172-31-27-10"
Dec 13 02:24:52.017324 env[1728]: 2024-12-13 02:24:51.892 [INFO][4318] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.29.3/26] handle="k8s-pod-network.b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b" host="ip-172-31-27-10"
Dec 13 02:24:52.017324 env[1728]: 2024-12-13 02:24:51.893 [INFO][4318] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:24:52.017324 env[1728]: 2024-12-13 02:24:51.893 [INFO][4318] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.29.3/26] IPv6=[] ContainerID="b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b" HandleID="k8s-pod-network.b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0"
Dec 13 02:24:52.021353 env[1728]: 2024-12-13 02:24:51.920 [INFO][4295] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b" Namespace="kube-system" Pod="coredns-6f6b679f8f-n7sz7" WorkloadEndpoint="ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"b041a7c4-d9f0-4862-b845-5a767cf888b6", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 16, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"", Pod:"coredns-6f6b679f8f-n7sz7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.29.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid433f5e3a52", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:24:52.021353 env[1728]: 2024-12-13 02:24:51.920 [INFO][4295] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.29.3/32] ContainerID="b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b" Namespace="kube-system" Pod="coredns-6f6b679f8f-n7sz7" WorkloadEndpoint="ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0"
Dec 13 02:24:52.021353 env[1728]: 2024-12-13 02:24:51.920 [INFO][4295] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid433f5e3a52 ContainerID="b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b" Namespace="kube-system" Pod="coredns-6f6b679f8f-n7sz7" WorkloadEndpoint="ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0"
Dec 13 02:24:52.021353 env[1728]: 2024-12-13 02:24:51.942 [INFO][4295] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b" Namespace="kube-system" Pod="coredns-6f6b679f8f-n7sz7" WorkloadEndpoint="ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0"
Dec 13 02:24:52.021353 env[1728]: 2024-12-13 02:24:51.952 [INFO][4295] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b" Namespace="kube-system" Pod="coredns-6f6b679f8f-n7sz7" WorkloadEndpoint="ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"b041a7c4-d9f0-4862-b845-5a767cf888b6", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 16, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b", Pod:"coredns-6f6b679f8f-n7sz7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.29.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid433f5e3a52", MAC:"c6:1c:1b:b2:09:13", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:24:52.021353 env[1728]: 2024-12-13 02:24:52.012 [INFO][4295] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b" Namespace="kube-system" Pod="coredns-6f6b679f8f-n7sz7" WorkloadEndpoint="ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0"
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.009000 audit[4304]: AVC avc:  denied  { confidentiality } for  pid=4304 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:24:52.009000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcad845f10 a2=94 a3=83 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.009000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:52.022000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.022000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.022000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.022000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.022000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.022000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.022000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.022000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.022000 audit[4304]: AVC avc:  denied  { perfmon } for  pid=4304 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.022000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.022000 audit[4304]: AVC avc:  denied  { confidentiality } for  pid=4304 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:24:52.022000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcad845f10 a2=94 a3=83 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.022000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:52.023000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.023000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcad847950 a2=10 a3=f1f00800 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.023000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:52.023000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.023000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcad8477f0 a2=10 a3=3 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.023000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:52.023000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.023000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcad847790 a2=10 a3=3 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.023000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:52.023000 audit[4304]: AVC avc:  denied  { bpf } for  pid=4304 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.023000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcad847790 a2=10 a3=7 items=0 ppid=3912 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.023000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:24:52.038000 audit: BPF prog-id=164 op=UNLOAD
Dec 13 02:24:52.086437 env[1728]: time="2024-12-13T02:24:52.086332097Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 02:24:52.086437 env[1728]: time="2024-12-13T02:24:52.086380278Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 02:24:52.086437 env[1728]: time="2024-12-13T02:24:52.086397894Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 02:24:52.087057 env[1728]: time="2024-12-13T02:24:52.086858965Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b pid=4376 runtime=io.containerd.runc.v2
Dec 13 02:24:52.157514 systemd[1]: Started cri-containerd-b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b.scope.
Dec 13 02:24:52.180111 systemd[1]: run-containerd-runc-k8s.io-b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b-runc.q3fYYM.mount: Deactivated successfully.
Dec 13 02:24:52.308000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.308000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.308000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.308000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.308000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.308000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.308000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.308000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.308000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.309000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.309000 audit: BPF prog-id=170 op=LOAD
Dec 13 02:24:52.310000 audit[4389]: AVC avc:  denied  { bpf } for  pid=4389 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.310000 audit[4389]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4376 pid=4389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233643536323161323762366364643363306163643462303733346531
Dec 13 02:24:52.310000 audit[4389]: AVC avc:  denied  { perfmon } for  pid=4389 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.310000 audit[4389]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4376 pid=4389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233643536323161323762366364643363306163643462303733346531
Dec 13 02:24:52.310000 audit[4389]: AVC avc:  denied  { bpf } for  pid=4389 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.310000 audit[4389]: AVC avc:  denied  { bpf } for  pid=4389 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.310000 audit[4389]: AVC avc:  denied  { bpf } for  pid=4389 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.310000 audit[4389]: AVC avc:  denied  { perfmon } for  pid=4389 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.310000 audit[4389]: AVC avc:  denied  { perfmon } for  pid=4389 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.310000 audit[4389]: AVC avc:  denied  { perfmon } for  pid=4389 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.310000 audit[4389]: AVC avc:  denied  { perfmon } for  pid=4389 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.310000 audit[4389]: AVC avc:  denied  { perfmon } for  pid=4389 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.310000 audit[4389]: AVC avc:  denied  { bpf } for  pid=4389 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.310000 audit[4389]: AVC avc:  denied  { bpf } for  pid=4389 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.310000 audit: BPF prog-id=171 op=LOAD
Dec 13 02:24:52.310000 audit[4389]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000207c50 items=0 ppid=4376 pid=4389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233643536323161323762366364643363306163643462303733346531
Dec 13 02:24:52.310000 audit[4389]: AVC avc:  denied  { bpf } for  pid=4389 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.310000 audit[4389]: AVC avc:  denied  { bpf } for  pid=4389 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.310000 audit[4389]: AVC avc:  denied  { perfmon } for  pid=4389 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.310000 audit[4389]: AVC avc:  denied  { perfmon } for  pid=4389 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.310000 audit[4389]: AVC avc:  denied  { perfmon } for  pid=4389 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.310000 audit[4389]: AVC avc:  denied  { perfmon } for  pid=4389 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.310000 audit[4389]: AVC avc:  denied  { perfmon } for  pid=4389 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.310000 audit[4389]: AVC avc:  denied  { bpf } for  pid=4389 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.310000 audit[4389]: AVC avc:  denied  { bpf } for  pid=4389 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.310000 audit: BPF prog-id=172 op=LOAD
Dec 13 02:24:52.310000 audit[4389]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000207c98 items=0 ppid=4376 pid=4389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233643536323161323762366364643363306163643462303733346531
Dec 13 02:24:52.310000 audit: BPF prog-id=172 op=UNLOAD
Dec 13 02:24:52.310000 audit: BPF prog-id=171 op=UNLOAD
Dec 13 02:24:52.311000 audit[4389]: AVC avc:  denied  { bpf } for  pid=4389 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.311000 audit[4389]: AVC avc:  denied  { bpf } for  pid=4389 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.311000 audit[4389]: AVC avc:  denied  { bpf } for  pid=4389 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.311000 audit[4389]: AVC avc:  denied  { perfmon } for  pid=4389 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.311000 audit[4389]: AVC avc:  denied  { perfmon } for  pid=4389 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.311000 audit[4389]: AVC avc:  denied  { perfmon } for  pid=4389 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.311000 audit[4389]: AVC avc:  denied  { perfmon } for  pid=4389 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.311000 audit[4389]: AVC avc:  denied  { perfmon } for  pid=4389 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.311000 audit[4389]: AVC avc:  denied  { bpf } for  pid=4389 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.311000 audit[4389]: AVC avc:  denied  { bpf } for  pid=4389 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.311000 audit: BPF prog-id=173 op=LOAD
Dec 13 02:24:52.311000 audit[4389]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003900a8 items=0 ppid=4376 pid=4389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233643536323161323762366364643363306163643462303733346531
Dec 13 02:24:52.391187 systemd-networkd[1457]: vxlan.calico: Gained IPv6LL
Dec 13 02:24:52.506132 env[1728]: time="2024-12-13T02:24:52.506086155Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-n7sz7,Uid:b041a7c4-d9f0-4862-b845-5a767cf888b6,Namespace:kube-system,Attempt:1,} returns sandbox id \"b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b\""
Dec 13 02:24:52.509610 env[1728]: time="2024-12-13T02:24:52.509567708Z" level=info msg="CreateContainer within sandbox \"b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}"
Dec 13 02:24:52.538259 env[1728]: 2024-12-13 02:24:52.141 [INFO][4345] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234"
Dec 13 02:24:52.538259 env[1728]: 2024-12-13 02:24:52.141 [INFO][4345] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" iface="eth0" netns="/var/run/netns/cni-4a8ad945-d8e6-159b-aff7-76292b651e8d"
Dec 13 02:24:52.538259 env[1728]: 2024-12-13 02:24:52.142 [INFO][4345] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" iface="eth0" netns="/var/run/netns/cni-4a8ad945-d8e6-159b-aff7-76292b651e8d"
Dec 13 02:24:52.538259 env[1728]: 2024-12-13 02:24:52.143 [INFO][4345] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone.  Nothing to do. ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" iface="eth0" netns="/var/run/netns/cni-4a8ad945-d8e6-159b-aff7-76292b651e8d"
Dec 13 02:24:52.538259 env[1728]: 2024-12-13 02:24:52.143 [INFO][4345] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234"
Dec 13 02:24:52.538259 env[1728]: 2024-12-13 02:24:52.143 [INFO][4345] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234"
Dec 13 02:24:52.538259 env[1728]: 2024-12-13 02:24:52.381 [INFO][4398] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" HandleID="k8s-pod-network.4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0"
Dec 13 02:24:52.538259 env[1728]: 2024-12-13 02:24:52.382 [INFO][4398] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:24:52.538259 env[1728]: 2024-12-13 02:24:52.382 [INFO][4398] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:24:52.538259 env[1728]: 2024-12-13 02:24:52.514 [WARNING][4398] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" HandleID="k8s-pod-network.4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0"
Dec 13 02:24:52.538259 env[1728]: 2024-12-13 02:24:52.514 [INFO][4398] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" HandleID="k8s-pod-network.4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0"
Dec 13 02:24:52.538259 env[1728]: 2024-12-13 02:24:52.517 [INFO][4398] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:24:52.538259 env[1728]: 2024-12-13 02:24:52.519 [INFO][4345] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234"
Dec 13 02:24:52.538259 env[1728]: time="2024-12-13T02:24:52.530031142Z" level=info msg="TearDown network for sandbox \"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\" successfully"
Dec 13 02:24:52.538259 env[1728]: time="2024-12-13T02:24:52.530075444Z" level=info msg="StopPodSandbox for \"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\" returns successfully"
Dec 13 02:24:52.535581 systemd[1]: run-netns-cni\x2d4a8ad945\x2dd8e6\x2d159b\x2daff7\x2d76292b651e8d.mount: Deactivated successfully.
Dec 13 02:24:52.557000 audit[4428]: NETFILTER_CFG table=nat:101 family=2 entries=15 op=nft_register_chain pid=4428 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 02:24:52.565342 env[1728]: time="2024-12-13T02:24:52.565293707Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74bf487454-f5nw8,Uid:451fe638-c64f-4a5e-b8f8-88ad281bca14,Namespace:calico-apiserver,Attempt:1,}"
Dec 13 02:24:52.557000 audit[4428]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fffdb80fa40 a2=0 a3=7fffdb80fa2c items=0 ppid=3912 pid=4428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.557000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 02:24:52.573035 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount502537513.mount: Deactivated successfully.
Dec 13 02:24:52.587000 audit[4439]: NETFILTER_CFG table=mangle:102 family=2 entries=16 op=nft_register_chain pid=4439 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 02:24:52.587000 audit[4439]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc607cd670 a2=0 a3=7ffc607cd65c items=0 ppid=3912 pid=4439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.587000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 02:24:52.619000 audit[4443]: NETFILTER_CFG table=filter:103 family=2 entries=99 op=nft_register_chain pid=4443 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 02:24:52.619000 audit[4443]: SYSCALL arch=c000003e syscall=46 success=yes exit=53840 a0=3 a1=7fff4b287030 a2=0 a3=7fff4b28701c items=0 ppid=3912 pid=4443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.619000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 02:24:52.626000 audit[4438]: NETFILTER_CFG table=raw:104 family=2 entries=21 op=nft_register_chain pid=4438 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 02:24:52.626000 audit[4438]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fffb33ff860 a2=0 a3=7fffb33ff84c items=0 ppid=3912 pid=4438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.626000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 02:24:52.630915 env[1728]: time="2024-12-13T02:24:52.630871403Z" level=info msg="CreateContainer within sandbox \"b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"0e11fa5965a54d8d76bdf4ff0d511e6d1217c79452a596e5ad12100b8b51cc7e\""
Dec 13 02:24:52.631647 env[1728]: time="2024-12-13T02:24:52.631617418Z" level=info msg="StartContainer for \"0e11fa5965a54d8d76bdf4ff0d511e6d1217c79452a596e5ad12100b8b51cc7e\""
Dec 13 02:24:52.700318 kubelet[2727]: I1213 02:24:52.700253    2727 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-9xkb6" podStartSLOduration=36.700226063 podStartE2EDuration="36.700226063s" podCreationTimestamp="2024-12-13 02:24:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:24:52.663786293 +0000 UTC m=+41.039608730" watchObservedRunningTime="2024-12-13 02:24:52.700226063 +0000 UTC m=+41.076048499"
Dec 13 02:24:52.708626 systemd[1]: Started cri-containerd-0e11fa5965a54d8d76bdf4ff0d511e6d1217c79452a596e5ad12100b8b51cc7e.scope.
Dec 13 02:24:52.776000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.776000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.776000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.776000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.776000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.776000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.776000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.776000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.776000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.776000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.776000 audit: BPF prog-id=174 op=LOAD
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { bpf } for  pid=4454 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4376 pid=4454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313166613539363561353464386437366264663466663064353131
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { perfmon } for  pid=4454 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4376 pid=4454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313166613539363561353464386437366264663466663064353131
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { bpf } for  pid=4454 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { bpf } for  pid=4454 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { bpf } for  pid=4454 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { perfmon } for  pid=4454 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { perfmon } for  pid=4454 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { perfmon } for  pid=4454 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { perfmon } for  pid=4454 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { perfmon } for  pid=4454 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { bpf } for  pid=4454 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { bpf } for  pid=4454 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit: BPF prog-id=175 op=LOAD
Dec 13 02:24:52.777000 audit[4454]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003082e0 items=0 ppid=4376 pid=4454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313166613539363561353464386437366264663466663064353131
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { bpf } for  pid=4454 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { bpf } for  pid=4454 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { perfmon } for  pid=4454 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { perfmon } for  pid=4454 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { perfmon } for  pid=4454 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { perfmon } for  pid=4454 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { perfmon } for  pid=4454 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { bpf } for  pid=4454 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { bpf } for  pid=4454 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit: BPF prog-id=176 op=LOAD
Dec 13 02:24:52.777000 audit[4454]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000308328 items=0 ppid=4376 pid=4454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313166613539363561353464386437366264663466663064353131
Dec 13 02:24:52.777000 audit: BPF prog-id=176 op=UNLOAD
Dec 13 02:24:52.777000 audit: BPF prog-id=175 op=UNLOAD
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { bpf } for  pid=4454 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { bpf } for  pid=4454 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { bpf } for  pid=4454 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { perfmon } for  pid=4454 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { perfmon } for  pid=4454 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { perfmon } for  pid=4454 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { perfmon } for  pid=4454 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { perfmon } for  pid=4454 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { bpf } for  pid=4454 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit[4454]: AVC avc:  denied  { bpf } for  pid=4454 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:52.777000 audit: BPF prog-id=177 op=LOAD
Dec 13 02:24:52.777000 audit[4454]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000308738 items=0 ppid=4376 pid=4454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313166613539363561353464386437366264663466663064353131
Dec 13 02:24:52.853464 env[1728]: time="2024-12-13T02:24:52.853351918Z" level=info msg="StartContainer for \"0e11fa5965a54d8d76bdf4ff0d511e6d1217c79452a596e5ad12100b8b51cc7e\" returns successfully"
Dec 13 02:24:52.863360 env[1728]: time="2024-12-13T02:24:52.863317549Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:52.865000 audit[4499]: NETFILTER_CFG table=filter:105 family=2 entries=34 op=nft_register_chain pid=4499 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 02:24:52.865000 audit[4499]: SYSCALL arch=c000003e syscall=46 success=yes exit=18220 a0=3 a1=7ffc05799df0 a2=0 a3=7ffc05799ddc items=0 ppid=3912 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.865000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 02:24:52.869053 env[1728]: time="2024-12-13T02:24:52.869014386Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:52.875957 env[1728]: time="2024-12-13T02:24:52.875906345Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:52.881008 env[1728]: time="2024-12-13T02:24:52.880967819Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:52.881973 env[1728]: time="2024-12-13T02:24:52.881935515Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\""
Dec 13 02:24:52.897796 env[1728]: time="2024-12-13T02:24:52.897745417Z" level=info msg="StopPodSandbox for \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\""
Dec 13 02:24:52.898966 env[1728]: time="2024-12-13T02:24:52.898921520Z" level=info msg="StopPodSandbox for \"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\""
Dec 13 02:24:52.898000 audit[4503]: NETFILTER_CFG table=filter:106 family=2 entries=16 op=nft_register_rule pid=4503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:52.898000 audit[4503]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe98484c60 a2=0 a3=7ffe98484c4c items=0 ppid=2876 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.898000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:52.902319 env[1728]: time="2024-12-13T02:24:52.902270584Z" level=info msg="CreateContainer within sandbox \"d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}"
Dec 13 02:24:52.959000 audit[4503]: NETFILTER_CFG table=nat:107 family=2 entries=14 op=nft_register_rule pid=4503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:52.959000 audit[4503]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe98484c60 a2=0 a3=0 items=0 ppid=2876 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:52.959000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:52.980899 env[1728]: time="2024-12-13T02:24:52.980847079Z" level=info msg="CreateContainer within sandbox \"d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"f334c8446ce1d27b73c98122dc7b68082b49ffb70a949593fdbd075aa4caf2c8\""
Dec 13 02:24:52.984681 env[1728]: time="2024-12-13T02:24:52.984636411Z" level=info msg="StartContainer for \"f334c8446ce1d27b73c98122dc7b68082b49ffb70a949593fdbd075aa4caf2c8\""
Dec 13 02:24:53.029000 audit[4552]: NETFILTER_CFG table=filter:108 family=2 entries=13 op=nft_register_rule pid=4552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:53.029000 audit[4552]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe1812f890 a2=0 a3=7ffe1812f87c items=0 ppid=2876 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:53.029000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:53.035000 audit[4552]: NETFILTER_CFG table=nat:109 family=2 entries=35 op=nft_register_chain pid=4552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:53.035000 audit[4552]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe1812f890 a2=0 a3=7ffe1812f87c items=0 ppid=2876 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:53.035000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:53.073518 systemd-networkd[1457]: calid433f5e3a52: Gained IPv6LL
Dec 13 02:24:53.078136 systemd[1]: Started cri-containerd-f334c8446ce1d27b73c98122dc7b68082b49ffb70a949593fdbd075aa4caf2c8.scope.
Dec 13 02:24:53.341305 systemd-networkd[1457]: calia44526f6143: Link UP
Dec 13 02:24:53.346498 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Dec 13 02:24:53.346641 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia44526f6143: link becomes ready
Dec 13 02:24:53.347479 systemd-networkd[1457]: calia44526f6143: Gained carrier
Dec 13 02:24:53.369000 audit[4547]: AVC avc:  denied  { perfmon } for  pid=4547 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.369000 audit[4547]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f10f80ab758 items=0 ppid=4079 pid=4547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:53.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333463383434366365316432376237336339383132326463376236
Dec 13 02:24:53.369000 audit[4547]: AVC avc:  denied  { bpf } for  pid=4547 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.369000 audit[4547]: AVC avc:  denied  { bpf } for  pid=4547 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.369000 audit[4547]: AVC avc:  denied  { bpf } for  pid=4547 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.369000 audit[4547]: AVC avc:  denied  { perfmon } for  pid=4547 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.369000 audit[4547]: AVC avc:  denied  { perfmon } for  pid=4547 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.369000 audit[4547]: AVC avc:  denied  { perfmon } for  pid=4547 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.369000 audit[4547]: AVC avc:  denied  { perfmon } for  pid=4547 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.369000 audit[4547]: AVC avc:  denied  { perfmon } for  pid=4547 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.369000 audit[4547]: AVC avc:  denied  { bpf } for  pid=4547 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.369000 audit[4547]: AVC avc:  denied  { bpf } for  pid=4547 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.369000 audit: BPF prog-id=178 op=LOAD
Dec 13 02:24:53.369000 audit[4547]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000344028 items=0 ppid=4079 pid=4547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:53.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333463383434366365316432376237336339383132326463376236
Dec 13 02:24:53.370000 audit[4547]: AVC avc:  denied  { bpf } for  pid=4547 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.370000 audit[4547]: AVC avc:  denied  { bpf } for  pid=4547 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.370000 audit[4547]: AVC avc:  denied  { perfmon } for  pid=4547 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.370000 audit[4547]: AVC avc:  denied  { perfmon } for  pid=4547 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.370000 audit[4547]: AVC avc:  denied  { perfmon } for  pid=4547 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.370000 audit[4547]: AVC avc:  denied  { perfmon } for  pid=4547 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.370000 audit[4547]: AVC avc:  denied  { perfmon } for  pid=4547 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.370000 audit[4547]: AVC avc:  denied  { bpf } for  pid=4547 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.370000 audit[4547]: AVC avc:  denied  { bpf } for  pid=4547 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.370000 audit: BPF prog-id=179 op=LOAD
Dec 13 02:24:53.370000 audit[4547]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000344078 items=0 ppid=4079 pid=4547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:53.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333463383434366365316432376237336339383132326463376236
Dec 13 02:24:53.370000 audit: BPF prog-id=179 op=UNLOAD
Dec 13 02:24:53.370000 audit: BPF prog-id=178 op=UNLOAD
Dec 13 02:24:53.370000 audit[4547]: AVC avc:  denied  { bpf } for  pid=4547 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.370000 audit[4547]: AVC avc:  denied  { bpf } for  pid=4547 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.370000 audit[4547]: AVC avc:  denied  { bpf } for  pid=4547 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.370000 audit[4547]: AVC avc:  denied  { perfmon } for  pid=4547 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.370000 audit[4547]: AVC avc:  denied  { perfmon } for  pid=4547 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.370000 audit[4547]: AVC avc:  denied  { perfmon } for  pid=4547 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.370000 audit[4547]: AVC avc:  denied  { perfmon } for  pid=4547 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.370000 audit[4547]: AVC avc:  denied  { perfmon } for  pid=4547 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.370000 audit[4547]: AVC avc:  denied  { bpf } for  pid=4547 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.370000 audit[4547]: AVC avc:  denied  { bpf } for  pid=4547 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.370000 audit: BPF prog-id=180 op=LOAD
Dec 13 02:24:53.370000 audit[4547]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000344108 items=0 ppid=4079 pid=4547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:53.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333463383434366365316432376237336339383132326463376236
Dec 13 02:24:53.405114 env[1728]: 2024-12-13 02:24:52.807 [INFO][4453] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0 calico-apiserver-74bf487454- calico-apiserver  451fe638-c64f-4a5e-b8f8-88ad281bca14 815 0 2024-12-13 02:24:24 +0000 UTC <nil> <nil> map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:74bf487454 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s  ip-172-31-27-10  calico-apiserver-74bf487454-f5nw8 eth0 calico-apiserver [] []   [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calia44526f6143  [] []}} ContainerID="f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336" Namespace="calico-apiserver" Pod="calico-apiserver-74bf487454-f5nw8" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-"
Dec 13 02:24:53.405114 env[1728]: 2024-12-13 02:24:52.807 [INFO][4453] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336" Namespace="calico-apiserver" Pod="calico-apiserver-74bf487454-f5nw8" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0"
Dec 13 02:24:53.405114 env[1728]: 2024-12-13 02:24:52.952 [INFO][4492] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336" HandleID="k8s-pod-network.f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0"
Dec 13 02:24:53.405114 env[1728]: 2024-12-13 02:24:52.999 [INFO][4492] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336" HandleID="k8s-pod-network.f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004238d0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-27-10", "pod":"calico-apiserver-74bf487454-f5nw8", "timestamp":"2024-12-13 02:24:52.952740465 +0000 UTC"}, Hostname:"ip-172-31-27-10", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Dec 13 02:24:53.405114 env[1728]: 2024-12-13 02:24:52.999 [INFO][4492] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:24:53.405114 env[1728]: 2024-12-13 02:24:52.999 [INFO][4492] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:24:53.405114 env[1728]: 2024-12-13 02:24:52.999 [INFO][4492] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-10'
Dec 13 02:24:53.405114 env[1728]: 2024-12-13 02:24:53.008 [INFO][4492] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336" host="ip-172-31-27-10"
Dec 13 02:24:53.405114 env[1728]: 2024-12-13 02:24:53.234 [INFO][4492] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-10"
Dec 13 02:24:53.405114 env[1728]: 2024-12-13 02:24:53.252 [INFO][4492] ipam/ipam.go 489: Trying affinity for 192.168.29.0/26 host="ip-172-31-27-10"
Dec 13 02:24:53.405114 env[1728]: 2024-12-13 02:24:53.271 [INFO][4492] ipam/ipam.go 155: Attempting to load block cidr=192.168.29.0/26 host="ip-172-31-27-10"
Dec 13 02:24:53.405114 env[1728]: 2024-12-13 02:24:53.282 [INFO][4492] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.29.0/26 host="ip-172-31-27-10"
Dec 13 02:24:53.405114 env[1728]: 2024-12-13 02:24:53.282 [INFO][4492] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.29.0/26 handle="k8s-pod-network.f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336" host="ip-172-31-27-10"
Dec 13 02:24:53.405114 env[1728]: 2024-12-13 02:24:53.286 [INFO][4492] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336
Dec 13 02:24:53.405114 env[1728]: 2024-12-13 02:24:53.295 [INFO][4492] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.29.0/26 handle="k8s-pod-network.f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336" host="ip-172-31-27-10"
Dec 13 02:24:53.405114 env[1728]: 2024-12-13 02:24:53.322 [INFO][4492] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.29.4/26] block=192.168.29.0/26 handle="k8s-pod-network.f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336" host="ip-172-31-27-10"
Dec 13 02:24:53.405114 env[1728]: 2024-12-13 02:24:53.322 [INFO][4492] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.29.4/26] handle="k8s-pod-network.f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336" host="ip-172-31-27-10"
Dec 13 02:24:53.405114 env[1728]: 2024-12-13 02:24:53.322 [INFO][4492] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:24:53.405114 env[1728]: 2024-12-13 02:24:53.322 [INFO][4492] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.29.4/26] IPv6=[] ContainerID="f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336" HandleID="k8s-pod-network.f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0"
Dec 13 02:24:53.406587 env[1728]: 2024-12-13 02:24:53.330 [INFO][4453] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336" Namespace="calico-apiserver" Pod="calico-apiserver-74bf487454-f5nw8" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0", GenerateName:"calico-apiserver-74bf487454-", Namespace:"calico-apiserver", SelfLink:"", UID:"451fe638-c64f-4a5e-b8f8-88ad281bca14", ResourceVersion:"815", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 24, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74bf487454", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"", Pod:"calico-apiserver-74bf487454-f5nw8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.29.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia44526f6143", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:24:53.406587 env[1728]: 2024-12-13 02:24:53.330 [INFO][4453] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.29.4/32] ContainerID="f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336" Namespace="calico-apiserver" Pod="calico-apiserver-74bf487454-f5nw8" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0"
Dec 13 02:24:53.406587 env[1728]: 2024-12-13 02:24:53.330 [INFO][4453] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia44526f6143 ContainerID="f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336" Namespace="calico-apiserver" Pod="calico-apiserver-74bf487454-f5nw8" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0"
Dec 13 02:24:53.406587 env[1728]: 2024-12-13 02:24:53.353 [INFO][4453] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336" Namespace="calico-apiserver" Pod="calico-apiserver-74bf487454-f5nw8" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0"
Dec 13 02:24:53.406587 env[1728]: 2024-12-13 02:24:53.354 [INFO][4453] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336" Namespace="calico-apiserver" Pod="calico-apiserver-74bf487454-f5nw8" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0", GenerateName:"calico-apiserver-74bf487454-", Namespace:"calico-apiserver", SelfLink:"", UID:"451fe638-c64f-4a5e-b8f8-88ad281bca14", ResourceVersion:"815", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 24, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74bf487454", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336", Pod:"calico-apiserver-74bf487454-f5nw8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.29.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia44526f6143", MAC:"3e:51:61:13:f0:43", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:24:53.406587 env[1728]: 2024-12-13 02:24:53.399 [INFO][4453] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336" Namespace="calico-apiserver" Pod="calico-apiserver-74bf487454-f5nw8" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0"
Dec 13 02:24:53.462634 env[1728]: time="2024-12-13T02:24:53.462570577Z" level=info msg="StartContainer for \"f334c8446ce1d27b73c98122dc7b68082b49ffb70a949593fdbd075aa4caf2c8\" returns successfully"
Dec 13 02:24:53.465679 env[1728]: time="2024-12-13T02:24:53.464740073Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\""
Dec 13 02:24:53.481000 audit[4603]: NETFILTER_CFG table=filter:110 family=2 entries=52 op=nft_register_chain pid=4603 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 02:24:53.481000 audit[4603]: SYSCALL arch=c000003e syscall=46 success=yes exit=27056 a0=3 a1=7ffebdb322f0 a2=0 a3=7ffebdb322dc items=0 ppid=3912 pid=4603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:53.481000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 02:24:53.513890 env[1728]: time="2024-12-13T02:24:53.513806397Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 02:24:53.514700 env[1728]: time="2024-12-13T02:24:53.514553589Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 02:24:53.514950 env[1728]: time="2024-12-13T02:24:53.514917698Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 02:24:53.525623 env[1728]: 2024-12-13 02:24:53.314 [INFO][4548] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92"
Dec 13 02:24:53.525623 env[1728]: 2024-12-13 02:24:53.314 [INFO][4548] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" iface="eth0" netns="/var/run/netns/cni-941d5a8c-bbdc-52fd-6638-97cf0605ed10"
Dec 13 02:24:53.525623 env[1728]: 2024-12-13 02:24:53.316 [INFO][4548] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" iface="eth0" netns="/var/run/netns/cni-941d5a8c-bbdc-52fd-6638-97cf0605ed10"
Dec 13 02:24:53.525623 env[1728]: 2024-12-13 02:24:53.317 [INFO][4548] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone.  Nothing to do. ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" iface="eth0" netns="/var/run/netns/cni-941d5a8c-bbdc-52fd-6638-97cf0605ed10"
Dec 13 02:24:53.525623 env[1728]: 2024-12-13 02:24:53.317 [INFO][4548] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92"
Dec 13 02:24:53.525623 env[1728]: 2024-12-13 02:24:53.317 [INFO][4548] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92"
Dec 13 02:24:53.525623 env[1728]: 2024-12-13 02:24:53.492 [INFO][4574] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" HandleID="k8s-pod-network.ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:24:53.525623 env[1728]: 2024-12-13 02:24:53.492 [INFO][4574] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:24:53.525623 env[1728]: 2024-12-13 02:24:53.493 [INFO][4574] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:24:53.525623 env[1728]: 2024-12-13 02:24:53.502 [WARNING][4574] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" HandleID="k8s-pod-network.ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:24:53.525623 env[1728]: 2024-12-13 02:24:53.502 [INFO][4574] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" HandleID="k8s-pod-network.ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:24:53.525623 env[1728]: 2024-12-13 02:24:53.504 [INFO][4574] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:24:53.525623 env[1728]: 2024-12-13 02:24:53.522 [INFO][4548] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92"
Dec 13 02:24:53.528484 env[1728]: time="2024-12-13T02:24:53.528435396Z" level=info msg="TearDown network for sandbox \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\" successfully"
Dec 13 02:24:53.528637 env[1728]: time="2024-12-13T02:24:53.528612305Z" level=info msg="StopPodSandbox for \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\" returns successfully"
Dec 13 02:24:53.542020 systemd[1]: run-netns-cni\x2d941d5a8c\x2dbbdc\x2d52fd\x2d6638\x2d97cf0605ed10.mount: Deactivated successfully.
Dec 13 02:24:53.546669 env[1728]: time="2024-12-13T02:24:53.546625351Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-d49669cd5-nhvrl,Uid:73f8d749-4aed-4686-b899-a4512456e6f4,Namespace:calico-system,Attempt:1,}"
Dec 13 02:24:53.549894 env[1728]: time="2024-12-13T02:24:53.549671220Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336 pid=4617 runtime=io.containerd.runc.v2
Dec 13 02:24:53.563266 env[1728]: 2024-12-13 02:24:53.326 [INFO][4538] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48"
Dec 13 02:24:53.563266 env[1728]: 2024-12-13 02:24:53.326 [INFO][4538] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" iface="eth0" netns="/var/run/netns/cni-9fac9413-0c4e-c71f-2aeb-25f2302b7a4d"
Dec 13 02:24:53.563266 env[1728]: 2024-12-13 02:24:53.326 [INFO][4538] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" iface="eth0" netns="/var/run/netns/cni-9fac9413-0c4e-c71f-2aeb-25f2302b7a4d"
Dec 13 02:24:53.563266 env[1728]: 2024-12-13 02:24:53.328 [INFO][4538] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone.  Nothing to do. ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" iface="eth0" netns="/var/run/netns/cni-9fac9413-0c4e-c71f-2aeb-25f2302b7a4d"
Dec 13 02:24:53.563266 env[1728]: 2024-12-13 02:24:53.328 [INFO][4538] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48"
Dec 13 02:24:53.563266 env[1728]: 2024-12-13 02:24:53.328 [INFO][4538] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48"
Dec 13 02:24:53.563266 env[1728]: 2024-12-13 02:24:53.518 [INFO][4575] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" HandleID="k8s-pod-network.b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0"
Dec 13 02:24:53.563266 env[1728]: 2024-12-13 02:24:53.520 [INFO][4575] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:24:53.563266 env[1728]: 2024-12-13 02:24:53.520 [INFO][4575] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:24:53.563266 env[1728]: 2024-12-13 02:24:53.531 [WARNING][4575] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" HandleID="k8s-pod-network.b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0"
Dec 13 02:24:53.563266 env[1728]: 2024-12-13 02:24:53.531 [INFO][4575] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" HandleID="k8s-pod-network.b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0"
Dec 13 02:24:53.563266 env[1728]: 2024-12-13 02:24:53.535 [INFO][4575] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:24:53.563266 env[1728]: 2024-12-13 02:24:53.550 [INFO][4538] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48"
Dec 13 02:24:53.568548 systemd[1]: run-netns-cni\x2d9fac9413\x2d0c4e\x2dc71f\x2d2aeb\x2d25f2302b7a4d.mount: Deactivated successfully.
Dec 13 02:24:53.571911 env[1728]: time="2024-12-13T02:24:53.571199411Z" level=info msg="TearDown network for sandbox \"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\" successfully"
Dec 13 02:24:53.571911 env[1728]: time="2024-12-13T02:24:53.571241353Z" level=info msg="StopPodSandbox for \"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\" returns successfully"
Dec 13 02:24:53.572130 env[1728]: time="2024-12-13T02:24:53.572099536Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74bf487454-wz4kv,Uid:227ce0a8-6cb4-46e0-88a7-c73f2e8d5e2d,Namespace:calico-apiserver,Attempt:1,}"
Dec 13 02:24:53.606503 systemd[1]: Started cri-containerd-f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336.scope.
