Oct 2 19:30:22.100416 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:30:22.100452 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:30:22.100467 kernel: BIOS-provided physical RAM map: Oct 2 19:30:22.100479 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 2 19:30:22.100490 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 2 19:30:22.100502 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 2 19:30:22.100516 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Oct 2 19:30:22.100527 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Oct 2 19:30:22.100539 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Oct 2 19:30:22.100550 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 2 19:30:22.100562 kernel: NX (Execute Disable) protection: active Oct 2 19:30:22.100574 kernel: SMBIOS 2.7 present. Oct 2 19:30:22.100585 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Oct 2 19:30:22.100597 kernel: Hypervisor detected: KVM Oct 2 19:30:22.100615 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 2 19:30:22.100628 kernel: kvm-clock: cpu 0, msr 49f8a001, primary cpu clock Oct 2 19:30:22.100641 kernel: kvm-clock: using sched offset of 6020804639 cycles Oct 2 19:30:22.100657 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 2 19:30:22.100671 kernel: tsc: Detected 2500.006 MHz processor Oct 2 19:30:22.100684 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:30:22.100700 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:30:22.100713 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Oct 2 19:30:22.100726 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:30:22.100739 kernel: Using GB pages for direct mapping Oct 2 19:30:22.100752 kernel: ACPI: Early table checksum verification disabled Oct 2 19:30:22.100765 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Oct 2 19:30:22.100778 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Oct 2 19:30:22.100790 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Oct 2 19:30:22.100802 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Oct 2 19:30:22.100817 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Oct 2 19:30:22.100829 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Oct 2 19:30:22.100842 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Oct 2 19:30:22.100855 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Oct 2 19:30:22.100869 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Oct 2 19:30:22.100882 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Oct 2 19:30:22.100895 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Oct 2 19:30:22.100908 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Oct 2 19:30:22.100924 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Oct 2 19:30:22.100937 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Oct 2 19:30:22.100951 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Oct 2 19:30:22.100970 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Oct 2 19:30:22.100984 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Oct 2 19:30:22.101016 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Oct 2 19:30:22.101030 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Oct 2 19:30:22.101047 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Oct 2 19:30:22.101062 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Oct 2 19:30:22.101076 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Oct 2 19:30:22.101090 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 2 19:30:22.101102 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 2 19:30:22.101115 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Oct 2 19:30:22.101129 kernel: NUMA: Initialized distance table, cnt=1 Oct 2 19:30:22.101143 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Oct 2 19:30:22.101161 kernel: Zone ranges: Oct 2 19:30:22.101175 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:30:22.101189 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Oct 2 19:30:22.101203 kernel: Normal empty Oct 2 19:30:22.101218 kernel: Movable zone start for each node Oct 2 19:30:22.101234 kernel: Early memory node ranges Oct 2 19:30:22.101248 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 2 19:30:22.101262 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Oct 2 19:30:22.101277 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Oct 2 19:30:22.101294 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:30:22.101308 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 2 19:30:22.101322 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Oct 2 19:30:22.101337 kernel: ACPI: PM-Timer IO Port: 0xb008 Oct 2 19:30:22.101350 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 2 19:30:22.101363 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Oct 2 19:30:22.101375 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 2 19:30:22.101387