Dec 13 02:24:53.642000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.642000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.642000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.642000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.642000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.642000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.642000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.642000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.642000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.643000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.643000 audit: BPF prog-id=181 op=LOAD
Dec 13 02:24:53.645000 audit[4628]: AVC avc:  denied  { bpf } for  pid=4628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.645000 audit[4628]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001adc48 a2=10 a3=1c items=0 ppid=4617 pid=4628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:53.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635373337333730633066323536353236313565376465343839343939
Dec 13 02:24:53.645000 audit[4628]: AVC avc:  denied  { perfmon } for  pid=4628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.645000 audit[4628]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001ad6b0 a2=3c a3=c items=0 ppid=4617 pid=4628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:53.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635373337333730633066323536353236313565376465343839343939
Dec 13 02:24:53.645000 audit[4628]: AVC avc:  denied  { bpf } for  pid=4628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.645000 audit[4628]: AVC avc:  denied  { bpf } for  pid=4628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.645000 audit[4628]: AVC avc:  denied  { bpf } for  pid=4628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.645000 audit[4628]: AVC avc:  denied  { perfmon } for  pid=4628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.645000 audit[4628]: AVC avc:  denied  { perfmon } for  pid=4628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.645000 audit[4628]: AVC avc:  denied  { perfmon } for  pid=4628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.645000 audit[4628]: AVC avc:  denied  { perfmon } for  pid=4628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.645000 audit[4628]: AVC avc:  denied  { perfmon } for  pid=4628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.645000 audit[4628]: AVC avc:  denied  { bpf } for  pid=4628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.645000 audit[4628]: AVC avc:  denied  { bpf } for  pid=4628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.645000 audit: BPF prog-id=182 op=LOAD
Dec 13 02:24:53.645000 audit[4628]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001ad9d8 a2=78 a3=c000414030 items=0 ppid=4617 pid=4628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:53.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635373337333730633066323536353236313565376465343839343939
Dec 13 02:24:53.645000 audit[4628]: AVC avc:  denied  { bpf } for  pid=4628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.645000 audit[4628]: AVC avc:  denied  { bpf } for  pid=4628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.645000 audit[4628]: AVC avc:  denied  { perfmon } for  pid=4628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.645000 audit[4628]: AVC avc:  denied  { perfmon } for  pid=4628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.645000 audit[4628]: AVC avc:  denied  { perfmon } for  pid=4628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.645000 audit[4628]: AVC avc:  denied  { perfmon } for  pid=4628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.645000 audit[4628]: AVC avc:  denied  { perfmon } for  pid=4628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.645000 audit[4628]: AVC avc:  denied  { bpf } for  pid=4628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.645000 audit[4628]: AVC avc:  denied  { bpf } for  pid=4628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.645000 audit: BPF prog-id=183 op=LOAD
Dec 13 02:24:53.645000 audit[4628]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001ad770 a2=78 a3=c000414078 items=0 ppid=4617 pid=4628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:53.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635373337333730633066323536353236313565376465343839343939
Dec 13 02:24:53.645000 audit: BPF prog-id=183 op=UNLOAD
Dec 13 02:24:53.645000 audit: BPF prog-id=182 op=UNLOAD
Dec 13 02:24:53.646000 audit[4628]: AVC avc:  denied  { bpf } for  pid=4628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.646000 audit[4628]: AVC avc:  denied  { bpf } for  pid=4628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.646000 audit[4628]: AVC avc:  denied  { bpf } for  pid=4628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.646000 audit[4628]: AVC avc:  denied  { perfmon } for  pid=4628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.646000 audit[4628]: AVC avc:  denied  { perfmon } for  pid=4628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.646000 audit[4628]: AVC avc:  denied  { perfmon } for  pid=4628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.646000 audit[4628]: AVC avc:  denied  { perfmon } for  pid=4628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.646000 audit[4628]: AVC avc:  denied  { perfmon } for  pid=4628 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.646000 audit[4628]: AVC avc:  denied  { bpf } for  pid=4628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.646000 audit[4628]: AVC avc:  denied  { bpf } for  pid=4628 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:53.646000 audit: BPF prog-id=184 op=LOAD
Dec 13 02:24:53.646000 audit[4628]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001adc30 a2=78 a3=c000414488 items=0 ppid=4617 pid=4628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:53.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635373337333730633066323536353236313565376465343839343939
Dec 13 02:24:53.685985 kubelet[2727]: I1213 02:24:53.685674    2727 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-n7sz7" podStartSLOduration=37.685648347 podStartE2EDuration="37.685648347s" podCreationTimestamp="2024-12-13 02:24:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:24:53.68491967 +0000 UTC m=+42.060742096" watchObservedRunningTime="2024-12-13 02:24:53.685648347 +0000 UTC m=+42.061470780"
Dec 13 02:24:53.812000 audit[4669]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4669 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:53.812000 audit[4669]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcca430440 a2=0 a3=7ffcca43042c items=0 ppid=2876 pid=4669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:53.812000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:53.822000 audit[4669]: NETFILTER_CFG table=nat:112 family=2 entries=44 op=nft_register_rule pid=4669 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:53.822000 audit[4669]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffcca430440 a2=0 a3=7ffcca43042c items=0 ppid=2876 pid=4669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:53.822000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:53.983791 env[1728]: time="2024-12-13T02:24:53.980895179Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74bf487454-f5nw8,Uid:451fe638-c64f-4a5e-b8f8-88ad281bca14,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336\""
Dec 13 02:24:54.177281 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali515509dc18f: link becomes ready
Dec 13 02:24:54.173098 systemd-networkd[1457]: cali515509dc18f: Link UP
Dec 13 02:24:54.178885 systemd-networkd[1457]: cali515509dc18f: Gained carrier
Dec 13 02:24:54.231351 env[1728]: 2024-12-13 02:24:53.766 [INFO][4657] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0 calico-apiserver-74bf487454- calico-apiserver  227ce0a8-6cb4-46e0-88a7-c73f2e8d5e2d 838 0 2024-12-13 02:24:24 +0000 UTC <nil> <nil> map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:74bf487454 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s  ip-172-31-27-10  calico-apiserver-74bf487454-wz4kv eth0 calico-apiserver [] []   [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali515509dc18f  [] []}} ContainerID="d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8" Namespace="calico-apiserver" Pod="calico-apiserver-74bf487454-wz4kv" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-"
Dec 13 02:24:54.231351 env[1728]: 2024-12-13 02:24:53.766 [INFO][4657] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8" Namespace="calico-apiserver" Pod="calico-apiserver-74bf487454-wz4kv" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0"
Dec 13 02:24:54.231351 env[1728]: 2024-12-13 02:24:53.953 [INFO][4670] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8" HandleID="k8s-pod-network.d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0"
Dec 13 02:24:54.231351 env[1728]: 2024-12-13 02:24:53.975 [INFO][4670] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8" HandleID="k8s-pod-network.d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027f340), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-27-10", "pod":"calico-apiserver-74bf487454-wz4kv", "timestamp":"2024-12-13 02:24:53.95276664 +0000 UTC"}, Hostname:"ip-172-31-27-10", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Dec 13 02:24:54.231351 env[1728]: 2024-12-13 02:24:53.975 [INFO][4670] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:24:54.231351 env[1728]: 2024-12-13 02:24:53.975 [INFO][4670] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:24:54.231351 env[1728]: 2024-12-13 02:24:53.975 [INFO][4670] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-10'
Dec 13 02:24:54.231351 env[1728]: 2024-12-13 02:24:53.989 [INFO][4670] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8" host="ip-172-31-27-10"
Dec 13 02:24:54.231351 env[1728]: 2024-12-13 02:24:54.075 [INFO][4670] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-10"
Dec 13 02:24:54.231351 env[1728]: 2024-12-13 02:24:54.092 [INFO][4670] ipam/ipam.go 489: Trying affinity for 192.168.29.0/26 host="ip-172-31-27-10"
Dec 13 02:24:54.231351 env[1728]: 2024-12-13 02:24:54.096 [INFO][4670] ipam/ipam.go 155: Attempting to load block cidr=192.168.29.0/26 host="ip-172-31-27-10"
Dec 13 02:24:54.231351 env[1728]: 2024-12-13 02:24:54.101 [INFO][4670] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.29.0/26 host="ip-172-31-27-10"
Dec 13 02:24:54.231351 env[1728]: 2024-12-13 02:24:54.102 [INFO][4670] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.29.0/26 handle="k8s-pod-network.d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8" host="ip-172-31-27-10"
Dec 13 02:24:54.231351 env[1728]: 2024-12-13 02:24:54.105 [INFO][4670] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8
Dec 13 02:24:54.231351 env[1728]: 2024-12-13 02:24:54.120 [INFO][4670] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.29.0/26 handle="k8s-pod-network.d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8" host="ip-172-31-27-10"
Dec 13 02:24:54.231351 env[1728]: 2024-12-13 02:24:54.133 [INFO][4670] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.29.5/26] block=192.168.29.0/26 handle="k8s-pod-network.d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8" host="ip-172-31-27-10"
Dec 13 02:24:54.231351 env[1728]: 2024-12-13 02:24:54.134 [INFO][4670] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.29.5/26] handle="k8s-pod-network.d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8" host="ip-172-31-27-10"
Dec 13 02:24:54.231351 env[1728]: 2024-12-13 02:24:54.135 [INFO][4670] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:24:54.231351 env[1728]: 2024-12-13 02:24:54.136 [INFO][4670] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.29.5/26] IPv6=[] ContainerID="d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8" HandleID="k8s-pod-network.d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0"
Dec 13 02:24:54.233569 env[1728]: 2024-12-13 02:24:54.145 [INFO][4657] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8" Namespace="calico-apiserver" Pod="calico-apiserver-74bf487454-wz4kv" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0", GenerateName:"calico-apiserver-74bf487454-", Namespace:"calico-apiserver", SelfLink:"", UID:"227ce0a8-6cb4-46e0-88a7-c73f2e8d5e2d", ResourceVersion:"838", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 24, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74bf487454", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"", Pod:"calico-apiserver-74bf487454-wz4kv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.29.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali515509dc18f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:24:54.233569 env[1728]: 2024-12-13 02:24:54.145 [INFO][4657] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.29.5/32] ContainerID="d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8" Namespace="calico-apiserver" Pod="calico-apiserver-74bf487454-wz4kv" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0"
Dec 13 02:24:54.233569 env[1728]: 2024-12-13 02:24:54.145 [INFO][4657] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali515509dc18f ContainerID="d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8" Namespace="calico-apiserver" Pod="calico-apiserver-74bf487454-wz4kv" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0"
Dec 13 02:24:54.233569 env[1728]: 2024-12-13 02:24:54.184 [INFO][4657] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8" Namespace="calico-apiserver" Pod="calico-apiserver-74bf487454-wz4kv" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0"
Dec 13 02:24:54.233569 env[1728]: 2024-12-13 02:24:54.187 [INFO][4657] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8" Namespace="calico-apiserver" Pod="calico-apiserver-74bf487454-wz4kv" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0", GenerateName:"calico-apiserver-74bf487454-", Namespace:"calico-apiserver", SelfLink:"", UID:"227ce0a8-6cb4-46e0-88a7-c73f2e8d5e2d", ResourceVersion:"838", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 24, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74bf487454", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8", Pod:"calico-apiserver-74bf487454-wz4kv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.29.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali515509dc18f", MAC:"4e:1b:2b:5d:51:b5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:24:54.233569 env[1728]: 2024-12-13 02:24:54.222 [INFO][4657] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8" Namespace="calico-apiserver" Pod="calico-apiserver-74bf487454-wz4kv" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0"
Dec 13 02:24:54.291399 env[1728]: time="2024-12-13T02:24:54.283199792Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 02:24:54.291399 env[1728]: time="2024-12-13T02:24:54.283264866Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 02:24:54.291399 env[1728]: time="2024-12-13T02:24:54.283282387Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 02:24:54.291399 env[1728]: time="2024-12-13T02:24:54.283481935Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8 pid=4708 runtime=io.containerd.runc.v2
Dec 13 02:24:54.337896 systemd-networkd[1457]: cali846b91335a7: Link UP
Dec 13 02:24:54.359616 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Dec 13 02:24:54.359734 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali846b91335a7: link becomes ready
Dec 13 02:24:54.359925 systemd-networkd[1457]: cali846b91335a7: Gained carrier
Dec 13 02:24:54.377079 systemd[1]: Started cri-containerd-d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8.scope.
Dec 13 02:24:54.392336 env[1728]: 2024-12-13 02:24:53.827 [INFO][4638] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0 calico-kube-controllers-d49669cd5- calico-system  73f8d749-4aed-4686-b899-a4512456e6f4 836 0 2024-12-13 02:24:24 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:d49669cd5 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s  ip-172-31-27-10  calico-kube-controllers-d49669cd5-nhvrl eth0 calico-kube-controllers [] []   [kns.calico-system ksa.calico-system.calico-kube-controllers] cali846b91335a7  [] []}} ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" Namespace="calico-system" Pod="calico-kube-controllers-d49669cd5-nhvrl" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-"
Dec 13 02:24:54.392336 env[1728]: 2024-12-13 02:24:53.827 [INFO][4638] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" Namespace="calico-system" Pod="calico-kube-controllers-d49669cd5-nhvrl" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:24:54.392336 env[1728]: 2024-12-13 02:24:53.999 [INFO][4674] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" HandleID="k8s-pod-network.097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:24:54.392336 env[1728]: 2024-12-13 02:24:54.084 [INFO][4674] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" HandleID="k8s-pod-network.097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00011c5d0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-27-10", "pod":"calico-kube-controllers-d49669cd5-nhvrl", "timestamp":"2024-12-13 02:24:53.999089327 +0000 UTC"}, Hostname:"ip-172-31-27-10", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Dec 13 02:24:54.392336 env[1728]: 2024-12-13 02:24:54.084 [INFO][4674] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:24:54.392336 env[1728]: 2024-12-13 02:24:54.134 [INFO][4674] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:24:54.392336 env[1728]: 2024-12-13 02:24:54.134 [INFO][4674] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-10'
Dec 13 02:24:54.392336 env[1728]: 2024-12-13 02:24:54.139 [INFO][4674] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" host="ip-172-31-27-10"
Dec 13 02:24:54.392336 env[1728]: 2024-12-13 02:24:54.185 [INFO][4674] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-10"
Dec 13 02:24:54.392336 env[1728]: 2024-12-13 02:24:54.214 [INFO][4674] ipam/ipam.go 489: Trying affinity for 192.168.29.0/26 host="ip-172-31-27-10"
Dec 13 02:24:54.392336 env[1728]: 2024-12-13 02:24:54.228 [INFO][4674] ipam/ipam.go 155: Attempting to load block cidr=192.168.29.0/26 host="ip-172-31-27-10"
Dec 13 02:24:54.392336 env[1728]: 2024-12-13 02:24:54.237 [INFO][4674] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.29.0/26 host="ip-172-31-27-10"
Dec 13 02:24:54.392336 env[1728]: 2024-12-13 02:24:54.237 [INFO][4674] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.29.0/26 handle="k8s-pod-network.097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" host="ip-172-31-27-10"
Dec 13 02:24:54.392336 env[1728]: 2024-12-13 02:24:54.246 [INFO][4674] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f
Dec 13 02:24:54.392336 env[1728]: 2024-12-13 02:24:54.263 [INFO][4674] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.29.0/26 handle="k8s-pod-network.097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" host="ip-172-31-27-10"
Dec 13 02:24:54.392336 env[1728]: 2024-12-13 02:24:54.292 [INFO][4674] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.29.6/26] block=192.168.29.0/26 handle="k8s-pod-network.097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" host="ip-172-31-27-10"
Dec 13 02:24:54.392336 env[1728]: 2024-12-13 02:24:54.292 [INFO][4674] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.29.6/26] handle="k8s-pod-network.097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" host="ip-172-31-27-10"
Dec 13 02:24:54.392336 env[1728]: 2024-12-13 02:24:54.292 [INFO][4674] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:24:54.392336 env[1728]: 2024-12-13 02:24:54.292 [INFO][4674] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.29.6/26] IPv6=[] ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" HandleID="k8s-pod-network.097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:24:54.394055 env[1728]: 2024-12-13 02:24:54.309 [INFO][4638] cni-plugin/k8s.go 386: Populated endpoint ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" Namespace="calico-system" Pod="calico-kube-controllers-d49669cd5-nhvrl" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0", GenerateName:"calico-kube-controllers-d49669cd5-", Namespace:"calico-system", SelfLink:"", UID:"73f8d749-4aed-4686-b899-a4512456e6f4", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 24, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"d49669cd5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"", Pod:"calico-kube-controllers-d49669cd5-nhvrl", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.29.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali846b91335a7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:24:54.394055 env[1728]: 2024-12-13 02:24:54.309 [INFO][4638] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.29.6/32] ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" Namespace="calico-system" Pod="calico-kube-controllers-d49669cd5-nhvrl" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:24:54.394055 env[1728]: 2024-12-13 02:24:54.310 [INFO][4638] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali846b91335a7 ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" Namespace="calico-system" Pod="calico-kube-controllers-d49669cd5-nhvrl" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:24:54.394055 env[1728]: 2024-12-13 02:24:54.355 [INFO][4638] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" Namespace="calico-system" Pod="calico-kube-controllers-d49669cd5-nhvrl" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:24:54.394055 env[1728]: 2024-12-13 02:24:54.361 [INFO][4638] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" Namespace="calico-system" Pod="calico-kube-controllers-d49669cd5-nhvrl" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0", GenerateName:"calico-kube-controllers-d49669cd5-", Namespace:"calico-system", SelfLink:"", UID:"73f8d749-4aed-4686-b899-a4512456e6f4", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 24, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"d49669cd5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f", Pod:"calico-kube-controllers-d49669cd5-nhvrl", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.29.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali846b91335a7", MAC:"96:2b:22:45:9d:82", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:24:54.394055 env[1728]: 2024-12-13 02:24:54.387 [INFO][4638] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" Namespace="calico-system" Pod="calico-kube-controllers-d49669cd5-nhvrl" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:24:54.484000 audit[4741]: NETFILTER_CFG table=filter:113 family=2 entries=46 op=nft_register_chain pid=4741 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 02:24:54.484000 audit[4741]: SYSCALL arch=c000003e syscall=46 success=yes exit=23892 a0=3 a1=7ffd78ddf720 a2=0 a3=7ffd78ddf70c items=0 ppid=3912 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:54.484000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 02:24:54.539000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.539000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.539000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.539000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.539000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.539000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.539000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.539000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.542000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.543000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.543000 audit: BPF prog-id=185 op=LOAD
Dec 13 02:24:54.549000 audit[4719]: AVC avc:  denied  { bpf } for  pid=4719 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.549000 audit[4719]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4708 pid=4719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:54.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643134326334376333366534663332363564636235313237623361
Dec 13 02:24:54.551000 audit[4719]: AVC avc:  denied  { perfmon } for  pid=4719 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.551000 audit[4719]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4708 pid=4719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:54.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643134326334376333366534663332363564636235313237623361
Dec 13 02:24:54.565000 audit[4719]: AVC avc:  denied  { bpf } for  pid=4719 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.565000 audit[4719]: AVC avc:  denied  { bpf } for  pid=4719 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.565000 audit[4719]: AVC avc:  denied  { bpf } for  pid=4719 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.565000 audit[4719]: AVC avc:  denied  { perfmon } for  pid=4719 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.565000 audit[4719]: AVC avc:  denied  { perfmon } for  pid=4719 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.565000 audit[4719]: AVC avc:  denied  { perfmon } for  pid=4719 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.565000 audit[4719]: AVC avc:  denied  { perfmon } for  pid=4719 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.565000 audit[4719]: AVC avc:  denied  { perfmon } for  pid=4719 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.565000 audit[4719]: AVC avc:  denied  { bpf } for  pid=4719 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.565000 audit[4719]: AVC avc:  denied  { bpf } for  pid=4719 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.565000 audit: BPF prog-id=186 op=LOAD
Dec 13 02:24:54.565000 audit[4719]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000358f60 items=0 ppid=4708 pid=4719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:54.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643134326334376333366534663332363564636235313237623361
Dec 13 02:24:54.566000 audit[4719]: AVC avc:  denied  { bpf } for  pid=4719 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.566000 audit[4719]: AVC avc:  denied  { bpf } for  pid=4719 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.566000 audit[4719]: AVC avc:  denied  { perfmon } for  pid=4719 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.566000 audit[4719]: AVC avc:  denied  { perfmon } for  pid=4719 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.566000 audit[4719]: AVC avc:  denied  { perfmon } for  pid=4719 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.566000 audit[4719]: AVC avc:  denied  { perfmon } for  pid=4719 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.566000 audit[4719]: AVC avc:  denied  { perfmon } for  pid=4719 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.566000 audit[4719]: AVC avc:  denied  { bpf } for  pid=4719 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.566000 audit[4719]: AVC avc:  denied  { bpf } for  pid=4719 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.566000 audit: BPF prog-id=187 op=LOAD
Dec 13 02:24:54.566000 audit[4719]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000358fa8 items=0 ppid=4708 pid=4719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:54.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643134326334376333366534663332363564636235313237623361
Dec 13 02:24:54.566000 audit: BPF prog-id=187 op=UNLOAD
Dec 13 02:24:54.566000 audit: BPF prog-id=186 op=UNLOAD
Dec 13 02:24:54.566000 audit[4719]: AVC avc:  denied  { bpf } for  pid=4719 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.566000 audit[4719]: AVC avc:  denied  { bpf } for  pid=4719 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.566000 audit[4719]: AVC avc:  denied  { bpf } for  pid=4719 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.566000 audit[4719]: AVC avc:  denied  { perfmon } for  pid=4719 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.566000 audit[4719]: AVC avc:  denied  { perfmon } for  pid=4719 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.566000 audit[4719]: AVC avc:  denied  { perfmon } for  pid=4719 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.566000 audit[4719]: AVC avc:  denied  { perfmon } for  pid=4719 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.566000 audit[4719]: AVC avc:  denied  { perfmon } for  pid=4719 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.566000 audit[4719]: AVC avc:  denied  { bpf } for  pid=4719 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.566000 audit[4719]: AVC avc:  denied  { bpf } for  pid=4719 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.566000 audit: BPF prog-id=188 op=LOAD
Dec 13 02:24:54.566000 audit[4719]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003593b8 items=0 ppid=4708 pid=4719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:54.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643134326334376333366534663332363564636235313237623361
Dec 13 02:24:54.571298 env[1728]: time="2024-12-13T02:24:54.568226509Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 02:24:54.571298 env[1728]: time="2024-12-13T02:24:54.570213657Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 02:24:54.571298 env[1728]: time="2024-12-13T02:24:54.570278894Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 02:24:54.571298 env[1728]: time="2024-12-13T02:24:54.570558655Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f pid=4757 runtime=io.containerd.runc.v2
Dec 13 02:24:54.665000 audit[4775]: NETFILTER_CFG table=filter:114 family=2 entries=50 op=nft_register_chain pid=4775 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 02:24:54.676384 systemd[1]: run-containerd-runc-k8s.io-097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f-runc.VSscJn.mount: Deactivated successfully.
Dec 13 02:24:54.665000 audit[4775]: SYSCALL arch=c000003e syscall=46 success=yes exit=23392 a0=3 a1=7fffc236d8a0 a2=0 a3=7fffc236d88c items=0 ppid=3912 pid=4775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:54.665000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 02:24:54.682959 systemd[1]: Started cri-containerd-097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f.scope.
Dec 13 02:24:54.742000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.742000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.742000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.742000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.742000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.742000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.742000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.742000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.743000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.743000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.743000 audit: BPF prog-id=189 op=LOAD
Dec 13 02:24:54.745000 audit[4767]: AVC avc:  denied  { bpf } for  pid=4767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.745000 audit[4767]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4757 pid=4767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:54.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039376464653238613064646365373738353236393037353031313664
Dec 13 02:24:54.745000 audit[4767]: AVC avc:  denied  { perfmon } for  pid=4767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.745000 audit[4767]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4757 pid=4767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:54.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039376464653238613064646365373738353236393037353031313664
Dec 13 02:24:54.745000 audit[4767]: AVC avc:  denied  { bpf } for  pid=4767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.745000 audit[4767]: AVC avc:  denied  { bpf } for  pid=4767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.745000 audit[4767]: AVC avc:  denied  { bpf } for  pid=4767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.745000 audit[4767]: AVC avc:  denied  { perfmon } for  pid=4767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.745000 audit[4767]: AVC avc:  denied  { perfmon } for  pid=4767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.745000 audit[4767]: AVC avc:  denied  { perfmon } for  pid=4767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.745000 audit[4767]: AVC avc:  denied  { perfmon } for  pid=4767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.745000 audit[4767]: AVC avc:  denied  { perfmon } for  pid=4767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.745000 audit[4767]: AVC avc:  denied  { bpf } for  pid=4767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.745000 audit[4767]: AVC avc:  denied  { bpf } for  pid=4767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.745000 audit: BPF prog-id=190 op=LOAD
Dec 13 02:24:54.745000 audit[4767]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c66b0 items=0 ppid=4757 pid=4767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:54.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039376464653238613064646365373738353236393037353031313664
Dec 13 02:24:54.754000 audit[4767]: AVC avc:  denied  { bpf } for  pid=4767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.754000 audit[4767]: AVC avc:  denied  { bpf } for  pid=4767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.754000 audit[4767]: AVC avc:  denied  { perfmon } for  pid=4767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.754000 audit[4767]: AVC avc:  denied  { perfmon } for  pid=4767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.754000 audit[4767]: AVC avc:  denied  { perfmon } for  pid=4767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.754000 audit[4767]: AVC avc:  denied  { perfmon } for  pid=4767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.754000 audit[4767]: AVC avc:  denied  { perfmon } for  pid=4767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.754000 audit[4767]: AVC avc:  denied  { bpf } for  pid=4767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.754000 audit[4767]: AVC avc:  denied  { bpf } for  pid=4767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.754000 audit: BPF prog-id=191 op=LOAD
Dec 13 02:24:54.754000 audit[4767]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c66f8 items=0 ppid=4757 pid=4767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:54.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039376464653238613064646365373738353236393037353031313664
Dec 13 02:24:54.755000 audit: BPF prog-id=191 op=UNLOAD
Dec 13 02:24:54.756000 audit: BPF prog-id=190 op=UNLOAD
Dec 13 02:24:54.756000 audit[4767]: AVC avc:  denied  { bpf } for  pid=4767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.756000 audit[4767]: AVC avc:  denied  { bpf } for  pid=4767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.756000 audit[4767]: AVC avc:  denied  { bpf } for  pid=4767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.756000 audit[4767]: AVC avc:  denied  { perfmon } for  pid=4767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.756000 audit[4767]: AVC avc:  denied  { perfmon } for  pid=4767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.756000 audit[4767]: AVC avc:  denied  { perfmon } for  pid=4767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.756000 audit[4767]: AVC avc:  denied  { perfmon } for  pid=4767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.756000 audit[4767]: AVC avc:  denied  { perfmon } for  pid=4767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.756000 audit[4767]: AVC avc:  denied  { bpf } for  pid=4767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.756000 audit[4767]: AVC avc:  denied  { bpf } for  pid=4767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:54.756000 audit: BPF prog-id=192 op=LOAD
Dec 13 02:24:54.756000 audit[4767]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c6b08 items=0 ppid=4757 pid=4767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:54.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039376464653238613064646365373738353236393037353031313664
Dec 13 02:24:54.773395 env[1728]: time="2024-12-13T02:24:54.773336158Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74bf487454-wz4kv,Uid:227ce0a8-6cb4-46e0-88a7-c73f2e8d5e2d,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8\""
Dec 13 02:24:54.863989 env[1728]: time="2024-12-13T02:24:54.863868761Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-d49669cd5-nhvrl,Uid:73f8d749-4aed-4686-b899-a4512456e6f4,Namespace:calico-system,Attempt:1,} returns sandbox id \"097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f\""
Dec 13 02:24:54.912000 audit[4799]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4799 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:54.912000 audit[4799]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe1650f7f0 a2=0 a3=7ffe1650f7dc items=0 ppid=2876 pid=4799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:54.912000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:54.987000 audit[4799]: NETFILTER_CFG table=nat:116 family=2 entries=56 op=nft_register_chain pid=4799 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:54.987000 audit[4799]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffe1650f7f0 a2=0 a3=7ffe1650f7dc items=0 ppid=2876 pid=4799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:54.987000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:55.056622 systemd-networkd[1457]: calia44526f6143: Gained IPv6LL
Dec 13 02:24:55.435037 env[1728]: time="2024-12-13T02:24:55.434945614Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:55.439682 env[1728]: time="2024-12-13T02:24:55.439640671Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:55.443043 env[1728]: time="2024-12-13T02:24:55.442986722Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:55.446273 env[1728]: time="2024-12-13T02:24:55.446230032Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:55.446794 env[1728]: time="2024-12-13T02:24:55.446755813Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\""
Dec 13 02:24:55.449484 env[1728]: time="2024-12-13T02:24:55.449458364Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\""
Dec 13 02:24:55.456409 env[1728]: time="2024-12-13T02:24:55.456217739Z" level=info msg="CreateContainer within sandbox \"d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}"
Dec 13 02:24:55.523076 env[1728]: time="2024-12-13T02:24:55.523026167Z" level=info msg="CreateContainer within sandbox \"d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"c1f502326e845af551d1e8e4ce4866fbd626e708535fbc25f8586c2230a9909c\""
Dec 13 02:24:55.524211 env[1728]: time="2024-12-13T02:24:55.524185982Z" level=info msg="StartContainer for \"c1f502326e845af551d1e8e4ce4866fbd626e708535fbc25f8586c2230a9909c\""
Dec 13 02:24:55.615180 systemd[1]: run-containerd-runc-k8s.io-c1f502326e845af551d1e8e4ce4866fbd626e708535fbc25f8586c2230a9909c-runc.sEivKB.mount: Deactivated successfully.
Dec 13 02:24:55.624751 systemd[1]: Started cri-containerd-c1f502326e845af551d1e8e4ce4866fbd626e708535fbc25f8586c2230a9909c.scope.
Dec 13 02:24:55.682000 audit[4809]: AVC avc:  denied  { perfmon } for  pid=4809 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.682000 audit[4809]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f3a596574d8 items=0 ppid=4079 pid=4809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:55.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331663530323332366538343561663535316431653865346365343836
Dec 13 02:24:55.682000 audit[4809]: AVC avc:  denied  { bpf } for  pid=4809 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.682000 audit[4809]: AVC avc:  denied  { bpf } for  pid=4809 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.682000 audit[4809]: AVC avc:  denied  { bpf } for  pid=4809 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.682000 audit[4809]: AVC avc:  denied  { perfmon } for  pid=4809 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.682000 audit[4809]: AVC avc:  denied  { perfmon } for  pid=4809 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.682000 audit[4809]: AVC avc:  denied  { perfmon } for  pid=4809 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.682000 audit[4809]: AVC avc:  denied  { perfmon } for  pid=4809 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.682000 audit[4809]: AVC avc:  denied  { perfmon } for  pid=4809 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.682000 audit[4809]: AVC avc:  denied  { bpf } for  pid=4809 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.682000 audit[4809]: AVC avc:  denied  { bpf } for  pid=4809 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.682000 audit: BPF prog-id=193 op=LOAD
Dec 13 02:24:55.682000 audit[4809]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000218448 items=0 ppid=4079 pid=4809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:55.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331663530323332366538343561663535316431653865346365343836
Dec 13 02:24:55.683000 audit[4809]: AVC avc:  denied  { bpf } for  pid=4809 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.683000 audit[4809]: AVC avc:  denied  { bpf } for  pid=4809 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.683000 audit[4809]: AVC avc:  denied  { perfmon } for  pid=4809 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.683000 audit[4809]: AVC avc:  denied  { perfmon } for  pid=4809 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.683000 audit[4809]: AVC avc:  denied  { perfmon } for  pid=4809 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.683000 audit[4809]: AVC avc:  denied  { perfmon } for  pid=4809 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.683000 audit[4809]: AVC avc:  denied  { perfmon } for  pid=4809 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.683000 audit[4809]: AVC avc:  denied  { bpf } for  pid=4809 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.683000 audit[4809]: AVC avc:  denied  { bpf } for  pid=4809 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.683000 audit: BPF prog-id=194 op=LOAD
Dec 13 02:24:55.683000 audit[4809]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000218498 items=0 ppid=4079 pid=4809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:55.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331663530323332366538343561663535316431653865346365343836
Dec 13 02:24:55.683000 audit: BPF prog-id=194 op=UNLOAD
Dec 13 02:24:55.683000 audit: BPF prog-id=193 op=UNLOAD
Dec 13 02:24:55.683000 audit[4809]: AVC avc:  denied  { bpf } for  pid=4809 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.683000 audit[4809]: AVC avc:  denied  { bpf } for  pid=4809 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.683000 audit[4809]: AVC avc:  denied  { bpf } for  pid=4809 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.683000 audit[4809]: AVC avc:  denied  { perfmon } for  pid=4809 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.683000 audit[4809]: AVC avc:  denied  { perfmon } for  pid=4809 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.683000 audit[4809]: AVC avc:  denied  { perfmon } for  pid=4809 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.683000 audit[4809]: AVC avc:  denied  { perfmon } for  pid=4809 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.683000 audit[4809]: AVC avc:  denied  { perfmon } for  pid=4809 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.683000 audit[4809]: AVC avc:  denied  { bpf } for  pid=4809 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.683000 audit[4809]: AVC avc:  denied  { bpf } for  pid=4809 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:55.683000 audit: BPF prog-id=195 op=LOAD
Dec 13 02:24:55.683000 audit[4809]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000218528 items=0 ppid=4079 pid=4809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:55.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331663530323332366538343561663535316431653865346365343836
Dec 13 02:24:55.739279 env[1728]: time="2024-12-13T02:24:55.739238529Z" level=info msg="StartContainer for \"c1f502326e845af551d1e8e4ce4866fbd626e708535fbc25f8586c2230a9909c\" returns successfully"
Dec 13 02:24:55.952304 systemd-networkd[1457]: cali846b91335a7: Gained IPv6LL
Dec 13 02:24:56.016323 systemd-networkd[1457]: cali515509dc18f: Gained IPv6LL
Dec 13 02:24:56.343498 kubelet[2727]: I1213 02:24:56.343422    2727 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0
Dec 13 02:24:56.356835 kubelet[2727]: I1213 02:24:56.356778    2727 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock
Dec 13 02:24:57.583933 systemd[1]: run-containerd-runc-k8s.io-d53caf9c9744f5b12fb6a51542aae0a0ce4d998f225f9e62e7d54a5e8ef24828-runc.S0TNXg.mount: Deactivated successfully.
Dec 13 02:24:58.049274 kubelet[2727]: I1213 02:24:58.047628    2727 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-qcbrg" podStartSLOduration=29.906959833 podStartE2EDuration="35.047598679s" podCreationTimestamp="2024-12-13 02:24:23 +0000 UTC" firstStartedPulling="2024-12-13 02:24:50.307726259 +0000 UTC m=+38.683548682" lastFinishedPulling="2024-12-13 02:24:55.448365115 +0000 UTC m=+43.824187528" observedRunningTime="2024-12-13 02:24:56.748754888 +0000 UTC m=+45.124577327" watchObservedRunningTime="2024-12-13 02:24:58.047598679 +0000 UTC m=+46.423421112"
Dec 13 02:24:59.079609 env[1728]: time="2024-12-13T02:24:59.079560286Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:59.083720 env[1728]: time="2024-12-13T02:24:59.083672228Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:59.086758 env[1728]: time="2024-12-13T02:24:59.086644703Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:59.089582 env[1728]: time="2024-12-13T02:24:59.089535410Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:59.090394 env[1728]: time="2024-12-13T02:24:59.090348875Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\""
Dec 13 02:24:59.093678 env[1728]: time="2024-12-13T02:24:59.093634527Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\""
Dec 13 02:24:59.097424 env[1728]: time="2024-12-13T02:24:59.097381478Z" level=info msg="CreateContainer within sandbox \"f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}"
Dec 13 02:24:59.147400 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2021221901.mount: Deactivated successfully.
Dec 13 02:24:59.157617 env[1728]: time="2024-12-13T02:24:59.157563363Z" level=info msg="CreateContainer within sandbox \"f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c667762665fc18cc694d2b7ca5823b063aacb3bf34955f97544d9cfadb977498\""
Dec 13 02:24:59.158566 env[1728]: time="2024-12-13T02:24:59.158525808Z" level=info msg="StartContainer for \"c667762665fc18cc694d2b7ca5823b063aacb3bf34955f97544d9cfadb977498\""
Dec 13 02:24:59.212895 systemd[1]: Started cri-containerd-c667762665fc18cc694d2b7ca5823b063aacb3bf34955f97544d9cfadb977498.scope.
Dec 13 02:24:59.270012 kernel: kauditd_printk_skb: 532 callbacks suppressed
Dec 13 02:24:59.270140 kernel: audit: type=1400 audit(1734056699.263:1299): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.263000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.263000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.275171 kernel: audit: type=1400 audit(1734056699.263:1300): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.263000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.280246 kernel: audit: type=1400 audit(1734056699.263:1301): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.280335 kernel: audit: type=1400 audit(1734056699.263:1302): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.263000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.284594 kernel: audit: type=1400 audit(1734056699.263:1303): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.263000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.291704 kernel: audit: type=1400 audit(1734056699.263:1304): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.263000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.295893 kernel: audit: type=1400 audit(1734056699.263:1305): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.263000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.299995 kernel: audit: type=1400 audit(1734056699.263:1306): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.263000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.263000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.304307 kernel: audit: type=1400 audit(1734056699.263:1307): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.265000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.265000 audit: BPF prog-id=196 op=LOAD
Dec 13 02:24:59.269000 audit[4874]: AVC avc:  denied  { bpf } for  pid=4874 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.269000 audit[4874]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4617 pid=4874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:59.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336363737363236363566633138636336393464326237636135383233
Dec 13 02:24:59.269000 audit[4874]: AVC avc:  denied  { perfmon } for  pid=4874 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.309188 kernel: audit: type=1400 audit(1734056699.265:1308): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.269000 audit[4874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=4617 pid=4874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:59.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336363737363236363566633138636336393464326237636135383233
Dec 13 02:24:59.269000 audit[4874]: AVC avc:  denied  { bpf } for  pid=4874 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.269000 audit[4874]: AVC avc:  denied  { bpf } for  pid=4874 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.269000 audit[4874]: AVC avc:  denied  { bpf } for  pid=4874 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.269000 audit[4874]: AVC avc:  denied  { perfmon } for  pid=4874 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.269000 audit[4874]: AVC avc:  denied  { perfmon } for  pid=4874 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.269000 audit[4874]: AVC avc:  denied  { perfmon } for  pid=4874 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.269000 audit[4874]: AVC avc:  denied  { perfmon } for  pid=4874 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.269000 audit[4874]: AVC avc:  denied  { perfmon } for  pid=4874 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.269000 audit[4874]: AVC avc:  denied  { bpf } for  pid=4874 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.269000 audit[4874]: AVC avc:  denied  { bpf } for  pid=4874 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.269000 audit: BPF prog-id=197 op=LOAD
Dec 13 02:24:59.269000 audit[4874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0000a5090 items=0 ppid=4617 pid=4874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:59.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336363737363236363566633138636336393464326237636135383233
Dec 13 02:24:59.273000 audit[4874]: AVC avc:  denied  { bpf } for  pid=4874 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.273000 audit[4874]: AVC avc:  denied  { bpf } for  pid=4874 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.273000 audit[4874]: AVC avc:  denied  { perfmon } for  pid=4874 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.273000 audit[4874]: AVC avc:  denied  { perfmon } for  pid=4874 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.273000 audit[4874]: AVC avc:  denied  { perfmon } for  pid=4874 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.273000 audit[4874]: AVC avc:  denied  { perfmon } for  pid=4874 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.273000 audit[4874]: AVC avc:  denied  { perfmon } for  pid=4874 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.273000 audit[4874]: AVC avc:  denied  { bpf } for  pid=4874 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.273000 audit[4874]: AVC avc:  denied  { bpf } for  pid=4874 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.273000 audit: BPF prog-id=198 op=LOAD
Dec 13 02:24:59.273000 audit[4874]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0000a50d8 items=0 ppid=4617 pid=4874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:59.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336363737363236363566633138636336393464326237636135383233
Dec 13 02:24:59.273000 audit: BPF prog-id=198 op=UNLOAD
Dec 13 02:24:59.273000 audit: BPF prog-id=197 op=UNLOAD
Dec 13 02:24:59.273000 audit[4874]: AVC avc:  denied  { bpf } for  pid=4874 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.273000 audit[4874]: AVC avc:  denied  { bpf } for  pid=4874 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.273000 audit[4874]: AVC avc:  denied  { bpf } for  pid=4874 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.273000 audit[4874]: AVC avc:  denied  { perfmon } for  pid=4874 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.273000 audit[4874]: AVC avc:  denied  { perfmon } for  pid=4874 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.273000 audit[4874]: AVC avc:  denied  { perfmon } for  pid=4874 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.273000 audit[4874]: AVC avc:  denied  { perfmon } for  pid=4874 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.273000 audit[4874]: AVC avc:  denied  { perfmon } for  pid=4874 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.273000 audit[4874]: AVC avc:  denied  { bpf } for  pid=4874 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.273000 audit[4874]: AVC avc:  denied  { bpf } for  pid=4874 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.273000 audit: BPF prog-id=199 op=LOAD
Dec 13 02:24:59.273000 audit[4874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0000a54e8 items=0 ppid=4617 pid=4874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:59.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336363737363236363566633138636336393464326237636135383233
Dec 13 02:24:59.356127 env[1728]: time="2024-12-13T02:24:59.356020979Z" level=info msg="StartContainer for \"c667762665fc18cc694d2b7ca5823b063aacb3bf34955f97544d9cfadb977498\" returns successfully"
Dec 13 02:24:59.460954 env[1728]: time="2024-12-13T02:24:59.460909419Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:59.465994 env[1728]: time="2024-12-13T02:24:59.465947954Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:59.469373 env[1728]: time="2024-12-13T02:24:59.469330938Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:59.472775 env[1728]: time="2024-12-13T02:24:59.472731679Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:24:59.473328 env[1728]: time="2024-12-13T02:24:59.473240347Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\""
Dec 13 02:24:59.476918 env[1728]: time="2024-12-13T02:24:59.476859470Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\""
Dec 13 02:24:59.478993 env[1728]: time="2024-12-13T02:24:59.478916090Z" level=info msg="CreateContainer within sandbox \"d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}"
Dec 13 02:24:59.530962 env[1728]: time="2024-12-13T02:24:59.530901519Z" level=info msg="CreateContainer within sandbox \"d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"6a7e6dae8603408164c90f8896a7687d27b4ad684f3733c7b974fec7ce4d7769\""
Dec 13 02:24:59.532158 env[1728]: time="2024-12-13T02:24:59.532112945Z" level=info msg="StartContainer for \"6a7e6dae8603408164c90f8896a7687d27b4ad684f3733c7b974fec7ce4d7769\""
Dec 13 02:24:59.560698 systemd[1]: Started cri-containerd-6a7e6dae8603408164c90f8896a7687d27b4ad684f3733c7b974fec7ce4d7769.scope.
Dec 13 02:24:59.635000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.635000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.635000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.635000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.635000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.635000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.635000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.635000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.635000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.635000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.635000 audit: BPF prog-id=200 op=LOAD
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { bpf } for  pid=4911 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4708 pid=4911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:59.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661376536646165383630333430383136346339306638383936613736
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { perfmon } for  pid=4911 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4708 pid=4911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:59.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661376536646165383630333430383136346339306638383936613736
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { bpf } for  pid=4911 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { bpf } for  pid=4911 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { bpf } for  pid=4911 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { perfmon } for  pid=4911 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { perfmon } for  pid=4911 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { perfmon } for  pid=4911 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { perfmon } for  pid=4911 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { perfmon } for  pid=4911 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { bpf } for  pid=4911 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { bpf } for  pid=4911 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit: BPF prog-id=201 op=LOAD
Dec 13 02:24:59.636000 audit[4911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000308710 items=0 ppid=4708 pid=4911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:59.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661376536646165383630333430383136346339306638383936613736
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { bpf } for  pid=4911 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { bpf } for  pid=4911 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { perfmon } for  pid=4911 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { perfmon } for  pid=4911 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { perfmon } for  pid=4911 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { perfmon } for  pid=4911 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { perfmon } for  pid=4911 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { bpf } for  pid=4911 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { bpf } for  pid=4911 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit: BPF prog-id=202 op=LOAD
Dec 13 02:24:59.636000 audit[4911]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000308758 items=0 ppid=4708 pid=4911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:59.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661376536646165383630333430383136346339306638383936613736
Dec 13 02:24:59.636000 audit: BPF prog-id=202 op=UNLOAD
Dec 13 02:24:59.636000 audit: BPF prog-id=201 op=UNLOAD
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { bpf } for  pid=4911 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { bpf } for  pid=4911 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { bpf } for  pid=4911 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { perfmon } for  pid=4911 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { perfmon } for  pid=4911 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { perfmon } for  pid=4911 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { perfmon } for  pid=4911 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { perfmon } for  pid=4911 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { bpf } for  pid=4911 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit[4911]: AVC avc:  denied  { bpf } for  pid=4911 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:24:59.636000 audit: BPF prog-id=203 op=LOAD
Dec 13 02:24:59.636000 audit[4911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000308b68 items=0 ppid=4708 pid=4911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:59.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661376536646165383630333430383136346339306638383936613736
Dec 13 02:24:59.720855 env[1728]: time="2024-12-13T02:24:59.720800492Z" level=info msg="StartContainer for \"6a7e6dae8603408164c90f8896a7687d27b4ad684f3733c7b974fec7ce4d7769\" returns successfully"
Dec 13 02:24:59.783692 kubelet[2727]: I1213 02:24:59.783615    2727 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-74bf487454-wz4kv" podStartSLOduration=31.083259657 podStartE2EDuration="35.783589859s" podCreationTimestamp="2024-12-13 02:24:24 +0000 UTC" firstStartedPulling="2024-12-13 02:24:54.774891744 +0000 UTC m=+43.150714167" lastFinishedPulling="2024-12-13 02:24:59.47522194 +0000 UTC m=+47.851044369" observedRunningTime="2024-12-13 02:24:59.752089587 +0000 UTC m=+48.127912023" watchObservedRunningTime="2024-12-13 02:24:59.783589859 +0000 UTC m=+48.159412293"
Dec 13 02:24:59.813000 audit[4939]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4939 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:59.813000 audit[4939]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffefd0e2510 a2=0 a3=7ffefd0e24fc items=0 ppid=2876 pid=4939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:59.813000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:59.819000 audit[4939]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4939 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:59.819000 audit[4939]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffefd0e2510 a2=0 a3=7ffefd0e24fc items=0 ppid=2876 pid=4939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:59.819000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:59.872000 audit[4943]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=4943 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:59.872000 audit[4943]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffdea993110 a2=0 a3=7ffdea9930fc items=0 ppid=2876 pid=4943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:59.872000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:24:59.878000 audit[4943]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4943 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:24:59.878000 audit[4943]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdea993110 a2=0 a3=7ffdea9930fc items=0 ppid=2876 pid=4943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:24:59.878000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:00.139054 systemd[1]: run-containerd-runc-k8s.io-c667762665fc18cc694d2b7ca5823b063aacb3bf34955f97544d9cfadb977498-runc.08jPXf.mount: Deactivated successfully.
Dec 13 02:25:00.740709 kubelet[2727]: I1213 02:25:00.740670    2727 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness"
Dec 13 02:25:01.135913 kubelet[2727]: I1213 02:25:01.134548    2727 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-74bf487454-f5nw8" podStartSLOduration=32.026183938 podStartE2EDuration="37.134520312s" podCreationTimestamp="2024-12-13 02:24:24 +0000 UTC" firstStartedPulling="2024-12-13 02:24:53.983464551 +0000 UTC m=+42.359286980" lastFinishedPulling="2024-12-13 02:24:59.091800931 +0000 UTC m=+47.467623354" observedRunningTime="2024-12-13 02:24:59.783980175 +0000 UTC m=+48.159802610" watchObservedRunningTime="2024-12-13 02:25:01.134520312 +0000 UTC m=+49.510342749"
Dec 13 02:25:01.177156 env[1728]: time="2024-12-13T02:25:01.177099875Z" level=info msg="StopContainer for \"bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730\" with timeout 300 (s)"
Dec 13 02:25:01.178201 env[1728]: time="2024-12-13T02:25:01.178128435Z" level=info msg="Stop container \"bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730\" with signal terminated"
Dec 13 02:25:01.750398 kubelet[2727]: I1213 02:25:01.750354    2727 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness"
Dec 13 02:25:02.047705 systemd[1]: Started sshd@7-172.31.27.10:22-139.178.68.195:42334.service.
Dec 13 02:25:02.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.27.10:22-139.178.68.195:42334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:02.177000 audit[4955]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=4955 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:02.177000 audit[4955]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd88380250 a2=0 a3=7ffd8838023c items=0 ppid=2876 pid=4955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:02.177000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:02.324000 audit[4955]: NETFILTER_CFG table=nat:122 family=2 entries=28 op=nft_register_rule pid=4955 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:02.324000 audit[4955]: SYSCALL arch=c000003e syscall=46 success=yes exit=8580 a0=3 a1=7ffd88380250 a2=0 a3=7ffd8838023c items=0 ppid=2876 pid=4955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:02.324000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:02.839000 audit[4958]: USER_ACCT pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:02.849087 sshd[4958]: Accepted publickey for core from 139.178.68.195 port 42334 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:25:02.848000 audit[4958]: CRED_ACQ pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:02.848000 audit[4958]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff89517460 a2=3 a3=0 items=0 ppid=1 pid=4958 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:02.848000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:25:02.865170 sshd[4958]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:25:02.917078 systemd[1]: Started session-8.scope.
Dec 13 02:25:02.917700 systemd-logind[1722]: New session 8 of user core.
Dec 13 02:25:02.951000 audit[4958]: USER_START pid=4958 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:02.954000 audit[4966]: CRED_ACQ pid=4966 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:04.511953 kernel: kauditd_printk_skb: 130 callbacks suppressed
Dec 13 02:25:04.512128 kernel: audit: type=1325 audit(1734056704.493:1347): table=filter:123 family=2 entries=10 op=nft_register_rule pid=4979 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:04.493000 audit[4979]: NETFILTER_CFG table=filter:123 family=2 entries=10 op=nft_register_rule pid=4979 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:04.762745 kernel: audit: type=1300 audit(1734056704.493:1347): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff85f3ff80 a2=0 a3=7fff85f3ff6c items=0 ppid=2876 pid=4979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:04.762972 kernel: audit: type=1327 audit(1734056704.493:1347): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:04.763060 kernel: audit: type=1325 audit(1734056704.704:1348): table=nat:124 family=2 entries=28 op=nft_register_rule pid=4979 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:04.493000 audit[4979]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff85f3ff80 a2=0 a3=7fff85f3ff6c items=0 ppid=2876 pid=4979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:04.493000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:04.704000 audit[4979]: NETFILTER_CFG table=nat:124 family=2 entries=28 op=nft_register_rule pid=4979 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:04.780591 kernel: audit: type=1300 audit(1734056704.704:1348): arch=c000003e syscall=46 success=yes exit=8580 a0=3 a1=7fff85f3ff80 a2=0 a3=7fff85f3ff6c items=0 ppid=2876 pid=4979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:04.704000 audit[4979]: SYSCALL arch=c000003e syscall=46 success=yes exit=8580 a0=3 a1=7fff85f3ff80 a2=0 a3=7fff85f3ff6c items=0 ppid=2876 pid=4979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:04.704000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:04.790240 kernel: audit: type=1327 audit(1734056704.704:1348): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:05.071000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:25:05.088081 kernel: audit: type=1400 audit(1734056705.071:1349): avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:25:05.071000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001584180 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:25:05.097602 kernel: audit: type=1300 audit(1734056705.071:1349): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001584180 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:25:05.071000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:25:05.109886 kernel: audit: type=1327 audit(1734056705.071:1349): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:25:05.088000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:25:05.126341 kernel: audit: type=1400 audit(1734056705.088:1350): avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:25:05.088000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002d176b0 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:25:05.088000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:25:05.627886 sshd[4958]: pam_unix(sshd:session): session closed for user core
Dec 13 02:25:05.631000 audit[4958]: USER_END pid=4958 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:05.631000 audit[4958]: CRED_DISP pid=4958 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:05.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.27.10:22-139.178.68.195:42334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:05.637679 systemd[1]: sshd@7-172.31.27.10:22-139.178.68.195:42334.service: Deactivated successfully.
Dec 13 02:25:05.638853 systemd[1]: session-8.scope: Deactivated successfully.
Dec 13 02:25:05.644305 systemd-logind[1722]: Session 8 logged out. Waiting for processes to exit.
Dec 13 02:25:05.650401 systemd-logind[1722]: Removed session 8.
Dec 13 02:25:06.311000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:25:06.311000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:25:06.311000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c011e65b00 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:25:06.311000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c011ebbbe0 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:25:06.311000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:25:06.311000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:25:06.311000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:25:06.311000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c0120c20f0 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:25:06.311000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:25:06.311000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:25:06.311000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c011e65b60 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:25:06.311000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:25:06.318000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:25:06.318000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c011e65bc0 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:25:06.318000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:25:06.318000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:25:06.318000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c011ebbc00 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:25:06.318000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:25:06.695000 audit: BPF prog-id=126 op=UNLOAD
Dec 13 02:25:06.698000 audit: BPF prog-id=129 op=UNLOAD
Dec 13 02:25:06.696247 systemd[1]: cri-containerd-bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730.scope: Deactivated successfully.
Dec 13 02:25:06.773880 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730-rootfs.mount: Deactivated successfully.
Dec 13 02:25:06.779656 env[1728]: time="2024-12-13T02:25:06.779603968Z" level=info msg="shim disconnected" id=bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730
Dec 13 02:25:06.780488 env[1728]: time="2024-12-13T02:25:06.780457423Z" level=warning msg="cleaning up after shim disconnected" id=bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730 namespace=k8s.io
Dec 13 02:25:06.780612 env[1728]: time="2024-12-13T02:25:06.780593423Z" level=info msg="cleaning up dead shim"
Dec 13 02:25:06.824048 env[1728]: time="2024-12-13T02:25:06.823995407Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:25:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5012 runtime=io.containerd.runc.v2\n"
Dec 13 02:25:06.867575 env[1728]: time="2024-12-13T02:25:06.867525475Z" level=info msg="StopContainer for \"bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730\" returns successfully"
Dec 13 02:25:06.882192 env[1728]: time="2024-12-13T02:25:06.882131240Z" level=info msg="StopPodSandbox for \"c4ac80bde30c4dce6e2c3ef727e24bfebe40428dd70155044b10971267049837\""
Dec 13 02:25:06.892134 env[1728]: time="2024-12-13T02:25:06.882228648Z" level=info msg="Container to stop \"bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730\" must be in running or unknown state, current state \"CONTAINER_EXITED\""
Dec 13 02:25:06.889930 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c4ac80bde30c4dce6e2c3ef727e24bfebe40428dd70155044b10971267049837-shm.mount: Deactivated successfully.
Dec 13 02:25:06.986000 audit: BPF prog-id=118 op=UNLOAD
Dec 13 02:25:06.987305 systemd[1]: cri-containerd-c4ac80bde30c4dce6e2c3ef727e24bfebe40428dd70155044b10971267049837.scope: Deactivated successfully.
Dec 13 02:25:06.991000 audit: BPF prog-id=121 op=UNLOAD
Dec 13 02:25:07.005429 env[1728]: time="2024-12-13T02:25:07.005388013Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:25:07.010374 env[1728]: time="2024-12-13T02:25:07.010330104Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:25:07.013734 env[1728]: time="2024-12-13T02:25:07.013690950Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:25:07.017877 env[1728]: time="2024-12-13T02:25:07.017832844Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:25:07.019222 env[1728]: time="2024-12-13T02:25:07.018689960Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\""
Dec 13 02:25:07.039257 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c4ac80bde30c4dce6e2c3ef727e24bfebe40428dd70155044b10971267049837-rootfs.mount: Deactivated successfully.
Dec 13 02:25:07.043053 env[1728]: time="2024-12-13T02:25:07.043005211Z" level=info msg="shim disconnected" id=c4ac80bde30c4dce6e2c3ef727e24bfebe40428dd70155044b10971267049837
Dec 13 02:25:07.044851 env[1728]: time="2024-12-13T02:25:07.044816282Z" level=warning msg="cleaning up after shim disconnected" id=c4ac80bde30c4dce6e2c3ef727e24bfebe40428dd70155044b10971267049837 namespace=k8s.io
Dec 13 02:25:07.045457 env[1728]: time="2024-12-13T02:25:07.045434361Z" level=info msg="cleaning up dead shim"
Dec 13 02:25:07.074930 env[1728]: time="2024-12-13T02:25:07.074884765Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:25:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5047 runtime=io.containerd.runc.v2\n"
Dec 13 02:25:07.112347 env[1728]: time="2024-12-13T02:25:07.112295355Z" level=info msg="TearDown network for sandbox \"c4ac80bde30c4dce6e2c3ef727e24bfebe40428dd70155044b10971267049837\" successfully"
Dec 13 02:25:07.112703 env[1728]: time="2024-12-13T02:25:07.112657668Z" level=info msg="StopPodSandbox for \"c4ac80bde30c4dce6e2c3ef727e24bfebe40428dd70155044b10971267049837\" returns successfully"
Dec 13 02:25:07.310652 env[1728]: time="2024-12-13T02:25:07.310391006Z" level=info msg="CreateContainer within sandbox \"097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}"
Dec 13 02:25:07.339493 env[1728]: time="2024-12-13T02:25:07.339428967Z" level=info msg="CreateContainer within sandbox \"097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b\""
Dec 13 02:25:07.340326 env[1728]: time="2024-12-13T02:25:07.340287384Z" level=info msg="StartContainer for \"a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b\""
Dec 13 02:25:07.380000 audit[5080]: NETFILTER_CFG table=filter:125 family=2 entries=11 op=nft_register_rule pid=5080 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:07.380000 audit[5080]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffced6df800 a2=0 a3=7ffced6df7ec items=0 ppid=2876 pid=5080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:07.380000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:07.385000 audit[5080]: NETFILTER_CFG table=nat:126 family=2 entries=25 op=nft_unregister_chain pid=5080 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:07.385000 audit[5080]: SYSCALL arch=c000003e syscall=46 success=yes exit=5260 a0=3 a1=7ffced6df800 a2=0 a3=7ffced6df7ec items=0 ppid=2876 pid=5080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:07.385000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:07.392758 systemd[1]: Started cri-containerd-a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b.scope.
Dec 13 02:25:07.476337 kubelet[2727]: I1213 02:25:07.476287    2727 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/23afd315-c19a-4938-8320-784e5e6f40aa-typha-certs\") pod \"23afd315-c19a-4938-8320-784e5e6f40aa\" (UID: \"23afd315-c19a-4938-8320-784e5e6f40aa\") "
Dec 13 02:25:07.483488 kubelet[2727]: I1213 02:25:07.483455    2727 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/23afd315-c19a-4938-8320-784e5e6f40aa-tigera-ca-bundle\") pod \"23afd315-c19a-4938-8320-784e5e6f40aa\" (UID: \"23afd315-c19a-4938-8320-784e5e6f40aa\") "
Dec 13 02:25:07.483758 kubelet[2727]: I1213 02:25:07.483737    2727 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-fgq4d\" (UniqueName: \"kubernetes.io/projected/23afd315-c19a-4938-8320-784e5e6f40aa-kube-api-access-fgq4d\") pod \"23afd315-c19a-4938-8320-784e5e6f40aa\" (UID: \"23afd315-c19a-4938-8320-784e5e6f40aa\") "
Dec 13 02:25:07.565227 kubelet[2727]: I1213 02:25:07.514543    2727 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/23afd315-c19a-4938-8320-784e5e6f40aa-kube-api-access-fgq4d" (OuterVolumeSpecName: "kube-api-access-fgq4d") pod "23afd315-c19a-4938-8320-784e5e6f40aa" (UID: "23afd315-c19a-4938-8320-784e5e6f40aa"). InnerVolumeSpecName "kube-api-access-fgq4d". PluginName "kubernetes.io/projected", VolumeGidValue ""
Dec 13 02:25:07.565489 kubelet[2727]: I1213 02:25:07.530409    2727 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/23afd315-c19a-4938-8320-784e5e6f40aa-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "23afd315-c19a-4938-8320-784e5e6f40aa" (UID: "23afd315-c19a-4938-8320-784e5e6f40aa"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue ""
Dec 13 02:25:07.570417 kubelet[2727]: I1213 02:25:07.514476    2727 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/23afd315-c19a-4938-8320-784e5e6f40aa-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "23afd315-c19a-4938-8320-784e5e6f40aa" (UID: "23afd315-c19a-4938-8320-784e5e6f40aa"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue ""
Dec 13 02:25:07.585264 kubelet[2727]: I1213 02:25:07.585223    2727 reconciler_common.go:288] "Volume detached for volume \"kube-api-access-fgq4d\" (UniqueName: \"kubernetes.io/projected/23afd315-c19a-4938-8320-784e5e6f40aa-kube-api-access-fgq4d\") on node \"ip-172-31-27-10\" DevicePath \"\""
Dec 13 02:25:07.585545 kubelet[2727]: I1213 02:25:07.585530    2727 reconciler_common.go:288] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/23afd315-c19a-4938-8320-784e5e6f40aa-typha-certs\") on node \"ip-172-31-27-10\" DevicePath \"\""
Dec 13 02:25:07.585630 kubelet[2727]: I1213 02:25:07.585618    2727 reconciler_common.go:288] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/23afd315-c19a-4938-8320-784e5e6f40aa-tigera-ca-bundle\") on node \"ip-172-31-27-10\" DevicePath \"\""
Dec 13 02:25:07.640000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.640000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.640000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.640000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.640000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.640000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.640000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.640000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.640000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.641000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.641000 audit: BPF prog-id=204 op=LOAD
Dec 13 02:25:07.643000 audit[5074]: AVC avc:  denied  { bpf } for  pid=5074 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.643000 audit[5074]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4757 pid=5074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:07.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135633432623163306262653562303035613436633530336335373437
Dec 13 02:25:07.643000 audit[5074]: AVC avc:  denied  { perfmon } for  pid=5074 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.643000 audit[5074]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=4757 pid=5074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:07.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135633432623163306262653562303035613436633530336335373437
Dec 13 02:25:07.643000 audit[5074]: AVC avc:  denied  { bpf } for  pid=5074 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.643000 audit[5074]: AVC avc:  denied  { bpf } for  pid=5074 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.643000 audit[5074]: AVC avc:  denied  { bpf } for  pid=5074 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.643000 audit[5074]: AVC avc:  denied  { perfmon } for  pid=5074 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.643000 audit[5074]: AVC avc:  denied  { perfmon } for  pid=5074 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.643000 audit[5074]: AVC avc:  denied  { perfmon } for  pid=5074 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.643000 audit[5074]: AVC avc:  denied  { perfmon } for  pid=5074 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.643000 audit[5074]: AVC avc:  denied  { perfmon } for  pid=5074 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.643000 audit[5074]: AVC avc:  denied  { bpf } for  pid=5074 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.643000 audit[5074]: AVC avc:  denied  { bpf } for  pid=5074 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.643000 audit: BPF prog-id=205 op=LOAD
Dec 13 02:25:07.643000 audit[5074]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00038edf0 items=0 ppid=4757 pid=5074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:07.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135633432623163306262653562303035613436633530336335373437
Dec 13 02:25:07.644000 audit[5074]: AVC avc:  denied  { bpf } for  pid=5074 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.644000 audit[5074]: AVC avc:  denied  { bpf } for  pid=5074 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.644000 audit[5074]: AVC avc:  denied  { perfmon } for  pid=5074 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.644000 audit[5074]: AVC avc:  denied  { perfmon } for  pid=5074 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.644000 audit[5074]: AVC avc:  denied  { perfmon } for  pid=5074 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.644000 audit[5074]: AVC avc:  denied  { perfmon } for  pid=5074 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.644000 audit[5074]: AVC avc:  denied  { perfmon } for  pid=5074 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.644000 audit[5074]: AVC avc:  denied  { bpf } for  pid=5074 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.644000 audit[5074]: AVC avc:  denied  { bpf } for  pid=5074 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.644000 audit: BPF prog-id=206 op=LOAD
Dec 13 02:25:07.644000 audit[5074]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00038ee38 items=0 ppid=4757 pid=5074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:07.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135633432623163306262653562303035613436633530336335373437
Dec 13 02:25:07.644000 audit: BPF prog-id=206 op=UNLOAD
Dec 13 02:25:07.644000 audit: BPF prog-id=205 op=UNLOAD
Dec 13 02:25:07.644000 audit[5074]: AVC avc:  denied  { bpf } for  pid=5074 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.644000 audit[5074]: AVC avc:  denied  { bpf } for  pid=5074 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.644000 audit[5074]: AVC avc:  denied  { bpf } for  pid=5074 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.644000 audit[5074]: AVC avc:  denied  { perfmon } for  pid=5074 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.644000 audit[5074]: AVC avc:  denied  { perfmon } for  pid=5074 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.644000 audit[5074]: AVC avc:  denied  { perfmon } for  pid=5074 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.644000 audit[5074]: AVC avc:  denied  { perfmon } for  pid=5074 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.644000 audit[5074]: AVC avc:  denied  { perfmon } for  pid=5074 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.644000 audit[5074]: AVC avc:  denied  { bpf } for  pid=5074 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.644000 audit[5074]: AVC avc:  denied  { bpf } for  pid=5074 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:07.644000 audit: BPF prog-id=207 op=LOAD
Dec 13 02:25:07.644000 audit[5074]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00038f248 items=0 ppid=4757 pid=5074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:07.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135633432623163306262653562303035613436633530336335373437
Dec 13 02:25:07.774378 systemd[1]: var-lib-kubelet-pods-23afd315\x2dc19a\x2d4938\x2d8320\x2d784e5e6f40aa-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully.
Dec 13 02:25:07.774914 systemd[1]: var-lib-kubelet-pods-23afd315\x2dc19a\x2d4938\x2d8320\x2d784e5e6f40aa-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dfgq4d.mount: Deactivated successfully.
Dec 13 02:25:07.775208 systemd[1]: var-lib-kubelet-pods-23afd315\x2dc19a\x2d4938\x2d8320\x2d784e5e6f40aa-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully.
Dec 13 02:25:07.875000 audit[4886]: AVC avc:  denied  { watch } for  pid=4886 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_24_36.2381904809/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c176,c639 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c176,c639 tclass=file permissive=0
Dec 13 02:25:07.875000 audit[4886]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c51a80 a2=fc6 a3=0 items=0 ppid=4617 pid=4886 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c176,c639 key=(null)
Dec 13 02:25:07.875000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274
Dec 13 02:25:07.885056 kubelet[2727]: I1213 02:25:07.885011    2727 scope.go:117] "RemoveContainer" containerID="bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730"
Dec 13 02:25:07.922250 systemd[1]: Removed slice kubepods-besteffort-pod23afd315_c19a_4938_8320_784e5e6f40aa.slice.
Dec 13 02:25:07.951731 env[1728]: time="2024-12-13T02:25:07.950659780Z" level=info msg="RemoveContainer for \"bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730\""
Dec 13 02:25:07.960211 env[1728]: time="2024-12-13T02:25:07.960161682Z" level=info msg="RemoveContainer for \"bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730\" returns successfully"
Dec 13 02:25:07.975402 kubelet[2727]: I1213 02:25:07.975366    2727 scope.go:117] "RemoveContainer" containerID="bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730"
Dec 13 02:25:07.976192 env[1728]: time="2024-12-13T02:25:07.975928970Z" level=error msg="ContainerStatus for \"bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730\": not found"
Dec 13 02:25:07.998544 kubelet[2727]: E1213 02:25:07.998491    2727 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730\": not found" containerID="bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730"
Dec 13 02:25:08.004942 kubelet[2727]: I1213 02:25:08.002736    2727 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730"} err="failed to get container status \"bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730\": rpc error: code = NotFound desc = an error occurred when try to find container \"bfc62aab8d2862daf7f3a11a7b0d629aa31d73c6a2e6b0175975e67378cb9730\": not found"
Dec 13 02:25:08.030679 env[1728]: time="2024-12-13T02:25:08.030541764Z" level=info msg="StartContainer for \"a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b\" returns successfully"
Dec 13 02:25:08.195000 audit[5114]: NETFILTER_CFG table=filter:127 family=2 entries=11 op=nft_register_rule pid=5114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:08.195000 audit[5114]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffda50b39d0 a2=0 a3=7ffda50b39bc items=0 ppid=2876 pid=5114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:08.195000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:08.203000 audit[5114]: NETFILTER_CFG table=nat:128 family=2 entries=25 op=nft_register_chain pid=5114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:08.203000 audit[5114]: SYSCALL arch=c000003e syscall=46 success=yes exit=8580 a0=3 a1=7ffda50b39d0 a2=0 a3=7ffda50b39bc items=0 ppid=2876 pid=5114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:08.203000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:08.969548 env[1728]: time="2024-12-13T02:25:08.969503412Z" level=info msg="StopContainer for \"a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b\" with timeout 30 (s)"
Dec 13 02:25:08.970650 env[1728]: time="2024-12-13T02:25:08.970426618Z" level=info msg="Stop container \"a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b\" with signal terminated"
Dec 13 02:25:09.033141 systemd[1]: run-containerd-runc-k8s.io-a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b-runc.zxr0UG.mount: Deactivated successfully.
Dec 13 02:25:09.052000 audit: BPF prog-id=204 op=UNLOAD
Dec 13 02:25:09.053490 systemd[1]: cri-containerd-a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b.scope: Deactivated successfully.
Dec 13 02:25:09.060000 audit: BPF prog-id=207 op=UNLOAD
Dec 13 02:25:09.104812 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b-rootfs.mount: Deactivated successfully.
Dec 13 02:25:09.161029 env[1728]: time="2024-12-13T02:25:09.160973881Z" level=error msg="Failed to delete exec process \"4f89cd6d6bc423803481aa845a2c815f52d264cd7d092993827f2af214c63766\" for container \"a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b\"" error="container not created: not found"
Dec 13 02:25:09.161794 env[1728]: time="2024-12-13T02:25:09.161600691Z" level=error msg="ExecSync for \"a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b\" failed" error="failed to exec in container: failed to start exec \"4f89cd6d6bc423803481aa845a2c815f52d264cd7d092993827f2af214c63766\": OCI runtime exec failed: exec failed: unable to start container process: read init-p: connection reset by peer: unknown"
Dec 13 02:25:09.165826 env[1728]: time="2024-12-13T02:25:09.161006985Z" level=info msg="shim disconnected" id=a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b
Dec 13 02:25:09.167316 env[1728]: time="2024-12-13T02:25:09.165844374Z" level=warning msg="cleaning up after shim disconnected" id=a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b namespace=k8s.io
Dec 13 02:25:09.167316 env[1728]: time="2024-12-13T02:25:09.166518821Z" level=info msg="cleaning up dead shim"
Dec 13 02:25:09.170812 kubelet[2727]: E1213 02:25:09.169133    2727 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = failed to exec in container: failed to start exec \"4f89cd6d6bc423803481aa845a2c815f52d264cd7d092993827f2af214c63766\": OCI runtime exec failed: exec failed: unable to start container process: read init-p: connection reset by peer: unknown" containerID="a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b" cmd=["/usr/bin/check-status","-r"]
Dec 13 02:25:09.175270 env[1728]: time="2024-12-13T02:25:09.175116723Z" level=error msg="ExecSync for \"a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b not found: not found"
Dec 13 02:25:09.176060 kubelet[2727]: E1213 02:25:09.176010    2727 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b not found: not found" containerID="a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b" cmd=["/usr/bin/check-status","-r"]
Dec 13 02:25:09.179809 env[1728]: time="2024-12-13T02:25:09.179735987Z" level=error msg="ExecSync for \"a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b not found: not found"
Dec 13 02:25:09.179999 kubelet[2727]: E1213 02:25:09.179957    2727 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b not found: not found" containerID="a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b" cmd=["/usr/bin/check-status","-r"]
Dec 13 02:25:09.217805 env[1728]: time="2024-12-13T02:25:09.217751850Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:25:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5164 runtime=io.containerd.runc.v2\ntime=\"2024-12-13T02:25:09Z\" level=warning msg=\"failed to remove runc container\" error=\"runc did not terminate successfully: exit status 255: \" runtime=io.containerd.runc.v2\n"
Dec 13 02:25:09.225862 env[1728]: time="2024-12-13T02:25:09.225590700Z" level=info msg="StopContainer for \"a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b\" returns successfully"
Dec 13 02:25:09.227261 env[1728]: time="2024-12-13T02:25:09.226670516Z" level=info msg="StopPodSandbox for \"097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f\""
Dec 13 02:25:09.227516 env[1728]: time="2024-12-13T02:25:09.227487384Z" level=info msg="Container to stop \"a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b\" must be in running or unknown state, current state \"CONTAINER_EXITED\""
Dec 13 02:25:09.233621 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f-shm.mount: Deactivated successfully.
Dec 13 02:25:09.265000 audit: BPF prog-id=189 op=UNLOAD
Dec 13 02:25:09.266397 systemd[1]: cri-containerd-097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f.scope: Deactivated successfully.
Dec 13 02:25:09.269000 audit: BPF prog-id=192 op=UNLOAD
Dec 13 02:25:09.333641 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f-rootfs.mount: Deactivated successfully.
Dec 13 02:25:09.350592 env[1728]: time="2024-12-13T02:25:09.350541549Z" level=info msg="shim disconnected" id=097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f
Dec 13 02:25:09.351001 env[1728]: time="2024-12-13T02:25:09.350976432Z" level=warning msg="cleaning up after shim disconnected" id=097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f namespace=k8s.io
Dec 13 02:25:09.351178 env[1728]: time="2024-12-13T02:25:09.351161817Z" level=info msg="cleaning up dead shim"
Dec 13 02:25:09.373985 env[1728]: time="2024-12-13T02:25:09.373935067Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:25:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5196 runtime=io.containerd.runc.v2\n"
Dec 13 02:25:09.950964 kubelet[2727]: I1213 02:25:09.950905    2727 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="23afd315-c19a-4938-8320-784e5e6f40aa" path="/var/lib/kubelet/pods/23afd315-c19a-4938-8320-784e5e6f40aa/volumes"
Dec 13 02:25:09.968982 kubelet[2727]: I1213 02:25:09.966676    2727 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-d49669cd5-nhvrl" podStartSLOduration=33.786717029 podStartE2EDuration="45.966650796s" podCreationTimestamp="2024-12-13 02:24:24 +0000 UTC" firstStartedPulling="2024-12-13 02:24:54.866330027 +0000 UTC m=+43.242152445" lastFinishedPulling="2024-12-13 02:25:07.046263791 +0000 UTC m=+55.422086212" observedRunningTime="2024-12-13 02:25:09.03868808 +0000 UTC m=+57.414510515" watchObservedRunningTime="2024-12-13 02:25:09.966650796 +0000 UTC m=+58.342473232"
Dec 13 02:25:09.971469 systemd-networkd[1457]: cali846b91335a7: Link DOWN
Dec 13 02:25:09.971478 systemd-networkd[1457]: cali846b91335a7: Lost carrier
Dec 13 02:25:10.001797 kubelet[2727]: I1213 02:25:10.001766    2727 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f"
Dec 13 02:25:10.388000 audit[4921]: AVC avc:  denied  { watch } for  pid=4921 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_24_36.1409813258/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c456 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c15,c456 tclass=file permissive=0
Dec 13 02:25:10.390886 kernel: kauditd_printk_skb: 103 callbacks suppressed
Dec 13 02:25:10.390999 kernel: audit: type=1400 audit(1734056710.388:1391): avc:  denied  { watch } for  pid=4921 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_24_36.1409813258/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c456 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c15,c456 tclass=file permissive=0
Dec 13 02:25:10.417197 kernel: audit: type=1300 audit(1734056710.388:1391): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000eb8e80 a2=fc6 a3=0 items=0 ppid=4708 pid=4921 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c456 key=(null)
Dec 13 02:25:10.388000 audit[4921]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000eb8e80 a2=fc6 a3=0 items=0 ppid=4708 pid=4921 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c456 key=(null)
Dec 13 02:25:10.388000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274
Dec 13 02:25:10.426573 kernel: audit: type=1327 audit(1734056710.388:1391): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274
Dec 13 02:25:10.663535 systemd[1]: Started sshd@8-172.31.27.10:22-139.178.68.195:36644.service.
Dec 13 02:25:10.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.27.10:22-139.178.68.195:36644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:10.670283 kernel: audit: type=1130 audit(1734056710.663:1392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.27.10:22-139.178.68.195:36644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:10.712993 env[1728]: 2024-12-13 02:25:09.965 [INFO][5225] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f"
Dec 13 02:25:10.712993 env[1728]: 2024-12-13 02:25:09.968 [INFO][5225] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" iface="eth0" netns="/var/run/netns/cni-296ca155-786e-534b-3b60-a92c14bb5cb5"
Dec 13 02:25:10.712993 env[1728]: 2024-12-13 02:25:09.969 [INFO][5225] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" iface="eth0" netns="/var/run/netns/cni-296ca155-786e-534b-3b60-a92c14bb5cb5"
Dec 13 02:25:10.712993 env[1728]: 2024-12-13 02:25:10.100 [INFO][5225] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" after=131.883131ms iface="eth0" netns="/var/run/netns/cni-296ca155-786e-534b-3b60-a92c14bb5cb5"
Dec 13 02:25:10.712993 env[1728]: 2024-12-13 02:25:10.100 [INFO][5225] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f"
Dec 13 02:25:10.712993 env[1728]: 2024-12-13 02:25:10.100 [INFO][5225] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f"
Dec 13 02:25:10.712993 env[1728]: 2024-12-13 02:25:10.525 [INFO][5246] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" HandleID="k8s-pod-network.097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:10.712993 env[1728]: 2024-12-13 02:25:10.529 [INFO][5246] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:25:10.712993 env[1728]: 2024-12-13 02:25:10.530 [INFO][5246] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:25:10.712993 env[1728]: 2024-12-13 02:25:10.676 [INFO][5246] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" HandleID="k8s-pod-network.097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:10.712993 env[1728]: 2024-12-13 02:25:10.676 [INFO][5246] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" HandleID="k8s-pod-network.097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:10.712993 env[1728]: 2024-12-13 02:25:10.684 [INFO][5246] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:25:10.712993 env[1728]: 2024-12-13 02:25:10.705 [INFO][5225] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f"
Dec 13 02:25:10.739438 systemd[1]: run-netns-cni\x2d296ca155\x2d786e\x2d534b\x2d3b60\x2da92c14bb5cb5.mount: Deactivated successfully.
Dec 13 02:25:10.741568 env[1728]: time="2024-12-13T02:25:10.740795676Z" level=info msg="TearDown network for sandbox \"097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f\" successfully"
Dec 13 02:25:10.741568 env[1728]: time="2024-12-13T02:25:10.740845962Z" level=info msg="StopPodSandbox for \"097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f\" returns successfully"
Dec 13 02:25:10.743180 env[1728]: time="2024-12-13T02:25:10.742655053Z" level=info msg="StopPodSandbox for \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\""
Dec 13 02:25:10.745000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:25:10.754465 kernel: audit: type=1400 audit(1734056710.745:1393): avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:25:10.745000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002461180 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:25:10.763492 kernel: audit: type=1300 audit(1734056710.745:1393): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002461180 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:25:10.745000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:25:10.823284 kernel: audit: type=1327 audit(1734056710.745:1393): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:25:10.750000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:25:10.857716 kernel: audit: type=1400 audit(1734056710.750:1394): avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:25:10.750000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024fee40 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:25:10.870181 kernel: audit: type=1300 audit(1734056710.750:1394): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024fee40 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:25:10.750000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:25:10.890293 kernel: audit: type=1327 audit(1734056710.750:1394): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:25:10.750000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:25:10.750000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024611a0 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:25:10.750000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:25:10.750000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:25:10.750000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024fee60 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:25:10.750000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:25:11.295000 audit[5258]: USER_ACCT pid=5258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:11.305529 sshd[5258]: Accepted publickey for core from 139.178.68.195 port 36644 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:25:11.305000 audit[5258]: CRED_ACQ pid=5258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:11.309000 audit[5258]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0d22e5d0 a2=3 a3=0 items=0 ppid=1 pid=5258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:11.309000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:25:11.315234 sshd[5258]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:25:11.327596 systemd[1]: Started session-9.scope.
Dec 13 02:25:11.335251 systemd-logind[1722]: New session 9 of user core.
Dec 13 02:25:11.352000 audit[5258]: USER_START pid=5258 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:11.354000 audit[5297]: CRED_ACQ pid=5297 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:11.375393 env[1728]: 2024-12-13 02:25:11.159 [WARNING][5272] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0", GenerateName:"calico-kube-controllers-d49669cd5-", Namespace:"calico-system", SelfLink:"", UID:"73f8d749-4aed-4686-b899-a4512456e6f4", ResourceVersion:"1045", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 24, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"d49669cd5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f", Pod:"calico-kube-controllers-d49669cd5-nhvrl", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali846b91335a7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:25:11.375393 env[1728]: 2024-12-13 02:25:11.160 [INFO][5272] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92"
Dec 13 02:25:11.375393 env[1728]: 2024-12-13 02:25:11.161 [INFO][5272] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" iface="eth0" netns=""
Dec 13 02:25:11.375393 env[1728]: 2024-12-13 02:25:11.161 [INFO][5272] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92"
Dec 13 02:25:11.375393 env[1728]: 2024-12-13 02:25:11.161 [INFO][5272] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92"
Dec 13 02:25:11.375393 env[1728]: 2024-12-13 02:25:11.301 [INFO][5286] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" HandleID="k8s-pod-network.ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:11.375393 env[1728]: 2024-12-13 02:25:11.307 [INFO][5286] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:25:11.375393 env[1728]: 2024-12-13 02:25:11.307 [INFO][5286] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:25:11.375393 env[1728]: 2024-12-13 02:25:11.360 [WARNING][5286] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" HandleID="k8s-pod-network.ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:11.375393 env[1728]: 2024-12-13 02:25:11.360 [INFO][5286] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" HandleID="k8s-pod-network.ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:11.375393 env[1728]: 2024-12-13 02:25:11.363 [INFO][5286] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:25:11.375393 env[1728]: 2024-12-13 02:25:11.367 [INFO][5272] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92"
Dec 13 02:25:11.376074 env[1728]: time="2024-12-13T02:25:11.375431467Z" level=info msg="TearDown network for sandbox \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\" successfully"
Dec 13 02:25:11.376074 env[1728]: time="2024-12-13T02:25:11.375468018Z" level=info msg="StopPodSandbox for \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\" returns successfully"
Dec 13 02:25:11.676691 kubelet[2727]: I1213 02:25:11.676577    2727 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-7txs7\" (UniqueName: \"kubernetes.io/projected/73f8d749-4aed-4686-b899-a4512456e6f4-kube-api-access-7txs7\") pod \"73f8d749-4aed-4686-b899-a4512456e6f4\" (UID: \"73f8d749-4aed-4686-b899-a4512456e6f4\") "
Dec 13 02:25:11.677430 kubelet[2727]: I1213 02:25:11.677389    2727 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/73f8d749-4aed-4686-b899-a4512456e6f4-tigera-ca-bundle\") pod \"73f8d749-4aed-4686-b899-a4512456e6f4\" (UID: \"73f8d749-4aed-4686-b899-a4512456e6f4\") "
Dec 13 02:25:11.710355 systemd[1]: var-lib-kubelet-pods-73f8d749\x2d4aed\x2d4686\x2db899\x2da4512456e6f4-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d7txs7.mount: Deactivated successfully.
Dec 13 02:25:11.718446 kubelet[2727]: I1213 02:25:11.717458    2727 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/73f8d749-4aed-4686-b899-a4512456e6f4-kube-api-access-7txs7" (OuterVolumeSpecName: "kube-api-access-7txs7") pod "73f8d749-4aed-4686-b899-a4512456e6f4" (UID: "73f8d749-4aed-4686-b899-a4512456e6f4"). InnerVolumeSpecName "kube-api-access-7txs7". PluginName "kubernetes.io/projected", VolumeGidValue ""
Dec 13 02:25:11.777248 kubelet[2727]: I1213 02:25:11.777191    2727 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/73f8d749-4aed-4686-b899-a4512456e6f4-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "73f8d749-4aed-4686-b899-a4512456e6f4" (UID: "73f8d749-4aed-4686-b899-a4512456e6f4"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue ""
Dec 13 02:25:11.778373 systemd[1]: var-lib-kubelet-pods-73f8d749\x2d4aed\x2d4686\x2db899\x2da4512456e6f4-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dkube\x2dcontrollers-1.mount: Deactivated successfully.
Dec 13 02:25:11.813189 kubelet[2727]: I1213 02:25:11.813133    2727 reconciler_common.go:288] "Volume detached for volume \"kube-api-access-7txs7\" (UniqueName: \"kubernetes.io/projected/73f8d749-4aed-4686-b899-a4512456e6f4-kube-api-access-7txs7\") on node \"ip-172-31-27-10\" DevicePath \"\""
Dec 13 02:25:11.813189 kubelet[2727]: I1213 02:25:11.813196    2727 reconciler_common.go:288] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/73f8d749-4aed-4686-b899-a4512456e6f4-tigera-ca-bundle\") on node \"ip-172-31-27-10\" DevicePath \"\""
Dec 13 02:25:12.348876 kubelet[2727]: I1213 02:25:12.348838    2727 scope.go:117] "RemoveContainer" containerID="a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b"
Dec 13 02:25:12.452527 systemd[1]: Removed slice kubepods-besteffort-pod73f8d749_4aed_4686_b899_a4512456e6f4.slice.
Dec 13 02:25:12.484121 env[1728]: time="2024-12-13T02:25:12.483707341Z" level=info msg="RemoveContainer for \"a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b\""
Dec 13 02:25:12.499021 env[1728]: time="2024-12-13T02:25:12.498872819Z" level=info msg="RemoveContainer for \"a5c42b1c0bbe5b005a46c503c5747030006a1abafffa925b9bb1a78fb8298e7b\" returns successfully"
Dec 13 02:25:12.519388 env[1728]: time="2024-12-13T02:25:12.519280639Z" level=info msg="StopPodSandbox for \"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\""
Dec 13 02:25:12.777471 sshd[5258]: pam_unix(sshd:session): session closed for user core
Dec 13 02:25:12.779000 audit[5258]: USER_END pid=5258 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:12.779000 audit[5258]: CRED_DISP pid=5258 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:12.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.27.10:22-139.178.68.195:36644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:12.783430 systemd-logind[1722]: Session 9 logged out. Waiting for processes to exit.
Dec 13 02:25:12.783680 systemd[1]: sshd@8-172.31.27.10:22-139.178.68.195:36644.service: Deactivated successfully.
Dec 13 02:25:12.784785 systemd[1]: session-9.scope: Deactivated successfully.
Dec 13 02:25:12.790426 systemd-logind[1722]: Removed session 9.
Dec 13 02:25:12.995802 kubelet[2727]: E1213 02:25:12.994057    2727 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="23afd315-c19a-4938-8320-784e5e6f40aa" containerName="calico-typha"
Dec 13 02:25:12.995802 kubelet[2727]: E1213 02:25:12.994111    2727 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="73f8d749-4aed-4686-b899-a4512456e6f4" containerName="calico-kube-controllers"
Dec 13 02:25:13.045943 kubelet[2727]: I1213 02:25:13.044321    2727 memory_manager.go:354] "RemoveStaleState removing state" podUID="73f8d749-4aed-4686-b899-a4512456e6f4" containerName="calico-kube-controllers"
Dec 13 02:25:13.045943 kubelet[2727]: I1213 02:25:13.044579    2727 memory_manager.go:354] "RemoveStaleState removing state" podUID="23afd315-c19a-4938-8320-784e5e6f40aa" containerName="calico-typha"
Dec 13 02:25:13.064274 env[1728]: 2024-12-13 02:25:12.924 [WARNING][5334] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0", GenerateName:"calico-apiserver-74bf487454-", Namespace:"calico-apiserver", SelfLink:"", UID:"227ce0a8-6cb4-46e0-88a7-c73f2e8d5e2d", ResourceVersion:"886", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 24, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74bf487454", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8", Pod:"calico-apiserver-74bf487454-wz4kv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.29.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali515509dc18f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:25:13.064274 env[1728]: 2024-12-13 02:25:12.924 [INFO][5334] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48"
Dec 13 02:25:13.064274 env[1728]: 2024-12-13 02:25:12.924 [INFO][5334] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" iface="eth0" netns=""
Dec 13 02:25:13.064274 env[1728]: 2024-12-13 02:25:12.924 [INFO][5334] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48"
Dec 13 02:25:13.064274 env[1728]: 2024-12-13 02:25:12.925 [INFO][5334] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48"
Dec 13 02:25:13.064274 env[1728]: 2024-12-13 02:25:12.998 [INFO][5345] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" HandleID="k8s-pod-network.b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0"
Dec 13 02:25:13.064274 env[1728]: 2024-12-13 02:25:12.999 [INFO][5345] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:25:13.064274 env[1728]: 2024-12-13 02:25:12.999 [INFO][5345] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:25:13.064274 env[1728]: 2024-12-13 02:25:13.031 [WARNING][5345] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" HandleID="k8s-pod-network.b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0"
Dec 13 02:25:13.064274 env[1728]: 2024-12-13 02:25:13.031 [INFO][5345] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" HandleID="k8s-pod-network.b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0"
Dec 13 02:25:13.064274 env[1728]: 2024-12-13 02:25:13.037 [INFO][5345] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:25:13.064274 env[1728]: 2024-12-13 02:25:13.042 [INFO][5334] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48"
Dec 13 02:25:13.085225 env[1728]: time="2024-12-13T02:25:13.085133553Z" level=info msg="TearDown network for sandbox \"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\" successfully"
Dec 13 02:25:13.085354 env[1728]: time="2024-12-13T02:25:13.085332687Z" level=info msg="StopPodSandbox for \"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\" returns successfully"
Dec 13 02:25:13.121833 env[1728]: time="2024-12-13T02:25:13.121788063Z" level=info msg="RemovePodSandbox for \"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\""
Dec 13 02:25:13.122565 env[1728]: time="2024-12-13T02:25:13.121842328Z" level=info msg="Forcibly stopping sandbox \"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\""
Dec 13 02:25:13.165258 systemd[1]: Created slice kubepods-besteffort-pod0f0f7eca_66fb_443f_8e2f_ef557b04b32d.slice.
Dec 13 02:25:13.270044 kubelet[2727]: I1213 02:25:13.269953    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fvkg2\" (UniqueName: \"kubernetes.io/projected/0f0f7eca-66fb-443f-8e2f-ef557b04b32d-kube-api-access-fvkg2\") pod \"calico-kube-controllers-68d79bc76f-h7mrq\" (UID: \"0f0f7eca-66fb-443f-8e2f-ef557b04b32d\") " pod="calico-system/calico-kube-controllers-68d79bc76f-h7mrq"
Dec 13 02:25:13.270355 kubelet[2727]: I1213 02:25:13.270109    2727 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0f0f7eca-66fb-443f-8e2f-ef557b04b32d-tigera-ca-bundle\") pod \"calico-kube-controllers-68d79bc76f-h7mrq\" (UID: \"0f0f7eca-66fb-443f-8e2f-ef557b04b32d\") " pod="calico-system/calico-kube-controllers-68d79bc76f-h7mrq"
Dec 13 02:25:13.375926 env[1728]: 2024-12-13 02:25:13.298 [WARNING][5365] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0", GenerateName:"calico-apiserver-74bf487454-", Namespace:"calico-apiserver", SelfLink:"", UID:"227ce0a8-6cb4-46e0-88a7-c73f2e8d5e2d", ResourceVersion:"886", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 24, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74bf487454", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"d0d142c47c36e4f3265dcb5127b3a1c3a12b0882ad5ffdbd814270a018152dc8", Pod:"calico-apiserver-74bf487454-wz4kv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.29.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali515509dc18f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:25:13.375926 env[1728]: 2024-12-13 02:25:13.298 [INFO][5365] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48"
Dec 13 02:25:13.375926 env[1728]: 2024-12-13 02:25:13.298 [INFO][5365] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" iface="eth0" netns=""
Dec 13 02:25:13.375926 env[1728]: 2024-12-13 02:25:13.298 [INFO][5365] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48"
Dec 13 02:25:13.375926 env[1728]: 2024-12-13 02:25:13.298 [INFO][5365] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48"
Dec 13 02:25:13.375926 env[1728]: 2024-12-13 02:25:13.353 [INFO][5379] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" HandleID="k8s-pod-network.b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0"
Dec 13 02:25:13.375926 env[1728]: 2024-12-13 02:25:13.353 [INFO][5379] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:25:13.375926 env[1728]: 2024-12-13 02:25:13.353 [INFO][5379] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:25:13.375926 env[1728]: 2024-12-13 02:25:13.362 [WARNING][5379] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" HandleID="k8s-pod-network.b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0"
Dec 13 02:25:13.375926 env[1728]: 2024-12-13 02:25:13.363 [INFO][5379] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" HandleID="k8s-pod-network.b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--wz4kv-eth0"
Dec 13 02:25:13.375926 env[1728]: 2024-12-13 02:25:13.366 [INFO][5379] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:25:13.375926 env[1728]: 2024-12-13 02:25:13.371 [INFO][5365] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48"
Dec 13 02:25:13.378603 env[1728]: time="2024-12-13T02:25:13.376651652Z" level=info msg="TearDown network for sandbox \"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\" successfully"
Dec 13 02:25:13.390723 env[1728]: time="2024-12-13T02:25:13.390613891Z" level=info msg="RemovePodSandbox \"b3ed8cb252989b72f4b440be386e4654b3471ef6890df7467ca3163db1662e48\" returns successfully"
Dec 13 02:25:13.395526 env[1728]: time="2024-12-13T02:25:13.395485542Z" level=info msg="StopPodSandbox for \"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\""
Dec 13 02:25:13.487299 env[1728]: time="2024-12-13T02:25:13.484493381Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68d79bc76f-h7mrq,Uid:0f0f7eca-66fb-443f-8e2f-ef557b04b32d,Namespace:calico-system,Attempt:0,}"
Dec 13 02:25:13.599205 env[1728]: 2024-12-13 02:25:13.490 [WARNING][5400] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a3fa05f4-3a10-4b1c-869c-713b8a907f16", ResourceVersion:"867", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 23, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd", Pod:"csi-node-driver-qcbrg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.29.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0bc46136f9a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:25:13.599205 env[1728]: 2024-12-13 02:25:13.491 [INFO][5400] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440"
Dec 13 02:25:13.599205 env[1728]: 2024-12-13 02:25:13.491 [INFO][5400] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" iface="eth0" netns=""
Dec 13 02:25:13.599205 env[1728]: 2024-12-13 02:25:13.491 [INFO][5400] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440"
Dec 13 02:25:13.599205 env[1728]: 2024-12-13 02:25:13.491 [INFO][5400] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440"
Dec 13 02:25:13.599205 env[1728]: 2024-12-13 02:25:13.576 [INFO][5409] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" HandleID="k8s-pod-network.25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" Workload="ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0"
Dec 13 02:25:13.599205 env[1728]: 2024-12-13 02:25:13.577 [INFO][5409] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:25:13.599205 env[1728]: 2024-12-13 02:25:13.577 [INFO][5409] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:25:13.599205 env[1728]: 2024-12-13 02:25:13.591 [WARNING][5409] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" HandleID="k8s-pod-network.25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" Workload="ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0"
Dec 13 02:25:13.599205 env[1728]: 2024-12-13 02:25:13.592 [INFO][5409] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" HandleID="k8s-pod-network.25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" Workload="ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0"
Dec 13 02:25:13.599205 env[1728]: 2024-12-13 02:25:13.594 [INFO][5409] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:25:13.599205 env[1728]: 2024-12-13 02:25:13.596 [INFO][5400] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440"
Dec 13 02:25:13.600222 env[1728]: time="2024-12-13T02:25:13.600109473Z" level=info msg="TearDown network for sandbox \"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\" successfully"
Dec 13 02:25:13.600360 env[1728]: time="2024-12-13T02:25:13.600338120Z" level=info msg="StopPodSandbox for \"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\" returns successfully"
Dec 13 02:25:13.601029 env[1728]: time="2024-12-13T02:25:13.600987508Z" level=info msg="RemovePodSandbox for \"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\""
Dec 13 02:25:13.601244 env[1728]: time="2024-12-13T02:25:13.601183923Z" level=info msg="Forcibly stopping sandbox \"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\""
Dec 13 02:25:13.902274 kubelet[2727]: I1213 02:25:13.902220    2727 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="73f8d749-4aed-4686-b899-a4512456e6f4" path="/var/lib/kubelet/pods/73f8d749-4aed-4686-b899-a4512456e6f4/volumes"
Dec 13 02:25:13.903882 env[1728]: 2024-12-13 02:25:13.801 [WARNING][5440] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a3fa05f4-3a10-4b1c-869c-713b8a907f16", ResourceVersion:"867", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 23, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"d45e47f0134484ff79aae8e137539d3e68f734d01ff94494ff2340ad4504debd", Pod:"csi-node-driver-qcbrg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.29.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0bc46136f9a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:25:13.903882 env[1728]: 2024-12-13 02:25:13.802 [INFO][5440] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440"
Dec 13 02:25:13.903882 env[1728]: 2024-12-13 02:25:13.802 [INFO][5440] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" iface="eth0" netns=""
Dec 13 02:25:13.903882 env[1728]: 2024-12-13 02:25:13.803 [INFO][5440] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440"
Dec 13 02:25:13.903882 env[1728]: 2024-12-13 02:25:13.803 [INFO][5440] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440"
Dec 13 02:25:13.903882 env[1728]: 2024-12-13 02:25:13.868 [INFO][5452] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" HandleID="k8s-pod-network.25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" Workload="ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0"
Dec 13 02:25:13.903882 env[1728]: 2024-12-13 02:25:13.869 [INFO][5452] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:25:13.903882 env[1728]: 2024-12-13 02:25:13.869 [INFO][5452] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:25:13.903882 env[1728]: 2024-12-13 02:25:13.887 [WARNING][5452] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" HandleID="k8s-pod-network.25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" Workload="ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0"
Dec 13 02:25:13.903882 env[1728]: 2024-12-13 02:25:13.887 [INFO][5452] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" HandleID="k8s-pod-network.25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440" Workload="ip--172--31--27--10-k8s-csi--node--driver--qcbrg-eth0"
Dec 13 02:25:13.903882 env[1728]: 2024-12-13 02:25:13.892 [INFO][5452] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:25:13.903882 env[1728]: 2024-12-13 02:25:13.894 [INFO][5440] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440"
Dec 13 02:25:13.904648 env[1728]: time="2024-12-13T02:25:13.904608692Z" level=info msg="TearDown network for sandbox \"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\" successfully"
Dec 13 02:25:13.915446 env[1728]: time="2024-12-13T02:25:13.915393850Z" level=info msg="RemovePodSandbox \"25cf5d232e96e6640017495f946cfdc7e8c9145ae15dd3ac7f3adb8b4854c440\" returns successfully"
Dec 13 02:25:13.916014 env[1728]: time="2024-12-13T02:25:13.915979423Z" level=info msg="StopPodSandbox for \"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\""
Dec 13 02:25:14.010456 (udev-worker)[5481]: Network interface NamePolicy= disabled on kernel command line.
Dec 13 02:25:14.015403 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Dec 13 02:25:14.016885 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliba98ea0c73b: link becomes ready
Dec 13 02:25:14.011178 systemd-networkd[1457]: caliba98ea0c73b: Link UP
Dec 13 02:25:14.015610 systemd-networkd[1457]: caliba98ea0c73b: Gained carrier
Dec 13 02:25:14.048529 env[1728]: 2024-12-13 02:25:13.671 [INFO][5414] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--10-k8s-calico--kube--controllers--68d79bc76f--h7mrq-eth0 calico-kube-controllers-68d79bc76f- calico-system  0f0f7eca-66fb-443f-8e2f-ef557b04b32d 1083 0 2024-12-13 02:25:12 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:68d79bc76f projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s  ip-172-31-27-10  calico-kube-controllers-68d79bc76f-h7mrq eth0 calico-kube-controllers [] []   [kns.calico-system ksa.calico-system.calico-kube-controllers] caliba98ea0c73b  [] []}} ContainerID="d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c" Namespace="calico-system" Pod="calico-kube-controllers-68d79bc76f-h7mrq" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--kube--controllers--68d79bc76f--h7mrq-"
Dec 13 02:25:14.048529 env[1728]: 2024-12-13 02:25:13.671 [INFO][5414] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c" Namespace="calico-system" Pod="calico-kube-controllers-68d79bc76f-h7mrq" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--kube--controllers--68d79bc76f--h7mrq-eth0"
Dec 13 02:25:14.048529 env[1728]: 2024-12-13 02:25:13.855 [INFO][5447] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c" HandleID="k8s-pod-network.d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--68d79bc76f--h7mrq-eth0"
Dec 13 02:25:14.048529 env[1728]: 2024-12-13 02:25:13.880 [INFO][5447] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c" HandleID="k8s-pod-network.d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--68d79bc76f--h7mrq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003195f0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-27-10", "pod":"calico-kube-controllers-68d79bc76f-h7mrq", "timestamp":"2024-12-13 02:25:13.855556854 +0000 UTC"}, Hostname:"ip-172-31-27-10", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Dec 13 02:25:14.048529 env[1728]: 2024-12-13 02:25:13.880 [INFO][5447] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:25:14.048529 env[1728]: 2024-12-13 02:25:13.891 [INFO][5447] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:25:14.048529 env[1728]: 2024-12-13 02:25:13.892 [INFO][5447] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-10'
Dec 13 02:25:14.048529 env[1728]: 2024-12-13 02:25:13.904 [INFO][5447] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c" host="ip-172-31-27-10"
Dec 13 02:25:14.048529 env[1728]: 2024-12-13 02:25:13.913 [INFO][5447] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-10"
Dec 13 02:25:14.048529 env[1728]: 2024-12-13 02:25:13.936 [INFO][5447] ipam/ipam.go 489: Trying affinity for 192.168.29.0/26 host="ip-172-31-27-10"
Dec 13 02:25:14.048529 env[1728]: 2024-12-13 02:25:13.943 [INFO][5447] ipam/ipam.go 155: Attempting to load block cidr=192.168.29.0/26 host="ip-172-31-27-10"
Dec 13 02:25:14.048529 env[1728]: 2024-12-13 02:25:13.951 [INFO][5447] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.29.0/26 host="ip-172-31-27-10"
Dec 13 02:25:14.048529 env[1728]: 2024-12-13 02:25:13.951 [INFO][5447] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.29.0/26 handle="k8s-pod-network.d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c" host="ip-172-31-27-10"
Dec 13 02:25:14.048529 env[1728]: 2024-12-13 02:25:13.955 [INFO][5447] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c
Dec 13 02:25:14.048529 env[1728]: 2024-12-13 02:25:13.970 [INFO][5447] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.29.0/26 handle="k8s-pod-network.d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c" host="ip-172-31-27-10"
Dec 13 02:25:14.048529 env[1728]: 2024-12-13 02:25:13.983 [INFO][5447] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.29.7/26] block=192.168.29.0/26 handle="k8s-pod-network.d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c" host="ip-172-31-27-10"
Dec 13 02:25:14.048529 env[1728]: 2024-12-13 02:25:13.983 [INFO][5447] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.29.7/26] handle="k8s-pod-network.d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c" host="ip-172-31-27-10"
Dec 13 02:25:14.048529 env[1728]: 2024-12-13 02:25:13.983 [INFO][5447] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:25:14.048529 env[1728]: 2024-12-13 02:25:13.983 [INFO][5447] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.29.7/26] IPv6=[] ContainerID="d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c" HandleID="k8s-pod-network.d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--68d79bc76f--h7mrq-eth0"
Dec 13 02:25:14.051839 env[1728]: 2024-12-13 02:25:13.987 [INFO][5414] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c" Namespace="calico-system" Pod="calico-kube-controllers-68d79bc76f-h7mrq" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--kube--controllers--68d79bc76f--h7mrq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-calico--kube--controllers--68d79bc76f--h7mrq-eth0", GenerateName:"calico-kube-controllers-68d79bc76f-", Namespace:"calico-system", SelfLink:"", UID:"0f0f7eca-66fb-443f-8e2f-ef557b04b32d", ResourceVersion:"1083", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 12, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68d79bc76f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"", Pod:"calico-kube-controllers-68d79bc76f-h7mrq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.29.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliba98ea0c73b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:25:14.051839 env[1728]: 2024-12-13 02:25:13.988 [INFO][5414] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.29.7/32] ContainerID="d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c" Namespace="calico-system" Pod="calico-kube-controllers-68d79bc76f-h7mrq" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--kube--controllers--68d79bc76f--h7mrq-eth0"
Dec 13 02:25:14.051839 env[1728]: 2024-12-13 02:25:13.988 [INFO][5414] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliba98ea0c73b ContainerID="d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c" Namespace="calico-system" Pod="calico-kube-controllers-68d79bc76f-h7mrq" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--kube--controllers--68d79bc76f--h7mrq-eth0"
Dec 13 02:25:14.051839 env[1728]: 2024-12-13 02:25:14.021 [INFO][5414] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c" Namespace="calico-system" Pod="calico-kube-controllers-68d79bc76f-h7mrq" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--kube--controllers--68d79bc76f--h7mrq-eth0"
Dec 13 02:25:14.051839 env[1728]: 2024-12-13 02:25:14.022 [INFO][5414] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c" Namespace="calico-system" Pod="calico-kube-controllers-68d79bc76f-h7mrq" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--kube--controllers--68d79bc76f--h7mrq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-calico--kube--controllers--68d79bc76f--h7mrq-eth0", GenerateName:"calico-kube-controllers-68d79bc76f-", Namespace:"calico-system", SelfLink:"", UID:"0f0f7eca-66fb-443f-8e2f-ef557b04b32d", ResourceVersion:"1083", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 25, 12, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68d79bc76f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c", Pod:"calico-kube-controllers-68d79bc76f-h7mrq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.29.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliba98ea0c73b", MAC:"36:bc:c4:f5:f6:59", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:25:14.051839 env[1728]: 2024-12-13 02:25:14.035 [INFO][5414] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c" Namespace="calico-system" Pod="calico-kube-controllers-68d79bc76f-h7mrq" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--kube--controllers--68d79bc76f--h7mrq-eth0"
Dec 13 02:25:14.107850 env[1728]: time="2024-12-13T02:25:14.106573756Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 02:25:14.107850 env[1728]: time="2024-12-13T02:25:14.106668938Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 02:25:14.107850 env[1728]: time="2024-12-13T02:25:14.106698123Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 02:25:14.107850 env[1728]: time="2024-12-13T02:25:14.106869526Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c pid=5505 runtime=io.containerd.runc.v2
Dec 13 02:25:14.162101 env[1728]: 2024-12-13 02:25:14.036 [WARNING][5475] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0", GenerateName:"calico-apiserver-74bf487454-", Namespace:"calico-apiserver", SelfLink:"", UID:"451fe638-c64f-4a5e-b8f8-88ad281bca14", ResourceVersion:"1023", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 24, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74bf487454", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336", Pod:"calico-apiserver-74bf487454-f5nw8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.29.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia44526f6143", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:25:14.162101 env[1728]: 2024-12-13 02:25:14.036 [INFO][5475] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234"
Dec 13 02:25:14.162101 env[1728]: 2024-12-13 02:25:14.036 [INFO][5475] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" iface="eth0" netns=""
Dec 13 02:25:14.162101 env[1728]: 2024-12-13 02:25:14.037 [INFO][5475] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234"
Dec 13 02:25:14.162101 env[1728]: 2024-12-13 02:25:14.037 [INFO][5475] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234"
Dec 13 02:25:14.162101 env[1728]: 2024-12-13 02:25:14.120 [INFO][5484] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" HandleID="k8s-pod-network.4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0"
Dec 13 02:25:14.162101 env[1728]: 2024-12-13 02:25:14.120 [INFO][5484] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:25:14.162101 env[1728]: 2024-12-13 02:25:14.120 [INFO][5484] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:25:14.162101 env[1728]: 2024-12-13 02:25:14.139 [WARNING][5484] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" HandleID="k8s-pod-network.4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0"
Dec 13 02:25:14.162101 env[1728]: 2024-12-13 02:25:14.139 [INFO][5484] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" HandleID="k8s-pod-network.4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0"
Dec 13 02:25:14.162101 env[1728]: 2024-12-13 02:25:14.143 [INFO][5484] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:25:14.162101 env[1728]: 2024-12-13 02:25:14.159 [INFO][5475] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234"
Dec 13 02:25:14.164752 env[1728]: time="2024-12-13T02:25:14.162056007Z" level=info msg="TearDown network for sandbox \"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\" successfully"
Dec 13 02:25:14.164916 env[1728]: time="2024-12-13T02:25:14.164760119Z" level=info msg="StopPodSandbox for \"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\" returns successfully"
Dec 13 02:25:14.167970 env[1728]: time="2024-12-13T02:25:14.166967757Z" level=info msg="RemovePodSandbox for \"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\""
Dec 13 02:25:14.167970 env[1728]: time="2024-12-13T02:25:14.167014272Z" level=info msg="Forcibly stopping sandbox \"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\""
Dec 13 02:25:14.180930 systemd[1]: Started cri-containerd-d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c.scope.
Dec 13 02:25:14.375000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.375000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.375000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.375000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.375000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.375000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.375000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.375000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.375000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.375000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.375000 audit: BPF prog-id=208 op=LOAD
Dec 13 02:25:14.376000 audit[5518]: AVC avc:  denied  { bpf } for  pid=5518 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.376000 audit[5518]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5505 pid=5518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:14.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303234653763376635346438623162366636663061363937643233
Dec 13 02:25:14.376000 audit[5518]: AVC avc:  denied  { perfmon } for  pid=5518 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.376000 audit[5518]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5505 pid=5518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:14.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303234653763376635346438623162366636663061363937643233
Dec 13 02:25:14.376000 audit[5518]: AVC avc:  denied  { bpf } for  pid=5518 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.376000 audit[5518]: AVC avc:  denied  { bpf } for  pid=5518 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.376000 audit[5518]: AVC avc:  denied  { bpf } for  pid=5518 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.376000 audit[5518]: AVC avc:  denied  { perfmon } for  pid=5518 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.376000 audit[5518]: AVC avc:  denied  { perfmon } for  pid=5518 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.376000 audit[5518]: AVC avc:  denied  { perfmon } for  pid=5518 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.376000 audit[5518]: AVC avc:  denied  { perfmon } for  pid=5518 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.376000 audit[5518]: AVC avc:  denied  { perfmon } for  pid=5518 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.376000 audit[5518]: AVC avc:  denied  { bpf } for  pid=5518 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.376000 audit[5518]: AVC avc:  denied  { bpf } for  pid=5518 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.376000 audit: BPF prog-id=209 op=LOAD
Dec 13 02:25:14.376000 audit[5518]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000299fa0 items=0 ppid=5505 pid=5518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:14.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303234653763376635346438623162366636663061363937643233
Dec 13 02:25:14.376000 audit[5518]: AVC avc:  denied  { bpf } for  pid=5518 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.376000 audit[5518]: AVC avc:  denied  { bpf } for  pid=5518 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.376000 audit[5518]: AVC avc:  denied  { perfmon } for  pid=5518 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.376000 audit[5518]: AVC avc:  denied  { perfmon } for  pid=5518 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.376000 audit[5518]: AVC avc:  denied  { perfmon } for  pid=5518 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.376000 audit[5518]: AVC avc:  denied  { perfmon } for  pid=5518 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.376000 audit[5518]: AVC avc:  denied  { perfmon } for  pid=5518 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.376000 audit[5518]: AVC avc:  denied  { bpf } for  pid=5518 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.376000 audit[5518]: AVC avc:  denied  { bpf } for  pid=5518 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.376000 audit: BPF prog-id=210 op=LOAD
Dec 13 02:25:14.376000 audit[5518]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000299fe8 items=0 ppid=5505 pid=5518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:14.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303234653763376635346438623162366636663061363937643233
Dec 13 02:25:14.377000 audit: BPF prog-id=210 op=UNLOAD
Dec 13 02:25:14.377000 audit: BPF prog-id=209 op=UNLOAD
Dec 13 02:25:14.377000 audit[5518]: AVC avc:  denied  { bpf } for  pid=5518 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.377000 audit[5518]: AVC avc:  denied  { bpf } for  pid=5518 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.377000 audit[5518]: AVC avc:  denied  { bpf } for  pid=5518 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.377000 audit[5518]: AVC avc:  denied  { perfmon } for  pid=5518 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.377000 audit[5518]: AVC avc:  denied  { perfmon } for  pid=5518 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.377000 audit[5518]: AVC avc:  denied  { perfmon } for  pid=5518 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.377000 audit[5518]: AVC avc:  denied  { perfmon } for  pid=5518 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.377000 audit[5518]: AVC avc:  denied  { perfmon } for  pid=5518 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.377000 audit[5518]: AVC avc:  denied  { bpf } for  pid=5518 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.377000 audit[5518]: AVC avc:  denied  { bpf } for  pid=5518 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.377000 audit: BPF prog-id=211 op=LOAD
Dec 13 02:25:14.377000 audit[5518]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003963f8 items=0 ppid=5505 pid=5518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:14.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303234653763376635346438623162366636663061363937643233
Dec 13 02:25:14.435074 env[1728]: 2024-12-13 02:25:14.297 [WARNING][5544] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0", GenerateName:"calico-apiserver-74bf487454-", Namespace:"calico-apiserver", SelfLink:"", UID:"451fe638-c64f-4a5e-b8f8-88ad281bca14", ResourceVersion:"1023", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 24, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74bf487454", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"f5737370c0f25652615e7de48949914185254c8fb50b1e7000bf8383b93f1336", Pod:"calico-apiserver-74bf487454-f5nw8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.29.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia44526f6143", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:25:14.435074 env[1728]: 2024-12-13 02:25:14.297 [INFO][5544] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234"
Dec 13 02:25:14.435074 env[1728]: 2024-12-13 02:25:14.297 [INFO][5544] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" iface="eth0" netns=""
Dec 13 02:25:14.435074 env[1728]: 2024-12-13 02:25:14.297 [INFO][5544] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234"
Dec 13 02:25:14.435074 env[1728]: 2024-12-13 02:25:14.297 [INFO][5544] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234"
Dec 13 02:25:14.435074 env[1728]: 2024-12-13 02:25:14.417 [INFO][5559] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" HandleID="k8s-pod-network.4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0"
Dec 13 02:25:14.435074 env[1728]: 2024-12-13 02:25:14.417 [INFO][5559] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:25:14.435074 env[1728]: 2024-12-13 02:25:14.417 [INFO][5559] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:25:14.435074 env[1728]: 2024-12-13 02:25:14.426 [WARNING][5559] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" HandleID="k8s-pod-network.4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0"
Dec 13 02:25:14.435074 env[1728]: 2024-12-13 02:25:14.426 [INFO][5559] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" HandleID="k8s-pod-network.4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234" Workload="ip--172--31--27--10-k8s-calico--apiserver--74bf487454--f5nw8-eth0"
Dec 13 02:25:14.435074 env[1728]: 2024-12-13 02:25:14.429 [INFO][5559] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:25:14.435074 env[1728]: 2024-12-13 02:25:14.433 [INFO][5544] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234"
Dec 13 02:25:14.435074 env[1728]: time="2024-12-13T02:25:14.435020119Z" level=info msg="TearDown network for sandbox \"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\" successfully"
Dec 13 02:25:14.445905 env[1728]: time="2024-12-13T02:25:14.445856944Z" level=info msg="RemovePodSandbox \"4a3a08395afb3117fdbba967e28ee58ea56833b2a1de8ec43663610a28845234\" returns successfully"
Dec 13 02:25:14.446753 env[1728]: time="2024-12-13T02:25:14.446711155Z" level=info msg="StopPodSandbox for \"097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f\""
Dec 13 02:25:14.605344 env[1728]: time="2024-12-13T02:25:14.605300288Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68d79bc76f-h7mrq,Uid:0f0f7eca-66fb-443f-8e2f-ef557b04b32d,Namespace:calico-system,Attempt:0,} returns sandbox id \"d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c\""
Dec 13 02:25:14.684901 env[1728]: time="2024-12-13T02:25:14.684849339Z" level=info msg="CreateContainer within sandbox \"d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}"
Dec 13 02:25:14.713904 env[1728]: time="2024-12-13T02:25:14.713786133Z" level=info msg="CreateContainer within sandbox \"d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"9db381c637e2e6bd85c48be19ead0f8084a2cc5477f23f1f2a0abd6953310ec7\""
Dec 13 02:25:14.715399 env[1728]: time="2024-12-13T02:25:14.715335886Z" level=info msg="StartContainer for \"9db381c637e2e6bd85c48be19ead0f8084a2cc5477f23f1f2a0abd6953310ec7\""
Dec 13 02:25:14.733674 env[1728]: 2024-12-13 02:25:14.570 [WARNING][5584] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:14.733674 env[1728]: 2024-12-13 02:25:14.572 [INFO][5584] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f"
Dec 13 02:25:14.733674 env[1728]: 2024-12-13 02:25:14.572 [INFO][5584] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" iface="eth0" netns=""
Dec 13 02:25:14.733674 env[1728]: 2024-12-13 02:25:14.572 [INFO][5584] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f"
Dec 13 02:25:14.733674 env[1728]: 2024-12-13 02:25:14.572 [INFO][5584] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f"
Dec 13 02:25:14.733674 env[1728]: 2024-12-13 02:25:14.690 [INFO][5592] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" HandleID="k8s-pod-network.097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:14.733674 env[1728]: 2024-12-13 02:25:14.690 [INFO][5592] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:25:14.733674 env[1728]: 2024-12-13 02:25:14.691 [INFO][5592] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:25:14.733674 env[1728]: 2024-12-13 02:25:14.717 [WARNING][5592] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" HandleID="k8s-pod-network.097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:14.733674 env[1728]: 2024-12-13 02:25:14.717 [INFO][5592] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" HandleID="k8s-pod-network.097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:14.733674 env[1728]: 2024-12-13 02:25:14.721 [INFO][5592] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:25:14.733674 env[1728]: 2024-12-13 02:25:14.726 [INFO][5584] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f"
Dec 13 02:25:14.735066 env[1728]: time="2024-12-13T02:25:14.733920807Z" level=info msg="TearDown network for sandbox \"097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f\" successfully"
Dec 13 02:25:14.735066 env[1728]: time="2024-12-13T02:25:14.733985487Z" level=info msg="StopPodSandbox for \"097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f\" returns successfully"
Dec 13 02:25:14.735368 env[1728]: time="2024-12-13T02:25:14.735333958Z" level=info msg="RemovePodSandbox for \"097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f\""
Dec 13 02:25:14.735649 env[1728]: time="2024-12-13T02:25:14.735599710Z" level=info msg="Forcibly stopping sandbox \"097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f\""
Dec 13 02:25:14.793999 systemd[1]: Started cri-containerd-9db381c637e2e6bd85c48be19ead0f8084a2cc5477f23f1f2a0abd6953310ec7.scope.
Dec 13 02:25:14.924000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.924000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.924000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.924000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.924000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.924000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.924000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.924000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.924000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.924000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.924000 audit: BPF prog-id=212 op=LOAD
Dec 13 02:25:14.925000 audit[5620]: AVC avc:  denied  { bpf } for  pid=5620 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.925000 audit[5620]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5505 pid=5620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:14.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964623338316336333765326536626438356334386265313965616430
Dec 13 02:25:14.925000 audit[5620]: AVC avc:  denied  { perfmon } for  pid=5620 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.925000 audit[5620]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5505 pid=5620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:14.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964623338316336333765326536626438356334386265313965616430
Dec 13 02:25:14.925000 audit[5620]: AVC avc:  denied  { bpf } for  pid=5620 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.925000 audit[5620]: AVC avc:  denied  { bpf } for  pid=5620 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.925000 audit[5620]: AVC avc:  denied  { bpf } for  pid=5620 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.925000 audit[5620]: AVC avc:  denied  { perfmon } for  pid=5620 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.925000 audit[5620]: AVC avc:  denied  { perfmon } for  pid=5620 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.925000 audit[5620]: AVC avc:  denied  { perfmon } for  pid=5620 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.925000 audit[5620]: AVC avc:  denied  { perfmon } for  pid=5620 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.925000 audit[5620]: AVC avc:  denied  { perfmon } for  pid=5620 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.925000 audit[5620]: AVC avc:  denied  { bpf } for  pid=5620 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.925000 audit[5620]: AVC avc:  denied  { bpf } for  pid=5620 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.925000 audit: BPF prog-id=213 op=LOAD
Dec 13 02:25:14.925000 audit[5620]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030a680 items=0 ppid=5505 pid=5620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:14.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964623338316336333765326536626438356334386265313965616430
Dec 13 02:25:14.926000 audit[5620]: AVC avc:  denied  { bpf } for  pid=5620 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.926000 audit[5620]: AVC avc:  denied  { bpf } for  pid=5620 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.926000 audit[5620]: AVC avc:  denied  { perfmon } for  pid=5620 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.926000 audit[5620]: AVC avc:  denied  { perfmon } for  pid=5620 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.926000 audit[5620]: AVC avc:  denied  { perfmon } for  pid=5620 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.926000 audit[5620]: AVC avc:  denied  { perfmon } for  pid=5620 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.926000 audit[5620]: AVC avc:  denied  { perfmon } for  pid=5620 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.926000 audit[5620]: AVC avc:  denied  { bpf } for  pid=5620 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.926000 audit[5620]: AVC avc:  denied  { bpf } for  pid=5620 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.926000 audit: BPF prog-id=214 op=LOAD
Dec 13 02:25:14.926000 audit[5620]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030a6c8 items=0 ppid=5505 pid=5620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:14.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964623338316336333765326536626438356334386265313965616430
Dec 13 02:25:14.926000 audit: BPF prog-id=214 op=UNLOAD
Dec 13 02:25:14.926000 audit: BPF prog-id=213 op=UNLOAD
Dec 13 02:25:14.926000 audit[5620]: AVC avc:  denied  { bpf } for  pid=5620 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.926000 audit[5620]: AVC avc:  denied  { bpf } for  pid=5620 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.926000 audit[5620]: AVC avc:  denied  { bpf } for  pid=5620 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.926000 audit[5620]: AVC avc:  denied  { perfmon } for  pid=5620 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.926000 audit[5620]: AVC avc:  denied  { perfmon } for  pid=5620 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.926000 audit[5620]: AVC avc:  denied  { perfmon } for  pid=5620 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.926000 audit[5620]: AVC avc:  denied  { perfmon } for  pid=5620 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.926000 audit[5620]: AVC avc:  denied  { perfmon } for  pid=5620 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.926000 audit[5620]: AVC avc:  denied  { bpf } for  pid=5620 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.926000 audit[5620]: AVC avc:  denied  { bpf } for  pid=5620 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:14.926000 audit: BPF prog-id=215 op=LOAD
Dec 13 02:25:14.926000 audit[5620]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030aad8 items=0 ppid=5505 pid=5620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:14.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964623338316336333765326536626438356334386265313965616430
Dec 13 02:25:14.934244 env[1728]: 2024-12-13 02:25:14.853 [WARNING][5631] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:14.934244 env[1728]: 2024-12-13 02:25:14.853 [INFO][5631] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f"
Dec 13 02:25:14.934244 env[1728]: 2024-12-13 02:25:14.853 [INFO][5631] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" iface="eth0" netns=""
Dec 13 02:25:14.934244 env[1728]: 2024-12-13 02:25:14.853 [INFO][5631] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f"
Dec 13 02:25:14.934244 env[1728]: 2024-12-13 02:25:14.853 [INFO][5631] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f"
Dec 13 02:25:14.934244 env[1728]: 2024-12-13 02:25:14.902 [INFO][5650] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" HandleID="k8s-pod-network.097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:14.934244 env[1728]: 2024-12-13 02:25:14.902 [INFO][5650] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:25:14.934244 env[1728]: 2024-12-13 02:25:14.902 [INFO][5650] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:25:14.934244 env[1728]: 2024-12-13 02:25:14.915 [WARNING][5650] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" HandleID="k8s-pod-network.097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:14.934244 env[1728]: 2024-12-13 02:25:14.915 [INFO][5650] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" HandleID="k8s-pod-network.097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:14.934244 env[1728]: 2024-12-13 02:25:14.922 [INFO][5650] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:25:14.934244 env[1728]: 2024-12-13 02:25:14.930 [INFO][5631] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f"
Dec 13 02:25:14.935669 env[1728]: time="2024-12-13T02:25:14.934733161Z" level=info msg="TearDown network for sandbox \"097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f\" successfully"
Dec 13 02:25:14.942610 env[1728]: time="2024-12-13T02:25:14.942560660Z" level=info msg="RemovePodSandbox \"097dde28a0ddce77852690750116d56ae320b6e32e4074758b5d6c40ea0c692f\" returns successfully"
Dec 13 02:25:14.943743 env[1728]: time="2024-12-13T02:25:14.943706365Z" level=info msg="StopPodSandbox for \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\""
Dec 13 02:25:15.126536 env[1728]: 2024-12-13 02:25:15.029 [WARNING][5675] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:15.126536 env[1728]: 2024-12-13 02:25:15.029 [INFO][5675] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92"
Dec 13 02:25:15.126536 env[1728]: 2024-12-13 02:25:15.029 [INFO][5675] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" iface="eth0" netns=""
Dec 13 02:25:15.126536 env[1728]: 2024-12-13 02:25:15.029 [INFO][5675] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92"
Dec 13 02:25:15.126536 env[1728]: 2024-12-13 02:25:15.029 [INFO][5675] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92"
Dec 13 02:25:15.126536 env[1728]: 2024-12-13 02:25:15.108 [INFO][5681] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" HandleID="k8s-pod-network.ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:15.126536 env[1728]: 2024-12-13 02:25:15.109 [INFO][5681] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:25:15.126536 env[1728]: 2024-12-13 02:25:15.109 [INFO][5681] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:25:15.126536 env[1728]: 2024-12-13 02:25:15.119 [WARNING][5681] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" HandleID="k8s-pod-network.ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:15.126536 env[1728]: 2024-12-13 02:25:15.119 [INFO][5681] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" HandleID="k8s-pod-network.ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:15.126536 env[1728]: 2024-12-13 02:25:15.122 [INFO][5681] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:25:15.126536 env[1728]: 2024-12-13 02:25:15.124 [INFO][5675] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92"
Dec 13 02:25:15.128919 env[1728]: time="2024-12-13T02:25:15.126795000Z" level=info msg="TearDown network for sandbox \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\" successfully"
Dec 13 02:25:15.128919 env[1728]: time="2024-12-13T02:25:15.126835163Z" level=info msg="StopPodSandbox for \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\" returns successfully"
Dec 13 02:25:15.128919 env[1728]: time="2024-12-13T02:25:15.128613673Z" level=info msg="RemovePodSandbox for \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\""
Dec 13 02:25:15.128919 env[1728]: time="2024-12-13T02:25:15.128652643Z" level=info msg="Forcibly stopping sandbox \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\""
Dec 13 02:25:15.129857 env[1728]: time="2024-12-13T02:25:15.129816026Z" level=info msg="StartContainer for \"9db381c637e2e6bd85c48be19ead0f8084a2cc5477f23f1f2a0abd6953310ec7\" returns successfully"
Dec 13 02:25:15.298307 env[1728]: 2024-12-13 02:25:15.236 [WARNING][5709] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" WorkloadEndpoint="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:15.298307 env[1728]: 2024-12-13 02:25:15.236 [INFO][5709] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92"
Dec 13 02:25:15.298307 env[1728]: 2024-12-13 02:25:15.236 [INFO][5709] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" iface="eth0" netns=""
Dec 13 02:25:15.298307 env[1728]: 2024-12-13 02:25:15.236 [INFO][5709] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92"
Dec 13 02:25:15.298307 env[1728]: 2024-12-13 02:25:15.236 [INFO][5709] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92"
Dec 13 02:25:15.298307 env[1728]: 2024-12-13 02:25:15.277 [INFO][5715] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" HandleID="k8s-pod-network.ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:15.298307 env[1728]: 2024-12-13 02:25:15.278 [INFO][5715] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:25:15.298307 env[1728]: 2024-12-13 02:25:15.278 [INFO][5715] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:25:15.298307 env[1728]: 2024-12-13 02:25:15.291 [WARNING][5715] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" HandleID="k8s-pod-network.ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:15.298307 env[1728]: 2024-12-13 02:25:15.291 [INFO][5715] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" HandleID="k8s-pod-network.ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92" Workload="ip--172--31--27--10-k8s-calico--kube--controllers--d49669cd5--nhvrl-eth0"
Dec 13 02:25:15.298307 env[1728]: 2024-12-13 02:25:15.293 [INFO][5715] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:25:15.298307 env[1728]: 2024-12-13 02:25:15.296 [INFO][5709] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92"
Dec 13 02:25:15.300790 env[1728]: time="2024-12-13T02:25:15.300701556Z" level=info msg="TearDown network for sandbox \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\" successfully"
Dec 13 02:25:15.317378 env[1728]: time="2024-12-13T02:25:15.317307176Z" level=info msg="RemovePodSandbox \"ddbd7946abf28b378d194cc3b27183d0a704d87f9a3b10918b847ebd37713c92\" returns successfully"
Dec 13 02:25:15.318403 env[1728]: time="2024-12-13T02:25:15.318367043Z" level=info msg="StopPodSandbox for \"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\""
Dec 13 02:25:15.523319 env[1728]: 2024-12-13 02:25:15.404 [WARNING][5739] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"2a602144-c33c-4da8-88d8-1d35cd28e74d", ResourceVersion:"821", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 16, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135", Pod:"coredns-6f6b679f8f-9xkb6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.29.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4356c2747b1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:25:15.523319 env[1728]: 2024-12-13 02:25:15.405 [INFO][5739] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029"
Dec 13 02:25:15.523319 env[1728]: 2024-12-13 02:25:15.405 [INFO][5739] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" iface="eth0" netns=""
Dec 13 02:25:15.523319 env[1728]: 2024-12-13 02:25:15.405 [INFO][5739] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029"
Dec 13 02:25:15.523319 env[1728]: 2024-12-13 02:25:15.405 [INFO][5739] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029"
Dec 13 02:25:15.523319 env[1728]: 2024-12-13 02:25:15.485 [INFO][5745] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" HandleID="k8s-pod-network.b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0"
Dec 13 02:25:15.523319 env[1728]: 2024-12-13 02:25:15.485 [INFO][5745] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:25:15.523319 env[1728]: 2024-12-13 02:25:15.485 [INFO][5745] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:25:15.523319 env[1728]: 2024-12-13 02:25:15.501 [WARNING][5745] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" HandleID="k8s-pod-network.b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0"
Dec 13 02:25:15.523319 env[1728]: 2024-12-13 02:25:15.501 [INFO][5745] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" HandleID="k8s-pod-network.b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0"
Dec 13 02:25:15.523319 env[1728]: 2024-12-13 02:25:15.506 [INFO][5745] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:25:15.523319 env[1728]: 2024-12-13 02:25:15.517 [INFO][5739] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029"
Dec 13 02:25:15.525668 env[1728]: time="2024-12-13T02:25:15.523359318Z" level=info msg="TearDown network for sandbox \"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\" successfully"
Dec 13 02:25:15.525668 env[1728]: time="2024-12-13T02:25:15.523393265Z" level=info msg="StopPodSandbox for \"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\" returns successfully"
Dec 13 02:25:15.525668 env[1728]: time="2024-12-13T02:25:15.525178142Z" level=info msg="RemovePodSandbox for \"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\""
Dec 13 02:25:15.525668 env[1728]: time="2024-12-13T02:25:15.525228715Z" level=info msg="Forcibly stopping sandbox \"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\""
Dec 13 02:25:15.804665 systemd-networkd[1457]: caliba98ea0c73b: Gained IPv6LL
Dec 13 02:25:15.986328 env[1728]: 2024-12-13 02:25:15.696 [WARNING][5772] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"2a602144-c33c-4da8-88d8-1d35cd28e74d", ResourceVersion:"821", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 16, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"593b081d0a8c9f4ff53749e356e7e996122fc8918d06672589a70ade3924b135", Pod:"coredns-6f6b679f8f-9xkb6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.29.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4356c2747b1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:25:15.986328 env[1728]: 2024-12-13 02:25:15.697 [INFO][5772] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029"
Dec 13 02:25:15.986328 env[1728]: 2024-12-13 02:25:15.697 [INFO][5772] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" iface="eth0" netns=""
Dec 13 02:25:15.986328 env[1728]: 2024-12-13 02:25:15.697 [INFO][5772] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029"
Dec 13 02:25:15.986328 env[1728]: 2024-12-13 02:25:15.697 [INFO][5772] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029"
Dec 13 02:25:15.986328 env[1728]: 2024-12-13 02:25:15.777 [INFO][5786] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" HandleID="k8s-pod-network.b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0"
Dec 13 02:25:15.986328 env[1728]: 2024-12-13 02:25:15.777 [INFO][5786] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:25:15.986328 env[1728]: 2024-12-13 02:25:15.777 [INFO][5786] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:25:15.986328 env[1728]: 2024-12-13 02:25:15.964 [WARNING][5786] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" HandleID="k8s-pod-network.b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0"
Dec 13 02:25:15.986328 env[1728]: 2024-12-13 02:25:15.964 [INFO][5786] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" HandleID="k8s-pod-network.b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--9xkb6-eth0"
Dec 13 02:25:15.986328 env[1728]: 2024-12-13 02:25:15.967 [INFO][5786] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:25:15.986328 env[1728]: 2024-12-13 02:25:15.975 [INFO][5772] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029"
Dec 13 02:25:15.988606 env[1728]: time="2024-12-13T02:25:15.986376534Z" level=info msg="TearDown network for sandbox \"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\" successfully"
Dec 13 02:25:16.051042 env[1728]: time="2024-12-13T02:25:16.050976929Z" level=info msg="RemovePodSandbox \"b30a04dfd7f3d2935bc45013413d161433631919404febdc3f0827b608dce029\" returns successfully"
Dec 13 02:25:16.053352 env[1728]: time="2024-12-13T02:25:16.053296021Z" level=info msg="StopPodSandbox for \"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\""
Dec 13 02:25:16.314873 env[1728]: 2024-12-13 02:25:16.199 [WARNING][5815] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"b041a7c4-d9f0-4862-b845-5a767cf888b6", ResourceVersion:"845", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 16, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b", Pod:"coredns-6f6b679f8f-n7sz7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.29.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid433f5e3a52", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:25:16.314873 env[1728]: 2024-12-13 02:25:16.200 [INFO][5815] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c"
Dec 13 02:25:16.314873 env[1728]: 2024-12-13 02:25:16.203 [INFO][5815] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" iface="eth0" netns=""
Dec 13 02:25:16.314873 env[1728]: 2024-12-13 02:25:16.203 [INFO][5815] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c"
Dec 13 02:25:16.314873 env[1728]: 2024-12-13 02:25:16.203 [INFO][5815] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c"
Dec 13 02:25:16.314873 env[1728]: 2024-12-13 02:25:16.273 [INFO][5825] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" HandleID="k8s-pod-network.cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0"
Dec 13 02:25:16.314873 env[1728]: 2024-12-13 02:25:16.273 [INFO][5825] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:25:16.314873 env[1728]: 2024-12-13 02:25:16.274 [INFO][5825] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:25:16.314873 env[1728]: 2024-12-13 02:25:16.306 [WARNING][5825] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" HandleID="k8s-pod-network.cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0"
Dec 13 02:25:16.314873 env[1728]: 2024-12-13 02:25:16.306 [INFO][5825] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" HandleID="k8s-pod-network.cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0"
Dec 13 02:25:16.314873 env[1728]: 2024-12-13 02:25:16.310 [INFO][5825] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:25:16.314873 env[1728]: 2024-12-13 02:25:16.312 [INFO][5815] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c"
Dec 13 02:25:16.315945 env[1728]: time="2024-12-13T02:25:16.314919335Z" level=info msg="TearDown network for sandbox \"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\" successfully"
Dec 13 02:25:16.315945 env[1728]: time="2024-12-13T02:25:16.314955991Z" level=info msg="StopPodSandbox for \"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\" returns successfully"
Dec 13 02:25:16.315945 env[1728]: time="2024-12-13T02:25:16.315623045Z" level=info msg="RemovePodSandbox for \"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\""
Dec 13 02:25:16.315945 env[1728]: time="2024-12-13T02:25:16.315662112Z" level=info msg="Forcibly stopping sandbox \"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\""
Dec 13 02:25:16.548056 systemd[1]: run-containerd-runc-k8s.io-9db381c637e2e6bd85c48be19ead0f8084a2cc5477f23f1f2a0abd6953310ec7-runc.rccAAj.mount: Deactivated successfully.
Dec 13 02:25:16.567165 env[1728]: 2024-12-13 02:25:16.448 [WARNING][5845] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"b041a7c4-d9f0-4862-b845-5a767cf888b6", ResourceVersion:"845", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 24, 16, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-10", ContainerID:"b3d5621a27b6cdd3c0acd4b0734e1b511e3d0ed1e5be88f1cab7fde579e2b78b", Pod:"coredns-6f6b679f8f-n7sz7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.29.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid433f5e3a52", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:25:16.567165 env[1728]: 2024-12-13 02:25:16.448 [INFO][5845] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c"
Dec 13 02:25:16.567165 env[1728]: 2024-12-13 02:25:16.448 [INFO][5845] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" iface="eth0" netns=""
Dec 13 02:25:16.567165 env[1728]: 2024-12-13 02:25:16.448 [INFO][5845] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c"
Dec 13 02:25:16.567165 env[1728]: 2024-12-13 02:25:16.448 [INFO][5845] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c"
Dec 13 02:25:16.567165 env[1728]: 2024-12-13 02:25:16.524 [INFO][5856] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" HandleID="k8s-pod-network.cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0"
Dec 13 02:25:16.567165 env[1728]: 2024-12-13 02:25:16.524 [INFO][5856] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:25:16.567165 env[1728]: 2024-12-13 02:25:16.524 [INFO][5856] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:25:16.567165 env[1728]: 2024-12-13 02:25:16.534 [WARNING][5856] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" HandleID="k8s-pod-network.cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0"
Dec 13 02:25:16.567165 env[1728]: 2024-12-13 02:25:16.534 [INFO][5856] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" HandleID="k8s-pod-network.cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c" Workload="ip--172--31--27--10-k8s-coredns--6f6b679f8f--n7sz7-eth0"
Dec 13 02:25:16.567165 env[1728]: 2024-12-13 02:25:16.554 [INFO][5856] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:25:16.567165 env[1728]: 2024-12-13 02:25:16.558 [INFO][5845] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c"
Dec 13 02:25:16.571678 env[1728]: time="2024-12-13T02:25:16.571630153Z" level=info msg="TearDown network for sandbox \"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\" successfully"
Dec 13 02:25:16.592417 env[1728]: time="2024-12-13T02:25:16.592326041Z" level=info msg="RemovePodSandbox \"cd5429b4a24d2c247413b554e43060a6388a6e0d4f55bf6f6a8c86c4b7c6319c\" returns successfully"
Dec 13 02:25:16.593379 env[1728]: time="2024-12-13T02:25:16.593338799Z" level=info msg="StopPodSandbox for \"c4ac80bde30c4dce6e2c3ef727e24bfebe40428dd70155044b10971267049837\""
Dec 13 02:25:16.593514 env[1728]: time="2024-12-13T02:25:16.593458146Z" level=info msg="TearDown network for sandbox \"c4ac80bde30c4dce6e2c3ef727e24bfebe40428dd70155044b10971267049837\" successfully"
Dec 13 02:25:16.593580 env[1728]: time="2024-12-13T02:25:16.593506385Z" level=info msg="StopPodSandbox for \"c4ac80bde30c4dce6e2c3ef727e24bfebe40428dd70155044b10971267049837\" returns successfully"
Dec 13 02:25:16.594160 env[1728]: time="2024-12-13T02:25:16.594114899Z" level=info msg="RemovePodSandbox for \"c4ac80bde30c4dce6e2c3ef727e24bfebe40428dd70155044b10971267049837\""
Dec 13 02:25:16.594266 env[1728]: time="2024-12-13T02:25:16.594163122Z" level=info msg="Forcibly stopping sandbox \"c4ac80bde30c4dce6e2c3ef727e24bfebe40428dd70155044b10971267049837\""
Dec 13 02:25:16.594317 env[1728]: time="2024-12-13T02:25:16.594256981Z" level=info msg="TearDown network for sandbox \"c4ac80bde30c4dce6e2c3ef727e24bfebe40428dd70155044b10971267049837\" successfully"
Dec 13 02:25:16.601029 env[1728]: time="2024-12-13T02:25:16.600975317Z" level=info msg="RemovePodSandbox \"c4ac80bde30c4dce6e2c3ef727e24bfebe40428dd70155044b10971267049837\" returns successfully"
Dec 13 02:25:17.537773 systemd[1]: run-containerd-runc-k8s.io-9db381c637e2e6bd85c48be19ead0f8084a2cc5477f23f1f2a0abd6953310ec7-runc.gGvPNV.mount: Deactivated successfully.
Dec 13 02:25:17.803671 systemd[1]: Started sshd@9-172.31.27.10:22-139.178.68.195:46016.service.
Dec 13 02:25:17.811420 kernel: kauditd_printk_skb: 130 callbacks suppressed
Dec 13 02:25:17.813369 kernel: audit: type=1130 audit(1734056717.804:1441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.27.10:22-139.178.68.195:46016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:17.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.27.10:22-139.178.68.195:46016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:18.093000 audit[5925]: USER_ACCT pid=5925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:18.099590 kernel: audit: type=1101 audit(1734056718.093:1442): pid=5925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:18.099892 sshd[5925]: Accepted publickey for core from 139.178.68.195 port 46016 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:25:18.095000 audit[5925]: CRED_ACQ pid=5925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:18.107218 kernel: audit: type=1103 audit(1734056718.095:1443): pid=5925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:18.102406 sshd[5925]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:25:18.115614 kernel: audit: type=1006 audit(1734056718.095:1444): pid=5925 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1
Dec 13 02:25:18.123072 kernel: audit: type=1300 audit(1734056718.095:1444): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda36b4090 a2=3 a3=0 items=0 ppid=1 pid=5925 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:18.095000 audit[5925]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda36b4090 a2=3 a3=0 items=0 ppid=1 pid=5925 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:18.095000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:25:18.127210 kernel: audit: type=1327 audit(1734056718.095:1444): proctitle=737368643A20636F7265205B707269765D
Dec 13 02:25:18.139662 systemd-logind[1722]: New session 10 of user core.
Dec 13 02:25:18.146900 systemd[1]: Started session-10.scope.
Dec 13 02:25:18.200301 kernel: audit: type=1105 audit(1734056718.175:1445): pid=5925 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:18.175000 audit[5925]: USER_START pid=5925 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:18.201000 audit[5928]: CRED_ACQ pid=5928 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:18.210256 kernel: audit: type=1103 audit(1734056718.201:1446): pid=5928 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:18.732794 kubelet[2727]: I1213 02:25:18.732710    2727 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness"
Dec 13 02:25:18.790067 sshd[5925]: pam_unix(sshd:session): session closed for user core
Dec 13 02:25:18.791000 audit[5925]: USER_END pid=5925 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:18.797231 kernel: audit: type=1106 audit(1734056718.791:1447): pid=5925 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:18.794492 systemd-logind[1722]: Session 10 logged out. Waiting for processes to exit.
Dec 13 02:25:18.796554 systemd[1]: sshd@9-172.31.27.10:22-139.178.68.195:46016.service: Deactivated successfully.
Dec 13 02:25:18.797532 systemd[1]: session-10.scope: Deactivated successfully.
Dec 13 02:25:18.791000 audit[5925]: CRED_DISP pid=5925 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:18.799109 systemd-logind[1722]: Removed session 10.
Dec 13 02:25:18.803170 kernel: audit: type=1104 audit(1734056718.791:1448): pid=5925 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:18.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.27.10:22-139.178.68.195:46016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:18.825916 kubelet[2727]: I1213 02:25:18.822353    2727 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-68d79bc76f-h7mrq" podStartSLOduration=6.822328125 podStartE2EDuration="6.822328125s" podCreationTimestamp="2024-12-13 02:25:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:25:15.544086225 +0000 UTC m=+63.919908661" watchObservedRunningTime="2024-12-13 02:25:18.822328125 +0000 UTC m=+67.198150561"
Dec 13 02:25:18.874000 audit[5957]: NETFILTER_CFG table=filter:129 family=2 entries=10 op=nft_register_rule pid=5957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:18.874000 audit[5957]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd45d00f20 a2=0 a3=7ffd45d00f0c items=0 ppid=2876 pid=5957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:18.874000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:18.883000 audit[5957]: NETFILTER_CFG table=nat:130 family=2 entries=32 op=nft_register_chain pid=5957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:18.883000 audit[5957]: SYSCALL arch=c000003e syscall=46 success=yes exit=10468 a0=3 a1=7ffd45d00f20 a2=0 a3=7ffd45d00f0c items=0 ppid=2876 pid=5957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:18.883000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:23.828284 systemd[1]: Started sshd@10-172.31.27.10:22-139.178.68.195:46018.service.
Dec 13 02:25:23.836881 kernel: kauditd_printk_skb: 7 callbacks suppressed
Dec 13 02:25:23.837111 kernel: audit: type=1130 audit(1734056723.830:1452): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.27.10:22-139.178.68.195:46018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:23.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.27.10:22-139.178.68.195:46018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:24.056000 audit[6036]: USER_ACCT pid=6036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:24.057476 sshd[6036]: Accepted publickey for core from 139.178.68.195 port 46018 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:25:24.063229 kernel: audit: type=1101 audit(1734056724.056:1453): pid=6036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:24.063000 audit[6036]: CRED_ACQ pid=6036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:24.070788 sshd[6036]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:25:24.075336 kernel: audit: type=1103 audit(1734056724.063:1454): pid=6036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:24.075617 kernel: audit: type=1006 audit(1734056724.063:1455): pid=6036 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1
Dec 13 02:25:24.063000 audit[6036]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed5ba5b00 a2=3 a3=0 items=0 ppid=1 pid=6036 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:24.081675 kernel: audit: type=1300 audit(1734056724.063:1455): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed5ba5b00 a2=3 a3=0 items=0 ppid=1 pid=6036 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:24.082997 kernel: audit: type=1327 audit(1734056724.063:1455): proctitle=737368643A20636F7265205B707269765D
Dec 13 02:25:24.063000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:25:24.087298 systemd-logind[1722]: New session 11 of user core.
Dec 13 02:25:24.088541 systemd[1]: Started session-11.scope.
Dec 13 02:25:24.115000 audit[6036]: USER_START pid=6036 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:24.120000 audit[6044]: CRED_ACQ pid=6044 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:24.127772 kernel: audit: type=1105 audit(1734056724.115:1456): pid=6036 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:24.127903 kernel: audit: type=1103 audit(1734056724.120:1457): pid=6044 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:24.463120 sshd[6036]: pam_unix(sshd:session): session closed for user core
Dec 13 02:25:24.463000 audit[6036]: USER_END pid=6036 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:24.472180 kernel: audit: type=1106 audit(1734056724.463:1458): pid=6036 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:24.472000 audit[6036]: CRED_DISP pid=6036 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:24.474270 systemd[1]: sshd@10-172.31.27.10:22-139.178.68.195:46018.service: Deactivated successfully.
Dec 13 02:25:24.475346 systemd[1]: session-11.scope: Deactivated successfully.
Dec 13 02:25:24.478237 kernel: audit: type=1104 audit(1734056724.472:1459): pid=6036 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:24.481378 systemd-logind[1722]: Session 11 logged out. Waiting for processes to exit.
Dec 13 02:25:24.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.27.10:22-139.178.68.195:46018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:24.503091 systemd[1]: Started sshd@11-172.31.27.10:22-139.178.68.195:46030.service.
Dec 13 02:25:24.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.27.10:22-139.178.68.195:46030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:24.512408 systemd-logind[1722]: Removed session 11.
Dec 13 02:25:24.712000 audit[6064]: USER_ACCT pid=6064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:24.716700 sshd[6064]: Accepted publickey for core from 139.178.68.195 port 46030 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:25:24.715000 audit[6064]: CRED_ACQ pid=6064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:24.715000 audit[6064]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf56989a0 a2=3 a3=0 items=0 ppid=1 pid=6064 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:24.715000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:25:24.717582 sshd[6064]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:25:24.725166 systemd[1]: Started session-12.scope.
Dec 13 02:25:24.725902 systemd-logind[1722]: New session 12 of user core.
Dec 13 02:25:24.736000 audit[6064]: USER_START pid=6064 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:24.739000 audit[6072]: CRED_ACQ pid=6072 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:25.176074 sshd[6064]: pam_unix(sshd:session): session closed for user core
Dec 13 02:25:25.177000 audit[6064]: USER_END pid=6064 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:25.177000 audit[6064]: CRED_DISP pid=6064 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:25.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.27.10:22-139.178.68.195:46030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:25.186329 systemd-logind[1722]: Session 12 logged out. Waiting for processes to exit.
Dec 13 02:25:25.187319 systemd[1]: sshd@11-172.31.27.10:22-139.178.68.195:46030.service: Deactivated successfully.
Dec 13 02:25:25.188682 systemd[1]: session-12.scope: Deactivated successfully.
Dec 13 02:25:25.191487 systemd-logind[1722]: Removed session 12.
Dec 13 02:25:25.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.27.10:22-139.178.68.195:46046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:25.219179 systemd[1]: Started sshd@12-172.31.27.10:22-139.178.68.195:46046.service.
Dec 13 02:25:25.446000 audit[6086]: USER_ACCT pid=6086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:25.448197 sshd[6086]: Accepted publickey for core from 139.178.68.195 port 46046 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:25:25.448000 audit[6086]: CRED_ACQ pid=6086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:25.448000 audit[6086]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4678e6a0 a2=3 a3=0 items=0 ppid=1 pid=6086 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:25.448000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:25:25.451828 sshd[6086]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:25:25.474936 systemd-logind[1722]: New session 13 of user core.
Dec 13 02:25:25.476213 systemd[1]: Started session-13.scope.
Dec 13 02:25:25.484000 audit[6086]: USER_START pid=6086 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:25.486000 audit[6089]: CRED_ACQ pid=6089 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:25.971211 sshd[6086]: pam_unix(sshd:session): session closed for user core
Dec 13 02:25:25.973000 audit[6086]: USER_END pid=6086 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:25.973000 audit[6086]: CRED_DISP pid=6086 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:25.979776 systemd[1]: sshd@12-172.31.27.10:22-139.178.68.195:46046.service: Deactivated successfully.
Dec 13 02:25:25.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.27.10:22-139.178.68.195:46046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:25.981055 systemd[1]: session-13.scope: Deactivated successfully.
Dec 13 02:25:25.981907 systemd-logind[1722]: Session 13 logged out. Waiting for processes to exit.
Dec 13 02:25:25.983118 systemd-logind[1722]: Removed session 13.
Dec 13 02:25:31.007083 systemd[1]: Started sshd@13-172.31.27.10:22-139.178.68.195:52914.service.
Dec 13 02:25:31.015508 kernel: kauditd_printk_skb: 23 callbacks suppressed
Dec 13 02:25:31.015665 kernel: audit: type=1130 audit(1734056731.006:1479): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.27.10:22-139.178.68.195:52914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:31.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.27.10:22-139.178.68.195:52914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:31.239000 audit[6221]: USER_ACCT pid=6221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:31.241179 sshd[6221]: Accepted publickey for core from 139.178.68.195 port 52914 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:25:31.247000 audit[6221]: CRED_ACQ pid=6221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:31.248745 sshd[6221]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:25:31.253988 kernel: audit: type=1101 audit(1734056731.239:1480): pid=6221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:31.254134 kernel: audit: type=1103 audit(1734056731.247:1481): pid=6221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:31.247000 audit[6221]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff6356290 a2=3 a3=0 items=0 ppid=1 pid=6221 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:31.262682 systemd[1]: Started session-14.scope.
Dec 13 02:25:31.264511 systemd-logind[1722]: New session 14 of user core.
Dec 13 02:25:31.268174 kernel: audit: type=1006 audit(1734056731.247:1482): pid=6221 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1
Dec 13 02:25:31.268288 kernel: audit: type=1300 audit(1734056731.247:1482): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff6356290 a2=3 a3=0 items=0 ppid=1 pid=6221 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:31.247000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:25:31.272175 kernel: audit: type=1327 audit(1734056731.247:1482): proctitle=737368643A20636F7265205B707269765D
Dec 13 02:25:31.273000 audit[6221]: USER_START pid=6221 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:31.273000 audit[6224]: CRED_ACQ pid=6224 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:31.284036 kernel: audit: type=1105 audit(1734056731.273:1483): pid=6221 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:31.284760 kernel: audit: type=1103 audit(1734056731.273:1484): pid=6224 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:31.586296 sshd[6221]: pam_unix(sshd:session): session closed for user core
Dec 13 02:25:31.588000 audit[6221]: USER_END pid=6221 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:31.592000 audit[6221]: CRED_DISP pid=6221 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:31.595304 systemd[1]: sshd@13-172.31.27.10:22-139.178.68.195:52914.service: Deactivated successfully.
Dec 13 02:25:31.597503 systemd[1]: session-14.scope: Deactivated successfully.
Dec 13 02:25:31.598595 systemd-logind[1722]: Session 14 logged out. Waiting for processes to exit.
Dec 13 02:25:31.599532 kernel: audit: type=1106 audit(1734056731.588:1485): pid=6221 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:31.599618 kernel: audit: type=1104 audit(1734056731.592:1486): pid=6221 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:31.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.27.10:22-139.178.68.195:52914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:31.604515 systemd-logind[1722]: Removed session 14.
Dec 13 02:25:31.967000 audit[6254]: NETFILTER_CFG table=filter:131 family=2 entries=9 op=nft_register_rule pid=6254 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:31.967000 audit[6254]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffa833aca0 a2=0 a3=7fffa833ac8c items=0 ppid=2876 pid=6254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:31.967000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:31.973000 audit[6254]: NETFILTER_CFG table=nat:132 family=2 entries=27 op=nft_register_chain pid=6254 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:31.973000 audit[6254]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fffa833aca0 a2=0 a3=7fffa833ac8c items=0 ppid=2876 pid=6254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:31.973000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:33.142000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.142000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.142000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.142000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.142000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.142000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.142000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.142000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.142000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.142000 audit: BPF prog-id=216 op=LOAD
Dec 13 02:25:33.142000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdeb84fc60 a2=98 a3=3 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.142000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.144000 audit: BPF prog-id=216 op=UNLOAD
Dec 13 02:25:33.145000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.145000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.145000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.145000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.145000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.145000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.145000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.145000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.145000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.145000 audit: BPF prog-id=217 op=LOAD
Dec 13 02:25:33.145000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdeb84fa40 a2=74 a3=540051 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.145000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.145000 audit: BPF prog-id=217 op=UNLOAD
Dec 13 02:25:33.145000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.145000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.145000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.145000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.145000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.145000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.145000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.145000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.145000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.145000 audit: BPF prog-id=218 op=LOAD
Dec 13 02:25:33.145000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdeb84fa70 a2=94 a3=2 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.145000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.145000 audit: BPF prog-id=218 op=UNLOAD
Dec 13 02:25:33.426000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.426000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.426000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.426000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.426000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.426000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.426000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.426000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.426000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.426000 audit: BPF prog-id=219 op=LOAD
Dec 13 02:25:33.426000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdeb84f930 a2=40 a3=1 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.426000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.427000 audit: BPF prog-id=219 op=UNLOAD
Dec 13 02:25:33.427000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.427000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdeb84fa00 a2=50 a3=7ffdeb84fae0 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.427000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.447000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.447000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdeb84f940 a2=28 a3=0 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.447000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.447000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.447000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdeb84f970 a2=28 a3=0 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.447000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.447000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.447000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdeb84f880 a2=28 a3=0 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.447000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.447000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.447000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdeb84f990 a2=28 a3=0 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.447000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.447000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.447000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdeb84f970 a2=28 a3=0 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.447000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.447000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.447000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdeb84f960 a2=28 a3=0 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.447000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.447000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.447000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdeb84f990 a2=28 a3=0 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.447000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.447000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.447000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdeb84f970 a2=28 a3=0 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.447000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.447000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.447000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdeb84f990 a2=28 a3=0 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.447000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.447000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.447000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdeb84f960 a2=28 a3=0 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.447000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.447000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.447000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdeb84f9d0 a2=28 a3=0 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.447000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.447000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.447000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdeb84f780 a2=50 a3=1 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.447000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit: BPF prog-id=220 op=LOAD
Dec 13 02:25:33.448000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdeb84f780 a2=94 a3=5 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.448000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.448000 audit: BPF prog-id=220 op=UNLOAD
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdeb84f830 a2=50 a3=1 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.448000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdeb84f950 a2=4 a3=38 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.448000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { confidentiality } for  pid=6288 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:25:33.448000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdeb84f9a0 a2=94 a3=6 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.448000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.448000 audit[6288]: AVC avc:  denied  { confidentiality } for  pid=6288 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:25:33.448000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdeb84f150 a2=94 a3=83 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.448000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.449000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.449000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.449000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.449000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.449000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.449000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.449000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.449000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.449000 audit[6288]: AVC avc:  denied  { perfmon } for  pid=6288 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.449000 audit[6288]: AVC avc:  denied  { bpf } for  pid=6288 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.449000 audit[6288]: AVC avc:  denied  { confidentiality } for  pid=6288 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:25:33.449000 audit[6288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdeb84f150 a2=94 a3=83 items=0 ppid=6274 pid=6288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.449000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit: BPF prog-id=221 op=LOAD
Dec 13 02:25:33.451000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffefdd65970 a2=98 a3=3 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.451000 audit: BPF prog-id=221 op=UNLOAD
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit: BPF prog-id=222 op=LOAD
Dec 13 02:25:33.451000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffefdd65750 a2=74 a3=540051 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.451000 audit: BPF prog-id=222 op=UNLOAD
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.451000 audit: BPF prog-id=223 op=LOAD
Dec 13 02:25:33.451000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffefdd65780 a2=94 a3=2 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.451000 audit: BPF prog-id=223 op=UNLOAD
Dec 13 02:25:33.622000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.622000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.622000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.622000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.622000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.622000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.622000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.622000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.622000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.622000 audit: BPF prog-id=224 op=LOAD
Dec 13 02:25:33.622000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffefdd65640 a2=40 a3=1 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.622000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.622000 audit: BPF prog-id=224 op=UNLOAD
Dec 13 02:25:33.622000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.622000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffefdd65710 a2=50 a3=7ffefdd657f0 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.622000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.635000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.635000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffefdd65650 a2=28 a3=0 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.635000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.635000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.635000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffefdd65680 a2=28 a3=0 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.635000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.635000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.635000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffefdd65590 a2=28 a3=0 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.635000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.635000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.635000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffefdd656a0 a2=28 a3=0 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.635000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.635000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.635000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffefdd65680 a2=28 a3=0 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.635000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.635000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.635000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffefdd65670 a2=28 a3=0 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.635000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.635000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.635000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffefdd656a0 a2=28 a3=0 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.635000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.635000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.635000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffefdd65680 a2=28 a3=0 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.635000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.635000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.635000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffefdd656a0 a2=28 a3=0 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.635000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.635000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.635000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffefdd65670 a2=28 a3=0 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.635000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.635000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.635000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffefdd656e0 a2=28 a3=0 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.635000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffefdd65490 a2=50 a3=1 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.636000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit: BPF prog-id=225 op=LOAD
Dec 13 02:25:33.636000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffefdd65490 a2=94 a3=5 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.636000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.636000 audit: BPF prog-id=225 op=UNLOAD
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffefdd65540 a2=50 a3=1 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.636000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffefdd65660 a2=4 a3=38 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.636000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { confidentiality } for  pid=6289 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:25:33.636000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffefdd656b0 a2=94 a3=6 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.636000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.636000 audit[6289]: AVC avc:  denied  { confidentiality } for  pid=6289 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:25:33.636000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffefdd64e60 a2=94 a3=83 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.636000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.637000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.637000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.637000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.637000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.637000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.637000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.637000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.637000 audit[6289]: AVC avc:  denied  { perfmon } for  pid=6289 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.637000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffefdd64e60 a2=94 a3=83 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.637000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.637000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.637000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=0 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.637000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.637000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.637000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=3d items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.637000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.637000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.637000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=41 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.637000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.637000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.637000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=45 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.637000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.638000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.638000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=49 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.638000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.638000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=4d items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.638000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.638000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=51 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.638000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.638000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=52 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.638000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.638000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=53 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.638000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.638000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=54 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.638000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.638000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=55 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.638000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.638000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=56 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.638000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.638000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=57 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.638000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.638000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=58 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.638000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.638000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=59 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.638000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.638000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=5a items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.638000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.638000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=5b items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.638000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.638000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=5c items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.638000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.638000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=5d items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.638000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.638000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=5e items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.639000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.639000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=5f items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.639000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.639000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=60 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.639000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.639000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=61 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.639000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.639000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=62 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.639000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.639000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=63 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.639000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.639000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=64 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.639000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.639000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=65 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.639000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.639000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=66 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.639000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.639000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=67 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.639000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.639000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=6a items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.639000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.639000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=6d items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.639000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.639000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=6e items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.639000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.639000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=71 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.639000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.639000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=72 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.639000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.639000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=75 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.640000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.640000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=7a items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.640000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.640000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.640000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=7d items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.640000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.640000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.640000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=8a items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.640000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.640000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.640000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=8b items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.640000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.640000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.640000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=8e items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.640000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.640000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.640000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=92 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.640000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.640000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.640000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=95 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.640000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.640000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.640000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=9b items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.640000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.640000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.640000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=9e items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.640000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.640000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.640000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=aa items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.640000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.640000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.640000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=ad items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.640000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.640000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.640000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=ae items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.640000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.640000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.640000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=b1 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.640000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.640000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.640000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=b4 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.640000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.641000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.641000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=b5 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.641000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.641000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.641000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=b8 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.641000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.641000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.641000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=b9 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.641000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.641000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.641000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=bc items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.641000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.641000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.641000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=c3 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.641000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.641000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.641000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=c4 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.641000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.641000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.641000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=c7 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.641000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.641000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.641000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=c8 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.641000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.641000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.641000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=cb items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.641000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.642000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.642000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=d0 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.642000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.642000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.642000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=d3 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.642000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.642000 audit[6289]: AVC avc:  denied  { bpf } for  pid=6289 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.642000 audit[6289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefdd668a0 a2=10 a3=d4 items=0 ppid=6274 pid=6289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.642000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:25:33.725000 audit[6292]: AVC avc:  denied  { bpf } for  pid=6292 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.725000 audit[6292]: AVC avc:  denied  { bpf } for  pid=6292 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.725000 audit[6292]: AVC avc:  denied  { perfmon } for  pid=6292 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.725000 audit[6292]: AVC avc:  denied  { perfmon } for  pid=6292 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.725000 audit[6292]: AVC avc:  denied  { perfmon } for  pid=6292 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.725000 audit[6292]: AVC avc:  denied  { perfmon } for  pid=6292 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.725000 audit[6292]: AVC avc:  denied  { perfmon } for  pid=6292 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.725000 audit[6292]: AVC avc:  denied  { bpf } for  pid=6292 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.725000 audit[6292]: AVC avc:  denied  { bpf } for  pid=6292 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.725000 audit: BPF prog-id=226 op=LOAD
Dec 13 02:25:33.725000 audit[6292]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe77205bc0 a2=98 a3=1999999999999999 items=0 ppid=6274 pid=6292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.725000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F
Dec 13 02:25:33.735000 audit: BPF prog-id=226 op=UNLOAD
Dec 13 02:25:33.735000 audit[6292]: AVC avc:  denied  { bpf } for  pid=6292 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.735000 audit[6292]: AVC avc:  denied  { bpf } for  pid=6292 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.735000 audit[6292]: AVC avc:  denied  { perfmon } for  pid=6292 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.735000 audit[6292]: AVC avc:  denied  { perfmon } for  pid=6292 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.735000 audit[6292]: AVC avc:  denied  { perfmon } for  pid=6292 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.735000 audit[6292]: AVC avc:  denied  { perfmon } for  pid=6292 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.735000 audit[6292]: AVC avc:  denied  { perfmon } for  pid=6292 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.735000 audit[6292]: AVC avc:  denied  { bpf } for  pid=6292 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.735000 audit[6292]: AVC avc:  denied  { bpf } for  pid=6292 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.735000 audit: BPF prog-id=227 op=LOAD
Dec 13 02:25:33.735000 audit[6292]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe77205aa0 a2=74 a3=ffff items=0 ppid=6274 pid=6292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.735000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F
Dec 13 02:25:33.735000 audit: BPF prog-id=227 op=UNLOAD
Dec 13 02:25:33.735000 audit[6292]: AVC avc:  denied  { bpf } for  pid=6292 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.735000 audit[6292]: AVC avc:  denied  { bpf } for  pid=6292 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.735000 audit[6292]: AVC avc:  denied  { perfmon } for  pid=6292 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.735000 audit[6292]: AVC avc:  denied  { perfmon } for  pid=6292 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.735000 audit[6292]: AVC avc:  denied  { perfmon } for  pid=6292 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.735000 audit[6292]: AVC avc:  denied  { perfmon } for  pid=6292 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.735000 audit[6292]: AVC avc:  denied  { perfmon } for  pid=6292 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.735000 audit[6292]: AVC avc:  denied  { bpf } for  pid=6292 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.735000 audit[6292]: AVC avc:  denied  { bpf } for  pid=6292 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:25:33.735000 audit: BPF prog-id=228 op=LOAD
Dec 13 02:25:33.735000 audit[6292]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe77205ae0 a2=40 a3=7ffe77205cc0 items=0 ppid=6274 pid=6292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:33.735000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F
Dec 13 02:25:33.735000 audit: BPF prog-id=228 op=UNLOAD
Dec 13 02:25:36.612030 systemd[1]: Started sshd@14-172.31.27.10:22-139.178.68.195:55460.service.
Dec 13 02:25:36.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.27.10:22-139.178.68.195:55460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:36.614681 kernel: kauditd_printk_skb: 533 callbacks suppressed
Dec 13 02:25:36.614830 kernel: audit: type=1130 audit(1734056736.612:1613): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.27.10:22-139.178.68.195:55460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:36.833000 audit[6362]: USER_ACCT pid=6362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:36.834893 sshd[6362]: Accepted publickey for core from 139.178.68.195 port 55460 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:25:36.836000 audit[6362]: CRED_ACQ pid=6362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:36.844465 kernel: audit: type=1101 audit(1734056736.833:1614): pid=6362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:36.844553 kernel: audit: type=1103 audit(1734056736.836:1615): pid=6362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:36.847433 kernel: audit: type=1006 audit(1734056736.837:1616): pid=6362 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1
Dec 13 02:25:36.837000 audit[6362]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc516f7150 a2=3 a3=0 items=0 ppid=1 pid=6362 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:36.848036 sshd[6362]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:25:36.853678 kernel: audit: type=1300 audit(1734056736.837:1616): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc516f7150 a2=3 a3=0 items=0 ppid=1 pid=6362 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:36.837000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:25:36.858521 kernel: audit: type=1327 audit(1734056736.837:1616): proctitle=737368643A20636F7265205B707269765D
Dec 13 02:25:36.867805 systemd-logind[1722]: New session 15 of user core.
Dec 13 02:25:36.868775 systemd[1]: Started session-15.scope.
Dec 13 02:25:36.897000 audit[6362]: USER_START pid=6362 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:36.906193 kernel: audit: type=1105 audit(1734056736.897:1617): pid=6362 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:36.905000 audit[6364]: CRED_ACQ pid=6364 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:36.911174 kernel: audit: type=1103 audit(1734056736.905:1618): pid=6364 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:37.355010 sshd[6362]: pam_unix(sshd:session): session closed for user core
Dec 13 02:25:37.357000 audit[6362]: USER_END pid=6362 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:37.360753 systemd[1]: sshd@14-172.31.27.10:22-139.178.68.195:55460.service: Deactivated successfully.
Dec 13 02:25:37.365940 systemd[1]: session-15.scope: Deactivated successfully.
Dec 13 02:25:37.370185 kernel: audit: type=1106 audit(1734056737.357:1619): pid=6362 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:37.357000 audit[6362]: CRED_DISP pid=6362 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:37.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.27.10:22-139.178.68.195:55460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:37.376270 systemd-logind[1722]: Session 15 logged out. Waiting for processes to exit.
Dec 13 02:25:37.377185 kernel: audit: type=1104 audit(1734056737.357:1620): pid=6362 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:37.377904 systemd-logind[1722]: Removed session 15.
Dec 13 02:25:42.392513 systemd[1]: Started sshd@15-172.31.27.10:22-139.178.68.195:55468.service.
Dec 13 02:25:42.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.27.10:22-139.178.68.195:55468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:42.405722 kernel: kauditd_printk_skb: 1 callbacks suppressed
Dec 13 02:25:42.405875 kernel: audit: type=1130 audit(1734056742.391:1622): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.27.10:22-139.178.68.195:55468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:42.601000 audit[6460]: USER_ACCT pid=6460 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:42.608956 sshd[6460]: Accepted publickey for core from 139.178.68.195 port 55468 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:25:42.609335 kernel: audit: type=1101 audit(1734056742.601:1623): pid=6460 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:42.610000 audit[6460]: CRED_ACQ pid=6460 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:42.612040 sshd[6460]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:25:42.618671 kernel: audit: type=1103 audit(1734056742.610:1624): pid=6460 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:42.618892 kernel: audit: type=1006 audit(1734056742.610:1625): pid=6460 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1
Dec 13 02:25:42.610000 audit[6460]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6042bf00 a2=3 a3=0 items=0 ppid=1 pid=6460 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:42.625420 kernel: audit: type=1300 audit(1734056742.610:1625): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6042bf00 a2=3 a3=0 items=0 ppid=1 pid=6460 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:42.623936 systemd[1]: Started session-16.scope.
Dec 13 02:25:42.625240 systemd-logind[1722]: New session 16 of user core.
Dec 13 02:25:42.610000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:25:42.630339 kernel: audit: type=1327 audit(1734056742.610:1625): proctitle=737368643A20636F7265205B707269765D
Dec 13 02:25:42.643000 audit[6460]: USER_START pid=6460 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:42.650332 kernel: audit: type=1105 audit(1734056742.643:1626): pid=6460 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:42.650000 audit[6469]: CRED_ACQ pid=6469 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:42.657260 kernel: audit: type=1103 audit(1734056742.650:1627): pid=6469 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:43.010105 sshd[6460]: pam_unix(sshd:session): session closed for user core
Dec 13 02:25:43.011000 audit[6460]: USER_END pid=6460 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:43.021318 kernel: audit: type=1106 audit(1734056743.011:1628): pid=6460 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:43.021997 kernel: audit: type=1104 audit(1734056743.017:1629): pid=6460 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:43.017000 audit[6460]: CRED_DISP pid=6460 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:43.031654 systemd[1]: sshd@15-172.31.27.10:22-139.178.68.195:55468.service: Deactivated successfully.
Dec 13 02:25:43.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.27.10:22-139.178.68.195:55468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:43.035290 systemd[1]: session-16.scope: Deactivated successfully.
Dec 13 02:25:43.039100 systemd-logind[1722]: Session 16 logged out. Waiting for processes to exit.
Dec 13 02:25:43.042722 systemd-logind[1722]: Removed session 16.
Dec 13 02:25:43.515626 systemd[1]: run-containerd-runc-k8s.io-9db381c637e2e6bd85c48be19ead0f8084a2cc5477f23f1f2a0abd6953310ec7-runc.dzP6WH.mount: Deactivated successfully.
Dec 13 02:25:48.047177 systemd[1]: Started sshd@16-172.31.27.10:22-139.178.68.195:35088.service.
Dec 13 02:25:48.059386 kernel: kauditd_printk_skb: 1 callbacks suppressed
Dec 13 02:25:48.059491 kernel: audit: type=1130 audit(1734056748.047:1631): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.27.10:22-139.178.68.195:35088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:48.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.27.10:22-139.178.68.195:35088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:48.312000 audit[6582]: USER_ACCT pid=6582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:48.314128 sshd[6582]: Accepted publickey for core from 139.178.68.195 port 35088 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:25:48.319190 kernel: audit: type=1101 audit(1734056748.312:1632): pid=6582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:48.318000 audit[6582]: CRED_ACQ pid=6582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:48.325939 sshd[6582]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:25:48.327609 kernel: audit: type=1103 audit(1734056748.318:1633): pid=6582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:48.327716 kernel: audit: type=1006 audit(1734056748.323:1634): pid=6582 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1
Dec 13 02:25:48.323000 audit[6582]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7b3ea250 a2=3 a3=0 items=0 ppid=1 pid=6582 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:48.339435 kernel: audit: type=1300 audit(1734056748.323:1634): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7b3ea250 a2=3 a3=0 items=0 ppid=1 pid=6582 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:48.339567 kernel: audit: type=1327 audit(1734056748.323:1634): proctitle=737368643A20636F7265205B707269765D
Dec 13 02:25:48.323000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:25:48.336076 systemd[1]: Started session-17.scope.
Dec 13 02:25:48.337374 systemd-logind[1722]: New session 17 of user core.
Dec 13 02:25:48.346000 audit[6582]: USER_START pid=6582 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:48.354175 kernel: audit: type=1105 audit(1734056748.346:1635): pid=6582 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:48.353000 audit[6586]: CRED_ACQ pid=6586 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:48.359227 kernel: audit: type=1103 audit(1734056748.353:1636): pid=6586 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:48.973960 sshd[6582]: pam_unix(sshd:session): session closed for user core
Dec 13 02:25:48.975000 audit[6582]: USER_END pid=6582 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:48.977000 audit[6582]: CRED_DISP pid=6582 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:48.988397 kernel: audit: type=1106 audit(1734056748.975:1637): pid=6582 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:48.988536 kernel: audit: type=1104 audit(1734056748.977:1638): pid=6582 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:48.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.27.10:22-139.178.68.195:35088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:48.986676 systemd[1]: sshd@16-172.31.27.10:22-139.178.68.195:35088.service: Deactivated successfully.
Dec 13 02:25:48.987707 systemd[1]: session-17.scope: Deactivated successfully.
Dec 13 02:25:48.988945 systemd-logind[1722]: Session 17 logged out. Waiting for processes to exit.
Dec 13 02:25:48.990229 systemd-logind[1722]: Removed session 17.
Dec 13 02:25:49.002026 systemd[1]: Started sshd@17-172.31.27.10:22-139.178.68.195:35104.service.
Dec 13 02:25:49.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.27.10:22-139.178.68.195:35104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:49.182000 audit[6614]: USER_ACCT pid=6614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:49.185930 sshd[6614]: Accepted publickey for core from 139.178.68.195 port 35104 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:25:49.185000 audit[6614]: CRED_ACQ pid=6614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:49.185000 audit[6614]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7a13bb20 a2=3 a3=0 items=0 ppid=1 pid=6614 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:49.185000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:25:49.187396 sshd[6614]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:25:49.198232 systemd-logind[1722]: New session 18 of user core.
Dec 13 02:25:49.198400 systemd[1]: Started session-18.scope.
Dec 13 02:25:49.209000 audit[6614]: USER_START pid=6614 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:49.212000 audit[6616]: CRED_ACQ pid=6616 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:50.091672 sshd[6614]: pam_unix(sshd:session): session closed for user core
Dec 13 02:25:50.093000 audit[6614]: USER_END pid=6614 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:50.093000 audit[6614]: CRED_DISP pid=6614 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:50.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.27.10:22-139.178.68.195:35104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:50.098678 systemd-logind[1722]: Session 18 logged out. Waiting for processes to exit.
Dec 13 02:25:50.098920 systemd[1]: sshd@17-172.31.27.10:22-139.178.68.195:35104.service: Deactivated successfully.
Dec 13 02:25:50.100011 systemd[1]: session-18.scope: Deactivated successfully.
Dec 13 02:25:50.101702 systemd-logind[1722]: Removed session 18.
Dec 13 02:25:50.121012 systemd[1]: Started sshd@18-172.31.27.10:22-139.178.68.195:35112.service.
Dec 13 02:25:50.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.27.10:22-139.178.68.195:35112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:50.318000 audit[6642]: USER_ACCT pid=6642 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:50.320000 audit[6642]: CRED_ACQ pid=6642 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:50.320000 audit[6642]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe626c6400 a2=3 a3=0 items=0 ppid=1 pid=6642 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:50.320000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:25:50.323270 sshd[6642]: Accepted publickey for core from 139.178.68.195 port 35112 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:25:50.324116 sshd[6642]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:25:50.331532 systemd[1]: Started session-19.scope.
Dec 13 02:25:50.332661 systemd-logind[1722]: New session 19 of user core.
Dec 13 02:25:50.345000 audit[6642]: USER_START pid=6642 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:50.347000 audit[6644]: CRED_ACQ pid=6644 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:54.269000 audit[6713]: NETFILTER_CFG table=filter:133 family=2 entries=20 op=nft_register_rule pid=6713 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:54.272749 kernel: kauditd_printk_skb: 20 callbacks suppressed
Dec 13 02:25:54.272855 kernel: audit: type=1325 audit(1734056754.269:1655): table=filter:133 family=2 entries=20 op=nft_register_rule pid=6713 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:54.269000 audit[6713]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff4e9bbe70 a2=0 a3=7fff4e9bbe5c items=0 ppid=2876 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:54.281521 kernel: audit: type=1300 audit(1734056754.269:1655): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff4e9bbe70 a2=0 a3=7fff4e9bbe5c items=0 ppid=2876 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:54.269000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:54.285242 kernel: audit: type=1327 audit(1734056754.269:1655): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:54.287000 audit[6713]: NETFILTER_CFG table=nat:134 family=2 entries=22 op=nft_register_rule pid=6713 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:54.294272 kernel: audit: type=1325 audit(1734056754.287:1656): table=nat:134 family=2 entries=22 op=nft_register_rule pid=6713 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:54.294393 kernel: audit: type=1300 audit(1734056754.287:1656): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff4e9bbe70 a2=0 a3=0 items=0 ppid=2876 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:54.287000 audit[6713]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff4e9bbe70 a2=0 a3=0 items=0 ppid=2876 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:54.287000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:54.318163 kernel: audit: type=1327 audit(1734056754.287:1656): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:54.351000 audit[6715]: NETFILTER_CFG table=filter:135 family=2 entries=32 op=nft_register_rule pid=6715 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:54.356206 kernel: audit: type=1325 audit(1734056754.351:1657): table=filter:135 family=2 entries=32 op=nft_register_rule pid=6715 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:54.365240 kernel: audit: type=1300 audit(1734056754.351:1657): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff38d39c60 a2=0 a3=7fff38d39c4c items=0 ppid=2876 pid=6715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:54.351000 audit[6715]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff38d39c60 a2=0 a3=7fff38d39c4c items=0 ppid=2876 pid=6715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:54.351000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:54.368237 kernel: audit: type=1327 audit(1734056754.351:1657): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:54.368000 audit[6715]: NETFILTER_CFG table=nat:136 family=2 entries=22 op=nft_register_rule pid=6715 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:54.376800 kernel: audit: type=1325 audit(1734056754.368:1658): table=nat:136 family=2 entries=22 op=nft_register_rule pid=6715 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:25:54.368000 audit[6715]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff38d39c60 a2=0 a3=0 items=0 ppid=2876 pid=6715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:54.368000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:25:54.387941 sshd[6642]: pam_unix(sshd:session): session closed for user core
Dec 13 02:25:54.393000 audit[6642]: USER_END pid=6642 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:54.394000 audit[6642]: CRED_DISP pid=6642 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:54.403136 systemd[1]: Started sshd@19-172.31.27.10:22-139.178.68.195:35116.service.
Dec 13 02:25:54.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.27.10:22-139.178.68.195:35116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:54.421710 systemd[1]: sshd@18-172.31.27.10:22-139.178.68.195:35112.service: Deactivated successfully.
Dec 13 02:25:54.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.27.10:22-139.178.68.195:35112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:54.425644 systemd[1]: session-19.scope: Deactivated successfully.
Dec 13 02:25:54.427860 systemd-logind[1722]: Session 19 logged out. Waiting for processes to exit.
Dec 13 02:25:54.430094 systemd-logind[1722]: Removed session 19.
Dec 13 02:25:54.634461 sshd[6717]: Accepted publickey for core from 139.178.68.195 port 35116 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:25:54.632000 audit[6717]: USER_ACCT pid=6717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:54.634000 audit[6717]: CRED_ACQ pid=6717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:54.634000 audit[6717]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc93cdc00 a2=3 a3=0 items=0 ppid=1 pid=6717 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:54.634000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:25:54.637064 sshd[6717]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:25:54.643715 systemd-logind[1722]: New session 20 of user core.
Dec 13 02:25:54.644512 systemd[1]: Started session-20.scope.
Dec 13 02:25:54.649000 audit[6717]: USER_START pid=6717 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:54.654000 audit[6727]: CRED_ACQ pid=6727 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:56.000728 sshd[6717]: pam_unix(sshd:session): session closed for user core
Dec 13 02:25:56.001000 audit[6717]: USER_END pid=6717 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:56.001000 audit[6717]: CRED_DISP pid=6717 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:56.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.27.10:22-139.178.68.195:35116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:56.004546 systemd[1]: sshd@19-172.31.27.10:22-139.178.68.195:35116.service: Deactivated successfully.
Dec 13 02:25:56.006559 systemd[1]: session-20.scope: Deactivated successfully.
Dec 13 02:25:56.006607 systemd-logind[1722]: Session 20 logged out. Waiting for processes to exit.
Dec 13 02:25:56.009985 systemd-logind[1722]: Removed session 20.
Dec 13 02:25:56.028557 systemd[1]: Started sshd@20-172.31.27.10:22-139.178.68.195:50632.service.
Dec 13 02:25:56.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.27.10:22-139.178.68.195:50632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:56.264000 audit[6753]: USER_ACCT pid=6753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:56.267680 sshd[6753]: Accepted publickey for core from 139.178.68.195 port 50632 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:25:56.267000 audit[6753]: CRED_ACQ pid=6753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:56.267000 audit[6753]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7031d750 a2=3 a3=0 items=0 ppid=1 pid=6753 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:25:56.267000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:25:56.271463 sshd[6753]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:25:56.281627 systemd[1]: Started session-21.scope.
Dec 13 02:25:56.283131 systemd-logind[1722]: New session 21 of user core.
Dec 13 02:25:56.292000 audit[6753]: USER_START pid=6753 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:56.294000 audit[6762]: CRED_ACQ pid=6762 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:56.579301 sshd[6753]: pam_unix(sshd:session): session closed for user core
Dec 13 02:25:56.586000 audit[6753]: USER_END pid=6753 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:56.586000 audit[6753]: CRED_DISP pid=6753 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:25:56.591665 systemd[1]: sshd@20-172.31.27.10:22-139.178.68.195:50632.service: Deactivated successfully.
Dec 13 02:25:56.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.27.10:22-139.178.68.195:50632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:25:56.592623 systemd-logind[1722]: Session 21 logged out. Waiting for processes to exit.
Dec 13 02:25:56.593177 systemd[1]: session-21.scope: Deactivated successfully.
Dec 13 02:25:56.597641 systemd-logind[1722]: Removed session 21.
Dec 13 02:25:57.496627 systemd[1]: run-containerd-runc-k8s.io-d53caf9c9744f5b12fb6a51542aae0a0ce4d998f225f9e62e7d54a5e8ef24828-runc.TcLLd7.mount: Deactivated successfully.
Dec 13 02:26:01.640206 kernel: kauditd_printk_skb: 27 callbacks suppressed
Dec 13 02:26:01.643736 kernel: audit: type=1130 audit(1734056761.621:1680): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.27.10:22-139.178.68.195:50646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:26:01.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.27.10:22-139.178.68.195:50646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:26:01.622030 systemd[1]: Started sshd@21-172.31.27.10:22-139.178.68.195:50646.service.
Dec 13 02:26:02.195000 audit[6877]: USER_ACCT pid=6877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:02.213514 sshd[6877]: Accepted publickey for core from 139.178.68.195 port 50646 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:26:02.214021 sshd[6877]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:26:02.214302 kernel: audit: type=1101 audit(1734056762.195:1681): pid=6877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:02.212000 audit[6877]: CRED_ACQ pid=6877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:02.243809 kernel: audit: type=1103 audit(1734056762.212:1682): pid=6877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:02.243890 kernel: audit: type=1006 audit(1734056762.212:1683): pid=6877 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1
Dec 13 02:26:02.269256 kernel: audit: type=1300 audit(1734056762.212:1683): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd52a58180 a2=3 a3=0 items=0 ppid=1 pid=6877 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:02.212000 audit[6877]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd52a58180 a2=3 a3=0 items=0 ppid=1 pid=6877 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:02.287256 systemd-logind[1722]: New session 22 of user core.
Dec 13 02:26:02.288604 systemd[1]: Started session-22.scope.
Dec 13 02:26:02.212000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:26:02.322259 kernel: audit: type=1327 audit(1734056762.212:1683): proctitle=737368643A20636F7265205B707269765D
Dec 13 02:26:02.383105 kernel: audit: type=1105 audit(1734056762.355:1684): pid=6877 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:02.355000 audit[6877]: USER_START pid=6877 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:02.416249 kernel: audit: type=1103 audit(1734056762.387:1685): pid=6890 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:02.387000 audit[6890]: CRED_ACQ pid=6890 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:03.406135 sshd[6877]: pam_unix(sshd:session): session closed for user core
Dec 13 02:26:03.413000 audit[6877]: USER_END pid=6877 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:03.419603 systemd[1]: sshd@21-172.31.27.10:22-139.178.68.195:50646.service: Deactivated successfully.
Dec 13 02:26:03.427645 kernel: audit: type=1106 audit(1734056763.413:1686): pid=6877 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:03.427793 kernel: audit: type=1104 audit(1734056763.413:1687): pid=6877 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:03.413000 audit[6877]: CRED_DISP pid=6877 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:03.425766 systemd[1]: session-22.scope: Deactivated successfully.
Dec 13 02:26:03.431172 systemd-logind[1722]: Session 22 logged out. Waiting for processes to exit.
Dec 13 02:26:03.437596 systemd-logind[1722]: Removed session 22.
Dec 13 02:26:03.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.27.10:22-139.178.68.195:50646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:26:03.949000 audit[6928]: NETFILTER_CFG table=filter:137 family=2 entries=20 op=nft_register_rule pid=6928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:26:03.949000 audit[6928]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffed0e071b0 a2=0 a3=7ffed0e0719c items=0 ppid=2876 pid=6928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:03.949000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:26:03.957000 audit[6928]: NETFILTER_CFG table=nat:138 family=2 entries=106 op=nft_register_chain pid=6928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:26:03.957000 audit[6928]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffed0e071b0 a2=0 a3=7ffed0e0719c items=0 ppid=2876 pid=6928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:03.957000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:26:04.352000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.352000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.352000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.352000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.352000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.352000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.352000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.352000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.352000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.352000 audit: BPF prog-id=229 op=LOAD
Dec 13 02:26:04.352000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe82e3a860 a2=98 a3=3 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.352000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.353000 audit: BPF prog-id=229 op=UNLOAD
Dec 13 02:26:04.354000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.354000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.354000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.354000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.354000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.354000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.354000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.354000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.354000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.354000 audit: BPF prog-id=230 op=LOAD
Dec 13 02:26:04.354000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe82e3a640 a2=74 a3=540051 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.354000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.354000 audit: BPF prog-id=230 op=UNLOAD
Dec 13 02:26:04.354000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.354000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.354000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.354000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.354000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.354000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.354000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.354000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.354000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.354000 audit: BPF prog-id=231 op=LOAD
Dec 13 02:26:04.354000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe82e3a670 a2=94 a3=2 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.354000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.354000 audit: BPF prog-id=231 op=UNLOAD
Dec 13 02:26:04.578000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.578000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.578000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.578000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.578000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.578000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.578000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.578000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.578000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.578000 audit: BPF prog-id=232 op=LOAD
Dec 13 02:26:04.578000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe82e3a530 a2=40 a3=1 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.578000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.578000 audit: BPF prog-id=232 op=UNLOAD
Dec 13 02:26:04.578000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.578000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe82e3a600 a2=50 a3=7ffe82e3a6e0 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.578000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.594000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.594000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe82e3a540 a2=28 a3=0 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.594000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.594000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.594000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe82e3a570 a2=28 a3=0 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.594000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.594000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.594000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe82e3a480 a2=28 a3=0 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.594000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.594000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.594000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe82e3a590 a2=28 a3=0 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.594000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.594000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.594000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe82e3a570 a2=28 a3=0 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.594000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.594000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.594000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe82e3a560 a2=28 a3=0 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.594000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.594000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.594000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe82e3a590 a2=28 a3=0 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.594000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.594000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.594000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe82e3a570 a2=28 a3=0 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.594000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.594000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.594000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe82e3a590 a2=28 a3=0 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.594000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.594000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.594000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe82e3a560 a2=28 a3=0 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.594000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.594000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.594000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe82e3a5d0 a2=28 a3=0 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.594000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.594000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.594000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe82e3a380 a2=50 a3=1 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.594000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.594000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.594000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.594000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.594000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.594000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.594000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.594000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.594000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.594000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.594000 audit: BPF prog-id=233 op=LOAD
Dec 13 02:26:04.594000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe82e3a380 a2=94 a3=5 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.594000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.595000 audit: BPF prog-id=233 op=UNLOAD
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe82e3a430 a2=50 a3=1 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.595000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe82e3a550 a2=4 a3=38 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.595000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { confidentiality } for  pid=6944 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:26:04.595000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe82e3a5a0 a2=94 a3=6 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.595000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { confidentiality } for  pid=6944 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:26:04.595000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe82e39d50 a2=94 a3=83 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.595000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { perfmon } for  pid=6944 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { bpf } for  pid=6944 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.595000 audit[6944]: AVC avc:  denied  { confidentiality } for  pid=6944 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:26:04.595000 audit[6944]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe82e39d50 a2=94 a3=83 items=0 ppid=6929 pid=6944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.595000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit: BPF prog-id=234 op=LOAD
Dec 13 02:26:04.600000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff17f9f2c0 a2=98 a3=3 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.600000 audit: BPF prog-id=234 op=UNLOAD
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit: BPF prog-id=235 op=LOAD
Dec 13 02:26:04.600000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff17f9f0a0 a2=74 a3=540051 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.600000 audit: BPF prog-id=235 op=UNLOAD
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.600000 audit: BPF prog-id=236 op=LOAD
Dec 13 02:26:04.600000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff17f9f0d0 a2=94 a3=2 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.600000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.600000 audit: BPF prog-id=236 op=UNLOAD
Dec 13 02:26:04.826000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.826000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.826000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.826000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.826000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.826000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.826000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.826000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.826000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.826000 audit: BPF prog-id=237 op=LOAD
Dec 13 02:26:04.826000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff17f9ef90 a2=40 a3=1 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.826000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.826000 audit: BPF prog-id=237 op=UNLOAD
Dec 13 02:26:04.826000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.826000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff17f9f060 a2=50 a3=7fff17f9f140 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.826000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.900000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.900000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff17f9efa0 a2=28 a3=0 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.900000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.901000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.901000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff17f9efd0 a2=28 a3=0 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.901000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.901000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.901000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff17f9eee0 a2=28 a3=0 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.901000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.901000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.901000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff17f9eff0 a2=28 a3=0 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.901000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.901000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.901000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff17f9efd0 a2=28 a3=0 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.901000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.901000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.901000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff17f9efc0 a2=28 a3=0 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.901000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.901000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.901000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff17f9eff0 a2=28 a3=0 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.901000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.901000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.901000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff17f9efd0 a2=28 a3=0 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.901000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.901000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.901000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff17f9eff0 a2=28 a3=0 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.901000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.901000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.901000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff17f9efc0 a2=28 a3=0 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.901000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.901000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.901000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff17f9f030 a2=28 a3=0 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.901000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.903000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.903000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff17f9ede0 a2=50 a3=1 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.903000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.903000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.903000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.903000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.903000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.903000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.903000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.903000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.903000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.903000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.903000 audit: BPF prog-id=238 op=LOAD
Dec 13 02:26:04.903000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff17f9ede0 a2=94 a3=5 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.903000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.905000 audit: BPF prog-id=238 op=UNLOAD
Dec 13 02:26:04.905000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.905000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff17f9ee90 a2=50 a3=1 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.905000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.905000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.905000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff17f9efb0 a2=4 a3=38 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.905000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.905000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.905000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.905000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.905000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.905000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.905000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.905000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.905000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.905000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.905000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.905000 audit[6945]: AVC avc:  denied  { confidentiality } for  pid=6945 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:26:04.905000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff17f9f000 a2=94 a3=6 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.905000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.906000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.906000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.906000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.906000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.906000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.906000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.906000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.906000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.906000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.906000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.906000 audit[6945]: AVC avc:  denied  { confidentiality } for  pid=6945 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:26:04.906000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff17f9e7b0 a2=94 a3=83 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.906000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.906000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.906000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.906000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.906000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.906000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.906000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.906000 audit[6945]: AVC avc:  denied  { perfmon } for  pid=6945 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.906000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff17f9e7b0 a2=94 a3=83 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.906000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.951000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.951000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=0 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.951000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.951000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=3d items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.951000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.951000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=41 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.951000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.951000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=45 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.951000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.951000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=49 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.951000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.951000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=4d items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.951000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.951000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=51 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.951000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.951000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=52 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.951000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.951000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=53 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.951000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.951000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=54 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.951000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.951000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=55 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.951000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.951000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=56 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.952000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.952000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=57 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.952000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.952000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.952000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=58 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.952000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.952000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.952000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=59 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.952000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.952000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.952000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=5a items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.952000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.952000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.952000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=5b items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.952000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.952000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.952000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=5c items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.952000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.952000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.952000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=5d items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.952000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.952000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.952000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=5e items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.952000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.952000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.952000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=5f items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.952000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.954000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.954000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=60 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.954000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.954000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=61 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.954000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.954000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=62 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.954000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.954000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=63 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.954000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.954000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=64 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.954000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.954000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=65 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.954000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.954000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=66 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.954000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.954000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=67 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.954000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.954000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=6a items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.954000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.954000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=6d items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.957000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.957000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=6e items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.957000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.957000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.957000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=71 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.957000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.957000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.957000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=72 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.957000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.958000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.958000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=75 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.958000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.958000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.958000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=7a items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.958000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.974000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.974000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=7d items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.974000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.974000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.974000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=8a items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.974000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.974000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.974000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=8b items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.974000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.974000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.974000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=8e items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.974000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.974000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.974000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=92 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.974000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.974000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.974000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=95 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.974000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.976000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.976000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=9b items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.976000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.976000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.976000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=9e items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.976000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.976000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.976000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=aa items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.976000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.976000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.976000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=ad items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.976000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.981000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.981000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=ae items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.981000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.981000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.981000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=b1 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.981000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.983000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.983000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=b4 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.983000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.983000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.983000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=b5 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.983000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.983000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.983000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=b8 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.983000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.983000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.983000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=b9 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.983000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.983000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.983000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=bc items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.983000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.983000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.983000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=c3 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.983000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.983000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.983000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=c4 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.983000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.983000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.983000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=c7 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.983000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.983000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.983000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=c8 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.983000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.983000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.983000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=cb items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.983000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.986000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.986000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=d0 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.987000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.987000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=d3 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.987000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:04.987000 audit[6945]: AVC avc:  denied  { bpf } for  pid=6945 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:04.987000 audit[6945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff17fa01f0 a2=10 a3=d4 items=0 ppid=6929 pid=6945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:04.987000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:05.124000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:26:05.124000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:26:05.124000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002cc25a0 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:26:05.124000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:26:05.124000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001585d20 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:26:05.124000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:26:05.145000 audit[6961]: AVC avc:  denied  { bpf } for  pid=6961 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.145000 audit[6961]: AVC avc:  denied  { bpf } for  pid=6961 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.145000 audit[6961]: AVC avc:  denied  { perfmon } for  pid=6961 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.145000 audit[6961]: AVC avc:  denied  { perfmon } for  pid=6961 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.145000 audit[6961]: AVC avc:  denied  { perfmon } for  pid=6961 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.145000 audit[6961]: AVC avc:  denied  { perfmon } for  pid=6961 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.145000 audit[6961]: AVC avc:  denied  { perfmon } for  pid=6961 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.145000 audit[6961]: AVC avc:  denied  { bpf } for  pid=6961 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.145000 audit[6961]: AVC avc:  denied  { bpf } for  pid=6961 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.145000 audit: BPF prog-id=239 op=LOAD
Dec 13 02:26:05.145000 audit[6961]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffed1f9de70 a2=98 a3=1999999999999999 items=0 ppid=6929 pid=6961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:05.145000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F
Dec 13 02:26:05.157000 audit: BPF prog-id=239 op=UNLOAD
Dec 13 02:26:05.157000 audit[6961]: AVC avc:  denied  { bpf } for  pid=6961 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.157000 audit[6961]: AVC avc:  denied  { bpf } for  pid=6961 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.157000 audit[6961]: AVC avc:  denied  { perfmon } for  pid=6961 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.157000 audit[6961]: AVC avc:  denied  { perfmon } for  pid=6961 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.157000 audit[6961]: AVC avc:  denied  { perfmon } for  pid=6961 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.157000 audit[6961]: AVC avc:  denied  { perfmon } for  pid=6961 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.157000 audit[6961]: AVC avc:  denied  { perfmon } for  pid=6961 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.157000 audit[6961]: AVC avc:  denied  { bpf } for  pid=6961 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.157000 audit[6961]: AVC avc:  denied  { bpf } for  pid=6961 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.157000 audit: BPF prog-id=240 op=LOAD
Dec 13 02:26:05.157000 audit[6961]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffed1f9dd50 a2=74 a3=ffff items=0 ppid=6929 pid=6961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:05.157000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F
Dec 13 02:26:05.165000 audit: BPF prog-id=240 op=UNLOAD
Dec 13 02:26:05.165000 audit[6961]: AVC avc:  denied  { bpf } for  pid=6961 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.165000 audit[6961]: AVC avc:  denied  { bpf } for  pid=6961 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.165000 audit[6961]: AVC avc:  denied  { perfmon } for  pid=6961 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.165000 audit[6961]: AVC avc:  denied  { perfmon } for  pid=6961 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.165000 audit[6961]: AVC avc:  denied  { perfmon } for  pid=6961 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.165000 audit[6961]: AVC avc:  denied  { perfmon } for  pid=6961 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.165000 audit[6961]: AVC avc:  denied  { perfmon } for  pid=6961 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.165000 audit[6961]: AVC avc:  denied  { bpf } for  pid=6961 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.165000 audit[6961]: AVC avc:  denied  { bpf } for  pid=6961 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:05.165000 audit: BPF prog-id=241 op=LOAD
Dec 13 02:26:05.165000 audit[6961]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffed1f9dd90 a2=40 a3=7ffed1f9df70 items=0 ppid=6929 pid=6961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:05.165000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F
Dec 13 02:26:05.171000 audit: BPF prog-id=241 op=UNLOAD
Dec 13 02:26:06.320000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:26:06.320000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:26:06.320000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c011ef8960 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:26:06.320000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:26:06.320000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c011963530 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:26:06.320000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:26:06.321000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:26:06.321000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c0051346c0 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:26:06.321000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:26:06.323000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:26:06.323000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c0051346e0 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:26:06.323000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:26:06.336000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:26:06.336000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c011963860 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:26:06.336000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:26:06.338000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:26:06.338000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c011ef9110 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:26:06.338000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:26:07.886000 audit[4886]: AVC avc:  denied  { watch } for  pid=4886 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_24_36.2381904809/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c176,c639 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c176,c639 tclass=file permissive=0
Dec 13 02:26:07.889080 kernel: kauditd_printk_skb: 557 callbacks suppressed
Dec 13 02:26:07.889555 kernel: audit: type=1400 audit(1734056767.886:1822): avc:  denied  { watch } for  pid=4886 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_24_36.2381904809/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c176,c639 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c176,c639 tclass=file permissive=0
Dec 13 02:26:07.886000 audit[4886]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c002461cc0 a2=fc6 a3=0 items=0 ppid=4617 pid=4886 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c176,c639 key=(null)
Dec 13 02:26:07.900444 kernel: audit: type=1300 audit(1734056767.886:1822): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c002461cc0 a2=fc6 a3=0 items=0 ppid=4617 pid=4886 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c176,c639 key=(null)
Dec 13 02:26:07.900700 kernel: audit: type=1327 audit(1734056767.886:1822): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274
Dec 13 02:26:07.886000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274
Dec 13 02:26:08.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.27.10:22-139.178.68.195:52716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:26:08.432094 systemd[1]: Started sshd@22-172.31.27.10:22-139.178.68.195:52716.service.
Dec 13 02:26:08.440218 kernel: audit: type=1130 audit(1734056768.431:1823): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.27.10:22-139.178.68.195:52716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:26:08.671000 audit[7019]: USER_ACCT pid=7019 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:08.677765 sshd[7019]: Accepted publickey for core from 139.178.68.195 port 52716 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:26:08.676000 audit[7019]: CRED_ACQ pid=7019 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:08.681311 sshd[7019]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:26:08.684648 kernel: audit: type=1101 audit(1734056768.671:1824): pid=7019 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:08.684824 kernel: audit: type=1103 audit(1734056768.676:1825): pid=7019 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:08.676000 audit[7019]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff737194f0 a2=3 a3=0 items=0 ppid=1 pid=7019 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:08.693787 kernel: audit: type=1006 audit(1734056768.676:1826): pid=7019 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1
Dec 13 02:26:08.693908 kernel: audit: type=1300 audit(1734056768.676:1826): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff737194f0 a2=3 a3=0 items=0 ppid=1 pid=7019 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:08.695021 kernel: audit: type=1327 audit(1734056768.676:1826): proctitle=737368643A20636F7265205B707269765D
Dec 13 02:26:08.676000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:26:08.698049 systemd-logind[1722]: New session 23 of user core.
Dec 13 02:26:08.699024 systemd[1]: Started session-23.scope.
Dec 13 02:26:08.705000 audit[7019]: USER_START pid=7019 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:08.712000 audit[7021]: CRED_ACQ pid=7021 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:08.716390 kernel: audit: type=1105 audit(1734056768.705:1827): pid=7019 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:08.998867 sshd[7019]: pam_unix(sshd:session): session closed for user core
Dec 13 02:26:08.999000 audit[7019]: USER_END pid=7019 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:09.000000 audit[7019]: CRED_DISP pid=7019 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:09.004698 systemd-logind[1722]: Session 23 logged out. Waiting for processes to exit.
Dec 13 02:26:09.005303 systemd[1]: sshd@22-172.31.27.10:22-139.178.68.195:52716.service: Deactivated successfully.
Dec 13 02:26:09.006439 systemd[1]: session-23.scope: Deactivated successfully.
Dec 13 02:26:09.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.27.10:22-139.178.68.195:52716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:26:09.010262 systemd-logind[1722]: Removed session 23.
Dec 13 02:26:10.250444 (udev-worker)[7074]: Network interface NamePolicy= disabled on kernel command line.
Dec 13 02:26:10.251000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.251000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.251000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.251000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.251000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.251000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.251000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.251000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.251000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.251000 audit: BPF prog-id=242 op=LOAD
Dec 13 02:26:10.251000 audit[7073]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc176fc1e0 a2=98 a3=ffffffff items=0 ppid=6929 pid=7073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.251000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:26:10.251000 audit: BPF prog-id=242 op=UNLOAD
Dec 13 02:26:10.252690 (udev-worker)[7075]: Network interface NamePolicy= disabled on kernel command line.
Dec 13 02:26:10.256000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.256000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.256000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.256000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.256000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.256000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.256000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.256000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.256000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.256000 audit: BPF prog-id=243 op=LOAD
Dec 13 02:26:10.256000 audit[7073]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc176fbff0 a2=74 a3=540051 items=0 ppid=6929 pid=7073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.256000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:26:10.257000 audit: BPF prog-id=243 op=UNLOAD
Dec 13 02:26:10.257000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.257000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.257000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.257000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.257000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.257000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.257000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.257000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.257000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.257000 audit: BPF prog-id=244 op=LOAD
Dec 13 02:26:10.257000 audit[7073]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc176fc020 a2=94 a3=2 items=0 ppid=6929 pid=7073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.257000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:26:10.257000 audit: BPF prog-id=244 op=UNLOAD
Dec 13 02:26:10.257000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.257000 audit[7073]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc176fbef0 a2=28 a3=0 items=0 ppid=6929 pid=7073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.257000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:26:10.257000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.257000 audit[7073]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc176fbf20 a2=28 a3=0 items=0 ppid=6929 pid=7073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.257000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:26:10.257000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.257000 audit[7073]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc176fbe30 a2=28 a3=0 items=0 ppid=6929 pid=7073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.257000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:26:10.257000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.257000 audit[7073]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc176fbf40 a2=28 a3=0 items=0 ppid=6929 pid=7073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.257000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:26:10.257000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.257000 audit[7073]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc176fbf20 a2=28 a3=0 items=0 ppid=6929 pid=7073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.257000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:26:10.257000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.257000 audit[7073]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc176fbf10 a2=28 a3=0 items=0 ppid=6929 pid=7073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.257000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:26:10.257000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.257000 audit[7073]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc176fbf40 a2=28 a3=0 items=0 ppid=6929 pid=7073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.257000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:26:10.257000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.257000 audit[7073]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc176fbf20 a2=28 a3=0 items=0 ppid=6929 pid=7073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.257000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:26:10.257000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.257000 audit[7073]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc176fbf40 a2=28 a3=0 items=0 ppid=6929 pid=7073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.257000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:26:10.257000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.257000 audit[7073]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc176fbf10 a2=28 a3=0 items=0 ppid=6929 pid=7073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.257000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:26:10.257000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.257000 audit[7073]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc176fbf80 a2=28 a3=0 items=0 ppid=6929 pid=7073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.257000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:26:10.257000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.257000 audit[7073]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc176fbdf0 a2=40 a3=0 items=0 ppid=6929 pid=7073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.257000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:26:10.257000 audit: BPF prog-id=245 op=UNLOAD
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit[7073]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc176fbde0 a2=50 a3=2800 items=0 ppid=6929 pid=7073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.258000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit[7073]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc176fbde0 a2=50 a3=2800 items=0 ppid=6929 pid=7073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.258000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit: BPF prog-id=246 op=LOAD
Dec 13 02:26:10.258000 audit[7073]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc176fb600 a2=94 a3=2 items=0 ppid=6929 pid=7073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.258000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:26:10.258000 audit: BPF prog-id=246 op=UNLOAD
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { perfmon } for  pid=7073 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit[7073]: AVC avc:  denied  { bpf } for  pid=7073 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.258000 audit: BPF prog-id=247 op=LOAD
Dec 13 02:26:10.258000 audit[7073]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc176fb700 a2=94 a3=2d items=0 ppid=6929 pid=7073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.258000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:26:10.272000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.272000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.272000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.272000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.272000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.272000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.272000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.272000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.272000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.272000 audit: BPF prog-id=248 op=LOAD
Dec 13 02:26:10.272000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe969f48c0 a2=98 a3=0 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.272000 audit: BPF prog-id=248 op=UNLOAD
Dec 13 02:26:10.273000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.273000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.273000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.273000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.273000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.273000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.273000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.273000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.273000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.273000 audit: BPF prog-id=249 op=LOAD
Dec 13 02:26:10.273000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe969f46a0 a2=74 a3=540051 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.273000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.273000 audit: BPF prog-id=249 op=UNLOAD
Dec 13 02:26:10.273000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.273000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.273000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.273000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.273000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.273000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.273000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.273000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.273000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.273000 audit: BPF prog-id=250 op=LOAD
Dec 13 02:26:10.273000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe969f46d0 a2=94 a3=2 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.273000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.273000 audit: BPF prog-id=250 op=UNLOAD
Dec 13 02:26:10.438000 audit[4921]: AVC avc:  denied  { watch } for  pid=4921 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_24_36.1409813258/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c456 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c15,c456 tclass=file permissive=0
Dec 13 02:26:10.438000 audit[4921]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002262ee0 a2=fc6 a3=0 items=0 ppid=4708 pid=4921 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c456 key=(null)
Dec 13 02:26:10.438000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274
Dec 13 02:26:10.549000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.549000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.549000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.549000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.549000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.549000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.549000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.549000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.549000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.549000 audit: BPF prog-id=251 op=LOAD
Dec 13 02:26:10.549000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe969f4590 a2=40 a3=1 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.549000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.549000 audit: BPF prog-id=251 op=UNLOAD
Dec 13 02:26:10.549000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.549000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe969f4660 a2=50 a3=7ffe969f4740 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.549000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.565000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.565000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe969f45a0 a2=28 a3=0 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.565000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.565000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.565000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe969f45d0 a2=28 a3=0 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.565000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.565000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.565000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe969f44e0 a2=28 a3=0 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.565000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.565000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.565000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe969f45f0 a2=28 a3=0 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.565000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.565000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.565000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe969f45d0 a2=28 a3=0 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.565000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.565000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.565000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe969f45c0 a2=28 a3=0 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.565000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.565000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.565000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe969f45f0 a2=28 a3=0 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.565000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.565000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.565000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe969f45d0 a2=28 a3=0 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.565000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.565000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.565000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe969f45f0 a2=28 a3=0 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.565000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.565000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.565000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe969f45c0 a2=28 a3=0 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.565000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.565000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.565000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe969f4630 a2=28 a3=0 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.565000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.565000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.565000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe969f43e0 a2=50 a3=1 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.565000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.565000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.565000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.565000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.565000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.565000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.565000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.565000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.565000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.565000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.565000 audit: BPF prog-id=252 op=LOAD
Dec 13 02:26:10.565000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe969f43e0 a2=94 a3=5 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.565000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.566000 audit: BPF prog-id=252 op=UNLOAD
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe969f4490 a2=50 a3=1 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.566000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe969f45b0 a2=4 a3=38 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.566000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { confidentiality } for  pid=7079 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:26:10.566000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe969f4600 a2=94 a3=6 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.566000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { confidentiality } for  pid=7079 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:26:10.566000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe969f3db0 a2=94 a3=83 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.566000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { perfmon } for  pid=7079 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.566000 audit[7079]: AVC avc:  denied  { confidentiality } for  pid=7079 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:26:10.566000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe969f3db0 a2=94 a3=83 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.566000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.567000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.567000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe969f57f0 a2=10 a3=f1f00800 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.567000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.567000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.567000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe969f5690 a2=10 a3=3 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.567000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.567000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.567000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe969f5630 a2=10 a3=3 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.567000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.567000 audit[7079]: AVC avc:  denied  { bpf } for  pid=7079 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:10.567000 audit[7079]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe969f5630 a2=10 a3=7 items=0 ppid=6929 pid=7079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.567000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:26:10.576000 audit: BPF prog-id=247 op=UNLOAD
Dec 13 02:26:10.576000 audit[1450]: SYSCALL arch=c000003e syscall=232 success=yes exit=1 a0=a a1=5586f9c2a690 a2=46 a3=0 items=0 ppid=1 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-udevd" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.576000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-udevd"
Dec 13 02:26:10.679000 audit[7124]: NETFILTER_CFG table=filter:139 family=2 entries=66 op=nft_register_chain pid=7124 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 02:26:10.679000 audit[7124]: SYSCALL arch=c000003e syscall=46 success=yes exit=22192 a0=3 a1=7ffca97efe00 a2=0 a3=7ffca97efdec items=0 ppid=6929 pid=7124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.679000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 02:26:10.680000 audit[7124]: NETFILTER_CFG table=filter:140 family=2 entries=2 op=nft_unregister_chain pid=7124 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 02:26:10.680000 audit[7124]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffca97efe00 a2=0 a3=5623fdb36000 items=0 ppid=6929 pid=7124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:10.680000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 02:26:10.751000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:26:10.751000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:26:10.751000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001557680 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:26:10.751000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:26:10.751000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:26:10.751000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0015576c0 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:26:10.751000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:26:10.751000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0022e3f20 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:26:10.751000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:26:10.751000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:26:10.751000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0022e3f40 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:26:10.751000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:26:13.541791 systemd[1]: run-containerd-runc-k8s.io-9db381c637e2e6bd85c48be19ead0f8084a2cc5477f23f1f2a0abd6953310ec7-runc.aSH4nC.mount: Deactivated successfully.
Dec 13 02:26:14.029044 systemd[1]: Started sshd@23-172.31.27.10:22-139.178.68.195:52718.service.
Dec 13 02:26:14.037274 kernel: kauditd_printk_skb: 325 callbacks suppressed
Dec 13 02:26:14.037422 kernel: audit: type=1130 audit(1734056774.031:1896): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.27.10:22-139.178.68.195:52718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:26:14.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.27.10:22-139.178.68.195:52718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:26:14.326000 audit[7166]: USER_ACCT pid=7166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:14.337362 kernel: audit: type=1101 audit(1734056774.326:1897): pid=7166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:14.337525 sshd[7166]: Accepted publickey for core from 139.178.68.195 port 52718 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:26:14.346000 audit[7166]: CRED_ACQ pid=7166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:14.350424 sshd[7166]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:26:14.354341 kernel: audit: type=1103 audit(1734056774.346:1898): pid=7166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:14.346000 audit[7166]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffded0892e0 a2=3 a3=0 items=0 ppid=1 pid=7166 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:14.363165 kernel: audit: type=1006 audit(1734056774.346:1899): pid=7166 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1
Dec 13 02:26:14.363348 kernel: audit: type=1300 audit(1734056774.346:1899): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffded0892e0 a2=3 a3=0 items=0 ppid=1 pid=7166 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:14.346000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:26:14.370380 kernel: audit: type=1327 audit(1734056774.346:1899): proctitle=737368643A20636F7265205B707269765D
Dec 13 02:26:14.369703 systemd-logind[1722]: New session 24 of user core.
Dec 13 02:26:14.371870 systemd[1]: Started session-24.scope.
Dec 13 02:26:14.379000 audit[7166]: USER_START pid=7166 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:14.387203 kernel: audit: type=1105 audit(1734056774.379:1900): pid=7166 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:14.384000 audit[7168]: CRED_ACQ pid=7168 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:14.393203 kernel: audit: type=1103 audit(1734056774.384:1901): pid=7168 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:15.206438 sshd[7166]: pam_unix(sshd:session): session closed for user core
Dec 13 02:26:15.210000 audit[7166]: USER_END pid=7166 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:15.214926 systemd[1]: sshd@23-172.31.27.10:22-139.178.68.195:52718.service: Deactivated successfully.
Dec 13 02:26:15.216656 systemd[1]: session-24.scope: Deactivated successfully.
Dec 13 02:26:15.221304 kernel: audit: type=1106 audit(1734056775.210:1902): pid=7166 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:15.211000 audit[7166]: CRED_DISP pid=7166 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:15.222332 systemd-logind[1722]: Session 24 logged out. Waiting for processes to exit.
Dec 13 02:26:15.232731 systemd-logind[1722]: Removed session 24.
Dec 13 02:26:15.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.27.10:22-139.178.68.195:52718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:26:15.237192 kernel: audit: type=1104 audit(1734056775.211:1903): pid=7166 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:16.809141 systemd[1]: cri-containerd-9db381c637e2e6bd85c48be19ead0f8084a2cc5477f23f1f2a0abd6953310ec7.scope: Deactivated successfully.
Dec 13 02:26:16.808000 audit: BPF prog-id=212 op=UNLOAD
Dec 13 02:26:16.814000 audit: BPF prog-id=215 op=UNLOAD
Dec 13 02:26:16.842062 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9db381c637e2e6bd85c48be19ead0f8084a2cc5477f23f1f2a0abd6953310ec7-rootfs.mount: Deactivated successfully.
Dec 13 02:26:16.913572 env[1728]: time="2024-12-13T02:26:16.913504376Z" level=info msg="shim disconnected" id=9db381c637e2e6bd85c48be19ead0f8084a2cc5477f23f1f2a0abd6953310ec7
Dec 13 02:26:16.913572 env[1728]: time="2024-12-13T02:26:16.913565828Z" level=warning msg="cleaning up after shim disconnected" id=9db381c637e2e6bd85c48be19ead0f8084a2cc5477f23f1f2a0abd6953310ec7 namespace=k8s.io
Dec 13 02:26:16.913572 env[1728]: time="2024-12-13T02:26:16.913578912Z" level=info msg="cleaning up dead shim"
Dec 13 02:26:16.927604 env[1728]: time="2024-12-13T02:26:16.927517498Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:26:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7198 runtime=io.containerd.runc.v2\n"
Dec 13 02:26:17.931461 kubelet[2727]: I1213 02:26:17.915753    2727 scope.go:117] "RemoveContainer" containerID="9db381c637e2e6bd85c48be19ead0f8084a2cc5477f23f1f2a0abd6953310ec7"
Dec 13 02:26:18.006980 env[1728]: time="2024-12-13T02:26:18.006925522Z" level=info msg="CreateContainer within sandbox \"d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:1,}"
Dec 13 02:26:18.048015 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount281641852.mount: Deactivated successfully.
Dec 13 02:26:18.055550 env[1728]: time="2024-12-13T02:26:18.055439166Z" level=info msg="CreateContainer within sandbox \"d4024e7c7f54d8b1b6f6f0a697d23613ced6ee27184c3a73dbc3127f39a0a94c\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:1,} returns container id \"3e11a955fb5e18929d956b1216efbbe8b1f4f44c3031d7e0774805246bb5497f\""
Dec 13 02:26:18.057592 env[1728]: time="2024-12-13T02:26:18.057549540Z" level=info msg="StartContainer for \"3e11a955fb5e18929d956b1216efbbe8b1f4f44c3031d7e0774805246bb5497f\""
Dec 13 02:26:18.119444 systemd[1]: Started cri-containerd-3e11a955fb5e18929d956b1216efbbe8b1f4f44c3031d7e0774805246bb5497f.scope.
Dec 13 02:26:18.202000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.202000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.202000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.202000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.202000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.202000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.202000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.202000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.202000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.202000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.202000 audit: BPF prog-id=253 op=LOAD
Dec 13 02:26:18.204000 audit[7218]: AVC avc:  denied  { bpf } for  pid=7218 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.204000 audit[7218]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5505 pid=7218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:18.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365313161393535666235653138393239643935366231323136656662
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { perfmon } for  pid=7218 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=5505 pid=7218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:18.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365313161393535666235653138393239643935366231323136656662
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { bpf } for  pid=7218 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { bpf } for  pid=7218 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { bpf } for  pid=7218 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { perfmon } for  pid=7218 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { perfmon } for  pid=7218 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { perfmon } for  pid=7218 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { perfmon } for  pid=7218 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { perfmon } for  pid=7218 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { bpf } for  pid=7218 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { bpf } for  pid=7218 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit: BPF prog-id=254 op=LOAD
Dec 13 02:26:18.205000 audit[7218]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00020f1f0 items=0 ppid=5505 pid=7218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:18.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365313161393535666235653138393239643935366231323136656662
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { bpf } for  pid=7218 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { bpf } for  pid=7218 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { perfmon } for  pid=7218 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { perfmon } for  pid=7218 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { perfmon } for  pid=7218 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { perfmon } for  pid=7218 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { perfmon } for  pid=7218 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { bpf } for  pid=7218 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { bpf } for  pid=7218 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit: BPF prog-id=255 op=LOAD
Dec 13 02:26:18.205000 audit[7218]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00020f238 items=0 ppid=5505 pid=7218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:18.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365313161393535666235653138393239643935366231323136656662
Dec 13 02:26:18.205000 audit: BPF prog-id=255 op=UNLOAD
Dec 13 02:26:18.205000 audit: BPF prog-id=254 op=UNLOAD
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { bpf } for  pid=7218 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { bpf } for  pid=7218 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { bpf } for  pid=7218 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { perfmon } for  pid=7218 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { perfmon } for  pid=7218 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { perfmon } for  pid=7218 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { perfmon } for  pid=7218 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { perfmon } for  pid=7218 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { bpf } for  pid=7218 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit[7218]: AVC avc:  denied  { bpf } for  pid=7218 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:18.205000 audit: BPF prog-id=256 op=LOAD
Dec 13 02:26:18.205000 audit[7218]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00020f648 items=0 ppid=5505 pid=7218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:18.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365313161393535666235653138393239643935366231323136656662
Dec 13 02:26:18.280047 env[1728]: time="2024-12-13T02:26:18.279848247Z" level=info msg="StartContainer for \"3e11a955fb5e18929d956b1216efbbe8b1f4f44c3031d7e0774805246bb5497f\" returns successfully"
Dec 13 02:26:19.031504 systemd[1]: run-containerd-runc-k8s.io-3e11a955fb5e18929d956b1216efbbe8b1f4f44c3031d7e0774805246bb5497f-runc.19sb1s.mount: Deactivated successfully.
Dec 13 02:26:20.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.27.10:22-139.178.68.195:54700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:26:20.246689 systemd[1]: Started sshd@24-172.31.27.10:22-139.178.68.195:54700.service.
Dec 13 02:26:20.250301 kernel: kauditd_printk_skb: 60 callbacks suppressed
Dec 13 02:26:20.250857 kernel: audit: type=1130 audit(1734056780.246:1925): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.27.10:22-139.178.68.195:54700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:26:20.478000 audit[7265]: USER_ACCT pid=7265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:20.490410 kernel: audit: type=1101 audit(1734056780.478:1926): pid=7265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:20.490466 sshd[7265]: Accepted publickey for core from 139.178.68.195 port 54700 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:26:20.488000 audit[7265]: CRED_ACQ pid=7265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:20.493489 sshd[7265]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:26:20.504184 kernel: audit: type=1103 audit(1734056780.488:1927): pid=7265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:20.508240 kernel: audit: type=1006 audit(1734056780.489:1928): pid=7265 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1
Dec 13 02:26:20.489000 audit[7265]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce2a33500 a2=3 a3=0 items=0 ppid=1 pid=7265 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:20.518204 kernel: audit: type=1300 audit(1734056780.489:1928): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce2a33500 a2=3 a3=0 items=0 ppid=1 pid=7265 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:20.518306 kernel: audit: type=1327 audit(1734056780.489:1928): proctitle=737368643A20636F7265205B707269765D
Dec 13 02:26:20.489000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:26:20.517100 systemd[1]: Started session-25.scope.
Dec 13 02:26:20.518251 systemd-logind[1722]: New session 25 of user core.
Dec 13 02:26:20.525000 audit[7265]: USER_START pid=7265 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:20.525000 audit[7267]: CRED_ACQ pid=7267 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:20.539956 kernel: audit: type=1105 audit(1734056780.525:1929): pid=7265 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:20.540078 kernel: audit: type=1103 audit(1734056780.525:1930): pid=7267 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:20.879178 sshd[7265]: pam_unix(sshd:session): session closed for user core
Dec 13 02:26:20.881000 audit[7265]: USER_END pid=7265 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:20.886205 systemd[1]: sshd@24-172.31.27.10:22-139.178.68.195:54700.service: Deactivated successfully.
Dec 13 02:26:20.887333 systemd[1]: session-25.scope: Deactivated successfully.
Dec 13 02:26:20.888237 kernel: audit: type=1106 audit(1734056780.881:1931): pid=7265 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:20.889735 systemd-logind[1722]: Session 25 logged out. Waiting for processes to exit.
Dec 13 02:26:20.882000 audit[7265]: CRED_DISP pid=7265 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:20.892197 systemd-logind[1722]: Removed session 25.
Dec 13 02:26:20.895189 kernel: audit: type=1104 audit(1734056780.882:1932): pid=7265 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:20.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.27.10:22-139.178.68.195:54700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:26:25.906620 systemd[1]: Started sshd@25-172.31.27.10:22-139.178.68.195:54716.service.
Dec 13 02:26:25.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.27.10:22-139.178.68.195:54716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:26:25.915820 kernel: kauditd_printk_skb: 1 callbacks suppressed
Dec 13 02:26:25.915937 kernel: audit: type=1130 audit(1734056785.908:1934): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.27.10:22-139.178.68.195:54716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:26:26.101000 audit[7285]: USER_ACCT pid=7285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:26.112015 kernel: audit: type=1101 audit(1734056786.101:1935): pid=7285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:26.112106 sshd[7285]: Accepted publickey for core from 139.178.68.195 port 54716 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:26:26.111000 audit[7285]: CRED_ACQ pid=7285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:26.124080 sshd[7285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:26:26.127697 kernel: audit: type=1103 audit(1734056786.111:1936): pid=7285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:26.127812 kernel: audit: type=1006 audit(1734056786.112:1937): pid=7285 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1
Dec 13 02:26:26.127850 kernel: audit: type=1300 audit(1734056786.112:1937): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe3d7eb30 a2=3 a3=0 items=0 ppid=1 pid=7285 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:26.112000 audit[7285]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe3d7eb30 a2=3 a3=0 items=0 ppid=1 pid=7285 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:26.112000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:26:26.136553 kernel: audit: type=1327 audit(1734056786.112:1937): proctitle=737368643A20636F7265205B707269765D
Dec 13 02:26:26.152274 systemd-logind[1722]: New session 26 of user core.
Dec 13 02:26:26.153514 systemd[1]: Started session-26.scope.
Dec 13 02:26:26.180000 audit[7285]: USER_START pid=7285 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:26.190281 kernel: audit: type=1105 audit(1734056786.180:1938): pid=7285 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:26.188000 audit[7288]: CRED_ACQ pid=7288 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:26.196202 kernel: audit: type=1103 audit(1734056786.188:1939): pid=7288 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:26.479281 sshd[7285]: pam_unix(sshd:session): session closed for user core
Dec 13 02:26:26.483000 audit[7285]: USER_END pid=7285 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:26.491132 systemd[1]: sshd@25-172.31.27.10:22-139.178.68.195:54716.service: Deactivated successfully.
Dec 13 02:26:26.493223 systemd[1]: session-26.scope: Deactivated successfully.
Dec 13 02:26:26.496342 kernel: audit: type=1106 audit(1734056786.483:1940): pid=7285 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:26.500284 systemd-logind[1722]: Session 26 logged out. Waiting for processes to exit.
Dec 13 02:26:26.486000 audit[7285]: CRED_DISP pid=7285 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:26.519672 kernel: audit: type=1104 audit(1734056786.486:1941): pid=7285 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:26.518068 systemd-logind[1722]: Removed session 26.
Dec 13 02:26:26.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.27.10:22-139.178.68.195:54716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:26:27.487062 systemd[1]: run-containerd-runc-k8s.io-d53caf9c9744f5b12fb6a51542aae0a0ce4d998f225f9e62e7d54a5e8ef24828-runc.VF3cGI.mount: Deactivated successfully.
Dec 13 02:26:31.505908 systemd[1]: Started sshd@26-172.31.27.10:22-139.178.68.195:60662.service.
Dec 13 02:26:31.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.27.10:22-139.178.68.195:60662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:26:31.508285 kernel: kauditd_printk_skb: 1 callbacks suppressed
Dec 13 02:26:31.508640 kernel: audit: type=1130 audit(1734056791.505:1943): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.27.10:22-139.178.68.195:60662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:26:31.746000 audit[7327]: USER_ACCT pid=7327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:31.748261 sshd[7327]: Accepted publickey for core from 139.178.68.195 port 60662 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY
Dec 13 02:26:31.753179 kernel: audit: type=1101 audit(1734056791.746:1944): pid=7327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:31.752000 audit[7327]: CRED_ACQ pid=7327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:31.761960 kernel: audit: type=1103 audit(1734056791.752:1945): pid=7327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:31.762253 kernel: audit: type=1006 audit(1734056791.752:1946): pid=7327 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1
Dec 13 02:26:31.762297 kernel: audit: type=1300 audit(1734056791.752:1946): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe22afa860 a2=3 a3=0 items=0 ppid=1 pid=7327 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:31.752000 audit[7327]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe22afa860 a2=3 a3=0 items=0 ppid=1 pid=7327 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:31.763091 sshd[7327]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:26:31.752000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:26:31.769169 kernel: audit: type=1327 audit(1734056791.752:1946): proctitle=737368643A20636F7265205B707269765D
Dec 13 02:26:31.775058 systemd[1]: Started session-27.scope.
Dec 13 02:26:31.776231 systemd-logind[1722]: New session 27 of user core.
Dec 13 02:26:31.787000 audit[7327]: USER_START pid=7327 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:31.794257 kernel: audit: type=1105 audit(1734056791.787:1947): pid=7327 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:31.793000 audit[7329]: CRED_ACQ pid=7329 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:31.799456 kernel: audit: type=1103 audit(1734056791.793:1948): pid=7329 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:32.123024 sshd[7327]: pam_unix(sshd:session): session closed for user core
Dec 13 02:26:32.124000 audit[7327]: USER_END pid=7327 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:32.132593 kernel: audit: type=1106 audit(1734056792.124:1949): pid=7327 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:32.132722 kernel: audit: type=1104 audit(1734056792.124:1950): pid=7327 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:32.124000 audit[7327]: CRED_DISP pid=7327 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Dec 13 02:26:32.130611 systemd[1]: sshd@26-172.31.27.10:22-139.178.68.195:60662.service: Deactivated successfully.
Dec 13 02:26:32.131913 systemd[1]: session-27.scope: Deactivated successfully.
Dec 13 02:26:32.134942 systemd-logind[1722]: Session 27 logged out. Waiting for processes to exit.
Dec 13 02:26:32.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.27.10:22-139.178.68.195:60662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:26:32.136655 systemd-logind[1722]: Removed session 27.
Dec 13 02:26:41.434885 kernel: kauditd_printk_skb: 1 callbacks suppressed
Dec 13 02:26:41.435129 kernel: audit: type=1400 audit(1734056801.427:1952): avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.427000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.427000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.445168 kernel: audit: type=1400 audit(1734056801.427:1952): avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.445387 kernel: audit: type=1400 audit(1734056801.427:1952): avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.427000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.427000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.450183 kernel: audit: type=1400 audit(1734056801.427:1952): avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.427000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.458658 kernel: audit: type=1400 audit(1734056801.427:1952): avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.458791 kernel: audit: type=1400 audit(1734056801.427:1952): avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.427000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.462551 kernel: audit: type=1400 audit(1734056801.427:1952): avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.427000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.466471 kernel: audit: type=1400 audit(1734056801.427:1952): avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.427000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.427000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.472724 kernel: audit: type=1400 audit(1734056801.427:1952): avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.472844 kernel: audit: type=1334 audit(1734056801.427:1952): prog-id=257 op=LOAD
Dec 13 02:26:41.427000 audit: BPF prog-id=257 op=LOAD
Dec 13 02:26:41.427000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc36e81610 a2=98 a3=3 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.427000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.433000 audit: BPF prog-id=257 op=UNLOAD
Dec 13 02:26:41.434000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.434000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.434000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.434000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.434000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.434000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.434000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.434000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.434000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.434000 audit: BPF prog-id=258 op=LOAD
Dec 13 02:26:41.434000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc36e813f0 a2=74 a3=540051 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.434000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.434000 audit: BPF prog-id=258 op=UNLOAD
Dec 13 02:26:41.434000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.434000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.434000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.434000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.434000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.434000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.434000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.434000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.434000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.434000 audit: BPF prog-id=259 op=LOAD
Dec 13 02:26:41.434000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc36e81420 a2=94 a3=2 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.434000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.438000 audit: BPF prog-id=259 op=UNLOAD
Dec 13 02:26:41.617000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.617000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.617000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.617000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.617000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.617000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.617000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.617000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.617000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.617000 audit: BPF prog-id=260 op=LOAD
Dec 13 02:26:41.617000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc36e812e0 a2=40 a3=1 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.617000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.618000 audit: BPF prog-id=260 op=UNLOAD
Dec 13 02:26:41.618000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.618000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc36e813b0 a2=50 a3=7ffc36e81490 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.618000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.630000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.630000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc36e812f0 a2=28 a3=0 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.630000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.630000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.630000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc36e81320 a2=28 a3=0 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.630000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.630000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.630000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc36e81230 a2=28 a3=0 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.630000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.630000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.630000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc36e81340 a2=28 a3=0 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.630000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.631000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.631000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc36e81320 a2=28 a3=0 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.631000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.631000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.631000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc36e81310 a2=28 a3=0 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.631000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.631000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.631000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc36e81340 a2=28 a3=0 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.631000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.631000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.631000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc36e81320 a2=28 a3=0 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.631000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc36e81340 a2=28 a3=0 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.632000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc36e81310 a2=28 a3=0 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.632000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc36e81380 a2=28 a3=0 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.632000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc36e81130 a2=50 a3=1 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.632000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit: BPF prog-id=261 op=LOAD
Dec 13 02:26:41.632000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc36e81130 a2=94 a3=5 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.632000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.632000 audit: BPF prog-id=261 op=UNLOAD
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc36e811e0 a2=50 a3=1 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.632000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc36e81300 a2=4 a3=38 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.632000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.632000 audit[7401]: AVC avc:  denied  { confidentiality } for  pid=7401 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:26:41.632000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc36e81350 a2=94 a3=6 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.632000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { confidentiality } for  pid=7401 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:26:41.633000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc36e80b00 a2=94 a3=83 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.633000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { perfmon } for  pid=7401 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { bpf } for  pid=7401 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.633000 audit[7401]: AVC avc:  denied  { confidentiality } for  pid=7401 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:26:41.633000 audit[7401]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc36e80b00 a2=94 a3=83 items=0 ppid=7387 pid=7401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.633000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit: BPF prog-id=262 op=LOAD
Dec 13 02:26:41.636000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd9096c8d0 a2=98 a3=3 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.636000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.636000 audit: BPF prog-id=262 op=UNLOAD
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit: BPF prog-id=263 op=LOAD
Dec 13 02:26:41.636000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd9096c6b0 a2=74 a3=540051 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.636000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.636000 audit: BPF prog-id=263 op=UNLOAD
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.636000 audit: BPF prog-id=264 op=LOAD
Dec 13 02:26:41.636000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd9096c6e0 a2=94 a3=2 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.636000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.636000 audit: BPF prog-id=264 op=UNLOAD
Dec 13 02:26:41.771000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.771000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.771000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.771000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.771000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.771000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.771000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.771000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.771000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.771000 audit: BPF prog-id=265 op=LOAD
Dec 13 02:26:41.771000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd9096c5a0 a2=40 a3=1 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.771000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.771000 audit: BPF prog-id=265 op=UNLOAD
Dec 13 02:26:41.771000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.771000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd9096c670 a2=50 a3=7ffd9096c750 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.771000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.783000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.783000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9096c5b0 a2=28 a3=0 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.783000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9096c5e0 a2=28 a3=0 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.784000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9096c4f0 a2=28 a3=0 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.784000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9096c600 a2=28 a3=0 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.784000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9096c5e0 a2=28 a3=0 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.784000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9096c5d0 a2=28 a3=0 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.784000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9096c600 a2=28 a3=0 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.784000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9096c5e0 a2=28 a3=0 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.784000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9096c600 a2=28 a3=0 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.784000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd9096c5d0 a2=28 a3=0 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.784000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9096c640 a2=28 a3=0 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.784000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd9096c3f0 a2=50 a3=1 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.784000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit: BPF prog-id=266 op=LOAD
Dec 13 02:26:41.784000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd9096c3f0 a2=94 a3=5 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.784000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.784000 audit: BPF prog-id=266 op=UNLOAD
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd9096c4a0 a2=50 a3=1 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.784000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd9096c5c0 a2=4 a3=38 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.784000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.784000 audit[7408]: AVC avc:  denied  { confidentiality } for  pid=7408 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:26:41.784000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd9096c610 a2=94 a3=6 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.784000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.785000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.785000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.785000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.785000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.785000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.785000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.785000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.785000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.785000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.785000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.785000 audit[7408]: AVC avc:  denied  { confidentiality } for  pid=7408 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:26:41.785000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd9096bdc0 a2=94 a3=83 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.785000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.785000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.785000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.785000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.785000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.785000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.785000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.785000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.785000 audit[7408]: AVC avc:  denied  { perfmon } for  pid=7408 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.785000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd9096bdc0 a2=94 a3=83 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.785000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.786000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.786000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=0 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.786000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.786000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.786000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=3d items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.786000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.786000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.786000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=41 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.786000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.786000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.786000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=45 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.786000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.786000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.786000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=49 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.786000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.787000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.787000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=4d items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.787000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.787000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.787000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=51 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.787000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.787000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.787000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=52 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.787000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.787000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.787000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=53 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.787000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.787000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.787000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=54 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.787000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.787000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.787000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=55 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.787000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.787000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.787000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=56 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.787000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.787000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.787000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=57 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.787000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.787000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.787000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=58 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.787000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.787000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.787000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=59 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.787000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.787000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.787000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=5a items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.787000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.787000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.787000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=5b items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.787000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.787000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.787000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=5c items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.787000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.787000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.787000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=5d items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.787000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.787000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.787000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=5e items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.787000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.787000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.787000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=5f items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.787000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.788000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.788000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=60 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.788000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.788000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=61 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.788000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.788000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=62 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.788000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.788000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=63 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.788000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.788000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=64 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.788000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.788000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=65 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.788000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.788000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=66 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.788000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.788000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=67 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.788000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.788000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=6a items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.788000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.788000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=6d items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.788000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.788000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=6e items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.788000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.788000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=71 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.788000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.788000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=72 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.788000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.788000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=75 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.788000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.788000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=7a items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.788000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.788000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=7d items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.788000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.788000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=8a items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.788000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.788000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=8b items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.789000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.789000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=8e items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.789000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.789000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.789000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=92 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.789000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.789000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.789000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=95 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.789000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.789000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.789000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=9b items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.789000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.789000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.789000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=9e items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.789000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.789000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.789000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=aa items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.789000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.789000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.789000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=ad items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.789000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.789000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.789000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=ae items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.789000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.789000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.789000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=b1 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.789000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.790000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.790000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=b4 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.790000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.790000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=b5 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.790000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.790000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=b8 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.790000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.790000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=b9 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.790000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.790000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=bc items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.790000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.790000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=c3 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.790000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.790000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=c4 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.790000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.790000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=c7 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.790000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.790000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=c8 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.790000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.790000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=cb items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.790000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.790000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=d0 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.791000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.791000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=d3 items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.791000 audit[7408]: AVC avc:  denied  { bpf } for  pid=7408 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.791000 audit[7408]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9096d800 a2=10 a3=fd items=0 ppid=7387 pid=7408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E
Dec 13 02:26:41.833000 audit[7411]: AVC avc:  denied  { bpf } for  pid=7411 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.833000 audit[7411]: AVC avc:  denied  { bpf } for  pid=7411 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.833000 audit[7411]: AVC avc:  denied  { perfmon } for  pid=7411 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.833000 audit[7411]: AVC avc:  denied  { perfmon } for  pid=7411 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.833000 audit[7411]: AVC avc:  denied  { perfmon } for  pid=7411 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.833000 audit[7411]: AVC avc:  denied  { perfmon } for  pid=7411 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.833000 audit[7411]: AVC avc:  denied  { perfmon } for  pid=7411 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.833000 audit[7411]: AVC avc:  denied  { bpf } for  pid=7411 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.833000 audit[7411]: AVC avc:  denied  { bpf } for  pid=7411 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.833000 audit: BPF prog-id=267 op=LOAD
Dec 13 02:26:41.833000 audit[7411]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcc4677b80 a2=98 a3=1999999999999999 items=0 ppid=7387 pid=7411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.833000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F
Dec 13 02:26:41.833000 audit: BPF prog-id=267 op=UNLOAD
Dec 13 02:26:41.833000 audit[7411]: AVC avc:  denied  { bpf } for  pid=7411 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.833000 audit[7411]: AVC avc:  denied  { bpf } for  pid=7411 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.833000 audit[7411]: AVC avc:  denied  { perfmon } for  pid=7411 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.833000 audit[7411]: AVC avc:  denied  { perfmon } for  pid=7411 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.833000 audit[7411]: AVC avc:  denied  { perfmon } for  pid=7411 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.833000 audit[7411]: AVC avc:  denied  { perfmon } for  pid=7411 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.833000 audit[7411]: AVC avc:  denied  { perfmon } for  pid=7411 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.833000 audit[7411]: AVC avc:  denied  { bpf } for  pid=7411 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.833000 audit[7411]: AVC avc:  denied  { bpf } for  pid=7411 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.833000 audit: BPF prog-id=268 op=LOAD
Dec 13 02:26:41.833000 audit[7411]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcc4677a60 a2=74 a3=ffff items=0 ppid=7387 pid=7411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.833000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F
Dec 13 02:26:41.834000 audit: BPF prog-id=268 op=UNLOAD
Dec 13 02:26:41.834000 audit[7411]: AVC avc:  denied  { bpf } for  pid=7411 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.834000 audit[7411]: AVC avc:  denied  { bpf } for  pid=7411 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.834000 audit[7411]: AVC avc:  denied  { perfmon } for  pid=7411 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.834000 audit[7411]: AVC avc:  denied  { perfmon } for  pid=7411 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.834000 audit[7411]: AVC avc:  denied  { perfmon } for  pid=7411 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.834000 audit[7411]: AVC avc:  denied  { perfmon } for  pid=7411 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.834000 audit[7411]: AVC avc:  denied  { perfmon } for  pid=7411 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.834000 audit[7411]: AVC avc:  denied  { bpf } for  pid=7411 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.834000 audit[7411]: AVC avc:  denied  { bpf } for  pid=7411 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:26:41.834000 audit: BPF prog-id=269 op=LOAD
Dec 13 02:26:41.834000 audit[7411]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcc4677aa0 a2=40 a3=7ffcc4677c80 items=0 ppid=7387 pid=7411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:26:41.834000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F
Dec 13 02:26:41.834000 audit: BPF prog-id=269 op=UNLOAD
Dec 13 02:26:43.524362 systemd[1]: run-containerd-runc-k8s.io-3e11a955fb5e18929d956b1216efbbe8b1f4f44c3031d7e0774805246bb5497f-runc.bQXVvA.mount: Deactivated successfully.
Dec 13 02:26:57.468608 systemd[1]: run-containerd-runc-k8s.io-d53caf9c9744f5b12fb6a51542aae0a0ce4d998f225f9e62e7d54a5e8ef24828-runc.neMYnU.mount: Deactivated successfully.
Dec 13 02:27:05.140940 kernel: kauditd_printk_skb: 516 callbacks suppressed
Dec 13 02:27:05.141473 kernel: audit: type=1400 audit(1734056825.132:2075): avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:27:05.141639 kernel: audit: type=1300 audit(1734056825.132:2075): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00105d6b0 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:27:05.132000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:27:05.132000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00105d6b0 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:27:05.132000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:27:05.154424 kernel: audit: type=1327 audit(1734056825.132:2075): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:27:05.132000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:27:05.160729 kernel: audit: type=1400 audit(1734056825.132:2076): avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:27:05.160869 kernel: audit: type=1300 audit(1734056825.132:2076): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000db11e0 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:27:05.132000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000db11e0 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:27:05.132000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:27:05.173208 kernel: audit: type=1327 audit(1734056825.132:2076): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:27:06.323000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:27:06.330172 kernel: audit: type=1400 audit(1734056826.323:2078): avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:27:06.323000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:27:06.335170 kernel: audit: type=1400 audit(1734056826.323:2077): avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:27:06.323000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0118ef290 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:27:06.342184 kernel: audit: type=1300 audit(1734056826.323:2077): arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0118ef290 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:27:06.323000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:27:06.352214 kernel: audit: type=1327 audit(1734056826.323:2077): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:27:06.323000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:27:06.323000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0085f7ee0 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:27:06.323000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:27:06.325000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:27:06.325000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0118efb30 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:27:06.325000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:27:06.323000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c009cc5800 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:27:06.323000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:27:06.338000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:27:06.338000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c010b7e060 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:27:06.338000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:27:06.340000 audit[2455]: AVC avc:  denied  { watch } for  pid=2455 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:27:06.340000 audit[2455]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0114c63c0 a2=fc6 a3=0 items=0 ppid=2322 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c435 key=(null)
Dec 13 02:27:06.340000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Dec 13 02:27:07.911000 audit[4886]: AVC avc:  denied  { watch } for  pid=4886 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_24_36.2381904809/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c176,c639 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c176,c639 tclass=file permissive=0
Dec 13 02:27:07.911000 audit[4886]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f26120 a2=fc6 a3=0 items=0 ppid=4617 pid=4886 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c176,c639 key=(null)
Dec 13 02:27:07.911000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274
Dec 13 02:27:10.452229 kernel: kauditd_printk_skb: 17 callbacks suppressed
Dec 13 02:27:10.452421 kernel: audit: type=1400 audit(1734056830.443:2084): avc:  denied  { watch } for  pid=4921 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_24_36.1409813258/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c456 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c15,c456 tclass=file permissive=0
Dec 13 02:27:10.443000 audit[4921]: AVC avc:  denied  { watch } for  pid=4921 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_24_36.1409813258/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c456 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c15,c456 tclass=file permissive=0
Dec 13 02:27:10.443000 audit[4921]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002263040 a2=fc6 a3=0 items=0 ppid=4708 pid=4921 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c456 key=(null)
Dec 13 02:27:10.460579 kernel: audit: type=1300 audit(1734056830.443:2084): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002263040 a2=fc6 a3=0 items=0 ppid=4708 pid=4921 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c456 key=(null)
Dec 13 02:27:10.460726 kernel: audit: type=1327 audit(1734056830.443:2084): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274
Dec 13 02:27:10.443000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274
Dec 13 02:27:10.751000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:27:10.751000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c8e8e0 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:27:10.764892 kernel: audit: type=1400 audit(1734056830.751:2085): avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:27:10.765031 kernel: audit: type=1300 audit(1734056830.751:2085): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c8e8e0 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:27:10.765066 kernel: audit: type=1327 audit(1734056830.751:2085): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:27:10.751000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:27:10.755000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:27:10.775013 kernel: audit: type=1400 audit(1734056830.755:2086): avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:27:10.775161 kernel: audit: type=1300 audit(1734056830.755:2086): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c8e960 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:27:10.755000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c8e960 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:27:10.755000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:27:10.786784 kernel: audit: type=1327 audit(1734056830.755:2086): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:27:10.786914 kernel: audit: type=1400 audit(1734056830.756:2087): avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:27:10.756000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:27:10.756000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000db17e0 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:27:10.756000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:27:10.774000 audit[2493]: AVC avc:  denied  { watch } for  pid=2493 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:27:10.774000 audit[2493]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000db1a00 a2=fc6 a3=0 items=0 ppid=2351 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:27:10.774000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:27:13.573955 systemd[1]: run-containerd-runc-k8s.io-3e11a955fb5e18929d956b1216efbbe8b1f4f44c3031d7e0774805246bb5497f-runc.LV44q3.mount: Deactivated successfully.
Dec 13 02:27:19.930446 systemd[1]: cri-containerd-2f7b442b3bbe88c89286e91ceb392c9707737214968eb593c4073b575f048792.scope: Deactivated successfully.
Dec 13 02:27:19.930805 systemd[1]: cri-containerd-2f7b442b3bbe88c89286e91ceb392c9707737214968eb593c4073b575f048792.scope: Consumed 4.093s CPU time.
Dec 13 02:27:19.935000 audit: BPF prog-id=77 op=UNLOAD
Dec 13 02:27:19.936388 kernel: kauditd_printk_skb: 5 callbacks suppressed
Dec 13 02:27:19.936497 kernel: audit: type=1334 audit(1734056839.935:2089): prog-id=77 op=UNLOAD
Dec 13 02:27:19.935000 audit: BPF prog-id=100 op=UNLOAD
Dec 13 02:27:19.939179 kernel: audit: type=1334 audit(1734056839.935:2090): prog-id=100 op=UNLOAD
Dec 13 02:27:19.966578 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2f7b442b3bbe88c89286e91ceb392c9707737214968eb593c4073b575f048792-rootfs.mount: Deactivated successfully.
Dec 13 02:27:19.975524 env[1728]: time="2024-12-13T02:27:19.975350252Z" level=info msg="shim disconnected" id=2f7b442b3bbe88c89286e91ceb392c9707737214968eb593c4073b575f048792
Dec 13 02:27:19.975524 env[1728]: time="2024-12-13T02:27:19.975516828Z" level=warning msg="cleaning up after shim disconnected" id=2f7b442b3bbe88c89286e91ceb392c9707737214968eb593c4073b575f048792 namespace=k8s.io
Dec 13 02:27:19.976109 env[1728]: time="2024-12-13T02:27:19.975536886Z" level=info msg="cleaning up dead shim"
Dec 13 02:27:20.011118 env[1728]: time="2024-12-13T02:27:20.011062918Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:27:19Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7967 runtime=io.containerd.runc.v2\n"
Dec 13 02:27:20.116887 kubelet[2727]: I1213 02:27:20.116832    2727 scope.go:117] "RemoveContainer" containerID="2f7b442b3bbe88c89286e91ceb392c9707737214968eb593c4073b575f048792"
Dec 13 02:27:20.119524 env[1728]: time="2024-12-13T02:27:20.119473987Z" level=info msg="CreateContainer within sandbox \"048828b9415bd188065c1759f7e077d9bf0c33dcd9767221ab1620f94df2228f\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}"
Dec 13 02:27:20.159621 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount880291003.mount: Deactivated successfully.
Dec 13 02:27:20.169251 env[1728]: time="2024-12-13T02:27:20.169193585Z" level=info msg="CreateContainer within sandbox \"048828b9415bd188065c1759f7e077d9bf0c33dcd9767221ab1620f94df2228f\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"83320f6fbb4e087e998e6bb6e7fbd8a090a4d54a42e389a53f15a07f143758c5\""
Dec 13 02:27:20.169819 env[1728]: time="2024-12-13T02:27:20.169781233Z" level=info msg="StartContainer for \"83320f6fbb4e087e998e6bb6e7fbd8a090a4d54a42e389a53f15a07f143758c5\""
Dec 13 02:27:20.252946 systemd[1]: Started cri-containerd-83320f6fbb4e087e998e6bb6e7fbd8a090a4d54a42e389a53f15a07f143758c5.scope.
Dec 13 02:27:20.281848 kernel: audit: type=1400 audit(1734056840.274:2091): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.282012 kernel: audit: type=1400 audit(1734056840.274:2092): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.274000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.274000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.274000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.274000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.290180 kernel: audit: type=1400 audit(1734056840.274:2093): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.290314 kernel: audit: type=1400 audit(1734056840.274:2094): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.290359 kernel: audit: type=1400 audit(1734056840.274:2095): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.274000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.274000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.300334 kernel: audit: type=1400 audit(1734056840.274:2096): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.300480 kernel: audit: type=1400 audit(1734056840.274:2097): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.274000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.304528 kernel: audit: type=1400 audit(1734056840.274:2098): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.274000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.274000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.278000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.278000 audit: BPF prog-id=270 op=LOAD
Dec 13 02:27:20.278000 audit[7986]: AVC avc:  denied  { bpf } for  pid=7986 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.278000 audit[7986]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000195c48 a2=10 a3=1c items=0 ppid=2351 pid=7986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:27:20.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833333230663666626234653038376539393865366262366537666264
Dec 13 02:27:20.278000 audit[7986]: AVC avc:  denied  { perfmon } for  pid=7986 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.278000 audit[7986]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001956b0 a2=3c a3=8 items=0 ppid=2351 pid=7986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:27:20.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833333230663666626234653038376539393865366262366537666264
Dec 13 02:27:20.278000 audit[7986]: AVC avc:  denied  { bpf } for  pid=7986 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.278000 audit[7986]: AVC avc:  denied  { bpf } for  pid=7986 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.278000 audit[7986]: AVC avc:  denied  { bpf } for  pid=7986 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.278000 audit[7986]: AVC avc:  denied  { perfmon } for  pid=7986 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.278000 audit[7986]: AVC avc:  denied  { perfmon } for  pid=7986 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.278000 audit[7986]: AVC avc:  denied  { perfmon } for  pid=7986 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.278000 audit[7986]: AVC avc:  denied  { perfmon } for  pid=7986 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.278000 audit[7986]: AVC avc:  denied  { perfmon } for  pid=7986 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.278000 audit[7986]: AVC avc:  denied  { bpf } for  pid=7986 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.278000 audit[7986]: AVC avc:  denied  { bpf } for  pid=7986 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.278000 audit: BPF prog-id=271 op=LOAD
Dec 13 02:27:20.278000 audit[7986]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001959d8 a2=78 a3=c00032b150 items=0 ppid=2351 pid=7986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:27:20.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833333230663666626234653038376539393865366262366537666264
Dec 13 02:27:20.281000 audit[7986]: AVC avc:  denied  { bpf } for  pid=7986 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.281000 audit[7986]: AVC avc:  denied  { bpf } for  pid=7986 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.281000 audit[7986]: AVC avc:  denied  { perfmon } for  pid=7986 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.281000 audit[7986]: AVC avc:  denied  { perfmon } for  pid=7986 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.281000 audit[7986]: AVC avc:  denied  { perfmon } for  pid=7986 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.281000 audit[7986]: AVC avc:  denied  { perfmon } for  pid=7986 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.281000 audit[7986]: AVC avc:  denied  { perfmon } for  pid=7986 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.281000 audit[7986]: AVC avc:  denied  { bpf } for  pid=7986 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.281000 audit[7986]: AVC avc:  denied  { bpf } for  pid=7986 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.281000 audit: BPF prog-id=272 op=LOAD
Dec 13 02:27:20.281000 audit[7986]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000195770 a2=78 a3=c00032b198 items=0 ppid=2351 pid=7986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:27:20.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833333230663666626234653038376539393865366262366537666264
Dec 13 02:27:20.281000 audit: BPF prog-id=272 op=UNLOAD
Dec 13 02:27:20.281000 audit: BPF prog-id=271 op=UNLOAD
Dec 13 02:27:20.281000 audit[7986]: AVC avc:  denied  { bpf } for  pid=7986 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.281000 audit[7986]: AVC avc:  denied  { bpf } for  pid=7986 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.281000 audit[7986]: AVC avc:  denied  { bpf } for  pid=7986 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.281000 audit[7986]: AVC avc:  denied  { perfmon } for  pid=7986 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.281000 audit[7986]: AVC avc:  denied  { perfmon } for  pid=7986 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.281000 audit[7986]: AVC avc:  denied  { perfmon } for  pid=7986 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.281000 audit[7986]: AVC avc:  denied  { perfmon } for  pid=7986 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.281000 audit[7986]: AVC avc:  denied  { perfmon } for  pid=7986 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.281000 audit[7986]: AVC avc:  denied  { bpf } for  pid=7986 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.281000 audit[7986]: AVC avc:  denied  { bpf } for  pid=7986 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:20.281000 audit: BPF prog-id=273 op=LOAD
Dec 13 02:27:20.281000 audit[7986]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000195c30 a2=78 a3=c00032b5a8 items=0 ppid=2351 pid=7986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:27:20.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833333230663666626234653038376539393865366262366537666264
Dec 13 02:27:20.348181 env[1728]: time="2024-12-13T02:27:20.348089131Z" level=info msg="StartContainer for \"83320f6fbb4e087e998e6bb6e7fbd8a090a4d54a42e389a53f15a07f143758c5\" returns successfully"
Dec 13 02:27:20.792929 systemd[1]: cri-containerd-62d08311b598f0a00ada6bec0ff74cc753abfce4b93e6ca58fdb60200172eeb1.scope: Deactivated successfully.
Dec 13 02:27:20.794000 audit: BPF prog-id=114 op=UNLOAD
Dec 13 02:27:20.794309 systemd[1]: cri-containerd-62d08311b598f0a00ada6bec0ff74cc753abfce4b93e6ca58fdb60200172eeb1.scope: Consumed 8.501s CPU time.
Dec 13 02:27:20.799000 audit: BPF prog-id=117 op=UNLOAD
Dec 13 02:27:20.845992 env[1728]: time="2024-12-13T02:27:20.845809926Z" level=info msg="shim disconnected" id=62d08311b598f0a00ada6bec0ff74cc753abfce4b93e6ca58fdb60200172eeb1
Dec 13 02:27:20.846282 env[1728]: time="2024-12-13T02:27:20.845994776Z" level=warning msg="cleaning up after shim disconnected" id=62d08311b598f0a00ada6bec0ff74cc753abfce4b93e6ca58fdb60200172eeb1 namespace=k8s.io
Dec 13 02:27:20.846282 env[1728]: time="2024-12-13T02:27:20.846011659Z" level=info msg="cleaning up dead shim"
Dec 13 02:27:20.880922 env[1728]: time="2024-12-13T02:27:20.880865888Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:27:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=8027 runtime=io.containerd.runc.v2\n"
Dec 13 02:27:20.967827 systemd[1]: run-containerd-runc-k8s.io-83320f6fbb4e087e998e6bb6e7fbd8a090a4d54a42e389a53f15a07f143758c5-runc.xGGKsR.mount: Deactivated successfully.
Dec 13 02:27:20.968486 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-62d08311b598f0a00ada6bec0ff74cc753abfce4b93e6ca58fdb60200172eeb1-rootfs.mount: Deactivated successfully.
Dec 13 02:27:21.127824 kubelet[2727]: I1213 02:27:21.127713    2727 scope.go:117] "RemoveContainer" containerID="62d08311b598f0a00ada6bec0ff74cc753abfce4b93e6ca58fdb60200172eeb1"
Dec 13 02:27:21.153332 env[1728]: time="2024-12-13T02:27:21.153281116Z" level=info msg="CreateContainer within sandbox \"e6ab6c94821a6fc4dd20090004c5836a34a8e6bb15c06c26d592e1de8a1c4220\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}"
Dec 13 02:27:21.186813 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3470516161.mount: Deactivated successfully.
Dec 13 02:27:21.209827 env[1728]: time="2024-12-13T02:27:21.209635919Z" level=info msg="CreateContainer within sandbox \"e6ab6c94821a6fc4dd20090004c5836a34a8e6bb15c06c26d592e1de8a1c4220\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"3b89bb2d3777504db8885b21b18fcfb1d454cee3f3f1332e13c68ce390c0b5de\""
Dec 13 02:27:21.210661 env[1728]: time="2024-12-13T02:27:21.210629802Z" level=info msg="StartContainer for \"3b89bb2d3777504db8885b21b18fcfb1d454cee3f3f1332e13c68ce390c0b5de\""
Dec 13 02:27:21.274207 systemd[1]: Started cri-containerd-3b89bb2d3777504db8885b21b18fcfb1d454cee3f3f1332e13c68ce390c0b5de.scope.
Dec 13 02:27:21.314000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.314000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.314000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.314000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.314000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.314000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.314000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.314000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.314000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.314000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.314000 audit: BPF prog-id=274 op=LOAD
Dec 13 02:27:21.316000 audit[8048]: AVC avc:  denied  { bpf } for  pid=8048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.316000 audit[8048]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2825 pid=8048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:27:21.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362383962623264333737373530346462383838356232316231386663
Dec 13 02:27:21.319000 audit[8048]: AVC avc:  denied  { perfmon } for  pid=8048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.319000 audit[8048]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2825 pid=8048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:27:21.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362383962623264333737373530346462383838356232316231386663
Dec 13 02:27:21.319000 audit[8048]: AVC avc:  denied  { bpf } for  pid=8048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.319000 audit[8048]: AVC avc:  denied  { bpf } for  pid=8048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.319000 audit[8048]: AVC avc:  denied  { bpf } for  pid=8048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.319000 audit[8048]: AVC avc:  denied  { perfmon } for  pid=8048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.319000 audit[8048]: AVC avc:  denied  { perfmon } for  pid=8048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.319000 audit[8048]: AVC avc:  denied  { perfmon } for  pid=8048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.319000 audit[8048]: AVC avc:  denied  { perfmon } for  pid=8048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.319000 audit[8048]: AVC avc:  denied  { perfmon } for  pid=8048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.319000 audit[8048]: AVC avc:  denied  { bpf } for  pid=8048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.319000 audit[8048]: AVC avc:  denied  { bpf } for  pid=8048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.319000 audit: BPF prog-id=275 op=LOAD
Dec 13 02:27:21.319000 audit[8048]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002937e0 items=0 ppid=2825 pid=8048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:27:21.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362383962623264333737373530346462383838356232316231386663
Dec 13 02:27:21.321000 audit[8048]: AVC avc:  denied  { bpf } for  pid=8048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.321000 audit[8048]: AVC avc:  denied  { bpf } for  pid=8048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.321000 audit[8048]: AVC avc:  denied  { perfmon } for  pid=8048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.321000 audit[8048]: AVC avc:  denied  { perfmon } for  pid=8048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.321000 audit[8048]: AVC avc:  denied  { perfmon } for  pid=8048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.321000 audit[8048]: AVC avc:  denied  { perfmon } for  pid=8048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.321000 audit[8048]: AVC avc:  denied  { perfmon } for  pid=8048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.321000 audit[8048]: AVC avc:  denied  { bpf } for  pid=8048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.321000 audit[8048]: AVC avc:  denied  { bpf } for  pid=8048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.321000 audit: BPF prog-id=276 op=LOAD
Dec 13 02:27:21.321000 audit[8048]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000293828 items=0 ppid=2825 pid=8048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:27:21.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362383962623264333737373530346462383838356232316231386663
Dec 13 02:27:21.323000 audit: BPF prog-id=276 op=UNLOAD
Dec 13 02:27:21.323000 audit: BPF prog-id=275 op=UNLOAD
Dec 13 02:27:21.323000 audit[8048]: AVC avc:  denied  { bpf } for  pid=8048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.323000 audit[8048]: AVC avc:  denied  { bpf } for  pid=8048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.323000 audit[8048]: AVC avc:  denied  { bpf } for  pid=8048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.323000 audit[8048]: AVC avc:  denied  { perfmon } for  pid=8048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.323000 audit[8048]: AVC avc:  denied  { perfmon } for  pid=8048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.323000 audit[8048]: AVC avc:  denied  { perfmon } for  pid=8048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.323000 audit[8048]: AVC avc:  denied  { perfmon } for  pid=8048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.323000 audit[8048]: AVC avc:  denied  { perfmon } for  pid=8048 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.323000 audit[8048]: AVC avc:  denied  { bpf } for  pid=8048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.323000 audit[8048]: AVC avc:  denied  { bpf } for  pid=8048 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:21.323000 audit: BPF prog-id=277 op=LOAD
Dec 13 02:27:21.323000 audit[8048]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000293c38 items=0 ppid=2825 pid=8048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:27:21.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362383962623264333737373530346462383838356232316231386663
Dec 13 02:27:21.352626 env[1728]: time="2024-12-13T02:27:21.352569677Z" level=info msg="StartContainer for \"3b89bb2d3777504db8885b21b18fcfb1d454cee3f3f1332e13c68ce390c0b5de\" returns successfully"
Dec 13 02:27:22.400000 audit[7997]: AVC avc:  denied  { watch } for  pid=7997 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:27:22.400000 audit[7997]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00057c930 a2=fc6 a3=0 items=0 ppid=2351 pid=7997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:27:22.400000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:27:22.400000 audit[7997]: AVC avc:  denied  { watch } for  pid=7997 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Dec 13 02:27:22.400000 audit[7997]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00013e100 a2=fc6 a3=0 items=0 ppid=2351 pid=7997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c714,c816 key=(null)
Dec 13 02:27:22.400000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Dec 13 02:27:25.486199 systemd[1]: cri-containerd-af09e791290d37ecad94607081fc685227a7edfc0c844de0e204cb6c5654899a.scope: Deactivated successfully.
Dec 13 02:27:25.487576 systemd[1]: cri-containerd-af09e791290d37ecad94607081fc685227a7edfc0c844de0e204cb6c5654899a.scope: Consumed 1.946s CPU time.
Dec 13 02:27:25.501955 kernel: kauditd_printk_skb: 114 callbacks suppressed
Dec 13 02:27:25.502122 kernel: audit: type=1334 audit(1734056845.494:2131): prog-id=81 op=UNLOAD
Dec 13 02:27:25.502183 kernel: audit: type=1334 audit(1734056845.494:2132): prog-id=89 op=UNLOAD
Dec 13 02:27:25.494000 audit: BPF prog-id=81 op=UNLOAD
Dec 13 02:27:25.494000 audit: BPF prog-id=89 op=UNLOAD
Dec 13 02:27:25.536314 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-af09e791290d37ecad94607081fc685227a7edfc0c844de0e204cb6c5654899a-rootfs.mount: Deactivated successfully.
Dec 13 02:27:25.540628 env[1728]: time="2024-12-13T02:27:25.540578744Z" level=info msg="shim disconnected" id=af09e791290d37ecad94607081fc685227a7edfc0c844de0e204cb6c5654899a
Dec 13 02:27:25.541013 env[1728]: time="2024-12-13T02:27:25.540629756Z" level=warning msg="cleaning up after shim disconnected" id=af09e791290d37ecad94607081fc685227a7edfc0c844de0e204cb6c5654899a namespace=k8s.io
Dec 13 02:27:25.541013 env[1728]: time="2024-12-13T02:27:25.540642314Z" level=info msg="cleaning up dead shim"
Dec 13 02:27:25.564419 env[1728]: time="2024-12-13T02:27:25.564339474Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:27:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=8092 runtime=io.containerd.runc.v2\n"
Dec 13 02:27:26.036845 kubelet[2727]: E1213 02:27:26.036779    2727 controller.go:195] "Failed to update lease" err="Put \"https://172.31.27.10:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-10?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"
Dec 13 02:27:26.150203 kubelet[2727]: I1213 02:27:26.150171    2727 scope.go:117] "RemoveContainer" containerID="af09e791290d37ecad94607081fc685227a7edfc0c844de0e204cb6c5654899a"
Dec 13 02:27:26.153011 env[1728]: time="2024-12-13T02:27:26.152959519Z" level=info msg="CreateContainer within sandbox \"9aed8d1d4dfb0ff770774ad18be88b9ac6a550b5e31e92e609703d51be2cf8f4\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}"
Dec 13 02:27:26.180831 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4041857748.mount: Deactivated successfully.
Dec 13 02:27:26.204157 env[1728]: time="2024-12-13T02:27:26.204039625Z" level=info msg="CreateContainer within sandbox \"9aed8d1d4dfb0ff770774ad18be88b9ac6a550b5e31e92e609703d51be2cf8f4\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"8de6b33aa4a59c5084c6cff209ae85393c167f552a0cd87e18ccc5ac15806677\""
Dec 13 02:27:26.208047 env[1728]: time="2024-12-13T02:27:26.207992169Z" level=info msg="StartContainer for \"8de6b33aa4a59c5084c6cff209ae85393c167f552a0cd87e18ccc5ac15806677\""
Dec 13 02:27:26.265177 systemd[1]: Started cri-containerd-8de6b33aa4a59c5084c6cff209ae85393c167f552a0cd87e18ccc5ac15806677.scope.
Dec 13 02:27:26.294000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.299533 kernel: audit: type=1400 audit(1734056846.294:2133): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.294000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.305252 kernel: audit: type=1400 audit(1734056846.294:2134): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.294000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.315374 kernel: audit: type=1400 audit(1734056846.294:2135): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.315517 kernel: audit: type=1400 audit(1734056846.294:2136): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.294000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.319625 kernel: audit: type=1400 audit(1734056846.294:2137): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.294000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.324116 kernel: audit: type=1400 audit(1734056846.294:2138): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.294000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.294000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.329226 kernel: audit: type=1400 audit(1734056846.294:2139): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.294000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.334307 kernel: audit: type=1400 audit(1734056846.294:2140): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.294000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.298000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.298000 audit: BPF prog-id=278 op=LOAD
Dec 13 02:27:26.298000 audit[8113]: AVC avc:  denied  { bpf } for  pid=8113 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.298000 audit[8113]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2347 pid=8113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:27:26.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864653662333361613461353963353038346336636666323039616538
Dec 13 02:27:26.298000 audit[8113]: AVC avc:  denied  { perfmon } for  pid=8113 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.298000 audit[8113]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2347 pid=8113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:27:26.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864653662333361613461353963353038346336636666323039616538
Dec 13 02:27:26.298000 audit[8113]: AVC avc:  denied  { bpf } for  pid=8113 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.298000 audit[8113]: AVC avc:  denied  { bpf } for  pid=8113 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.298000 audit[8113]: AVC avc:  denied  { bpf } for  pid=8113 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.298000 audit[8113]: AVC avc:  denied  { perfmon } for  pid=8113 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.298000 audit[8113]: AVC avc:  denied  { perfmon } for  pid=8113 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.298000 audit[8113]: AVC avc:  denied  { perfmon } for  pid=8113 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.298000 audit[8113]: AVC avc:  denied  { perfmon } for  pid=8113 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.298000 audit[8113]: AVC avc:  denied  { perfmon } for  pid=8113 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.298000 audit[8113]: AVC avc:  denied  { bpf } for  pid=8113 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.298000 audit[8113]: AVC avc:  denied  { bpf } for  pid=8113 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.298000 audit: BPF prog-id=279 op=LOAD
Dec 13 02:27:26.298000 audit[8113]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003b63e0 items=0 ppid=2347 pid=8113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:27:26.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864653662333361613461353963353038346336636666323039616538
Dec 13 02:27:26.304000 audit[8113]: AVC avc:  denied  { bpf } for  pid=8113 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.304000 audit[8113]: AVC avc:  denied  { bpf } for  pid=8113 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.304000 audit[8113]: AVC avc:  denied  { perfmon } for  pid=8113 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.304000 audit[8113]: AVC avc:  denied  { perfmon } for  pid=8113 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.304000 audit[8113]: AVC avc:  denied  { perfmon } for  pid=8113 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.304000 audit[8113]: AVC avc:  denied  { perfmon } for  pid=8113 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.304000 audit[8113]: AVC avc:  denied  { perfmon } for  pid=8113 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.304000 audit[8113]: AVC avc:  denied  { bpf } for  pid=8113 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.304000 audit[8113]: AVC avc:  denied  { bpf } for  pid=8113 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.304000 audit: BPF prog-id=280 op=LOAD
Dec 13 02:27:26.304000 audit[8113]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003b6428 items=0 ppid=2347 pid=8113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:27:26.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864653662333361613461353963353038346336636666323039616538
Dec 13 02:27:26.304000 audit: BPF prog-id=280 op=UNLOAD
Dec 13 02:27:26.304000 audit: BPF prog-id=279 op=UNLOAD
Dec 13 02:27:26.304000 audit[8113]: AVC avc:  denied  { bpf } for  pid=8113 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.304000 audit[8113]: AVC avc:  denied  { bpf } for  pid=8113 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.304000 audit[8113]: AVC avc:  denied  { bpf } for  pid=8113 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.304000 audit[8113]: AVC avc:  denied  { perfmon } for  pid=8113 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.304000 audit[8113]: AVC avc:  denied  { perfmon } for  pid=8113 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.304000 audit[8113]: AVC avc:  denied  { perfmon } for  pid=8113 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.304000 audit[8113]: AVC avc:  denied  { perfmon } for  pid=8113 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.304000 audit[8113]: AVC avc:  denied  { perfmon } for  pid=8113 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.304000 audit[8113]: AVC avc:  denied  { bpf } for  pid=8113 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.304000 audit[8113]: AVC avc:  denied  { bpf } for  pid=8113 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:27:26.304000 audit: BPF prog-id=281 op=LOAD
Dec 13 02:27:26.304000 audit[8113]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003b6838 items=0 ppid=2347 pid=8113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:27:26.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864653662333361613461353963353038346336636666323039616538
Dec 13 02:27:26.385113 env[1728]: time="2024-12-13T02:27:26.385008401Z" level=info msg="StartContainer for \"8de6b33aa4a59c5084c6cff209ae85393c167f552a0cd87e18ccc5ac15806677\" returns successfully"
Dec 13 02:27:27.517796 systemd[1]: run-containerd-runc-k8s.io-d53caf9c9744f5b12fb6a51542aae0a0ce4d998f225f9e62e7d54a5e8ef24828-runc.F16WeI.mount: Deactivated successfully.
Dec 13 02:27:28.872107 amazon-ssm-agent[1710]: 2024-12-13 02:27:28 INFO [HealthCheck] HealthCheck reporting agent health.
Dec 13 02:27:36.037303 kubelet[2727]: E1213 02:27:36.037247    2727 controller.go:195] "Failed to update lease" err="Put \"https://172.31.27.10:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-10?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"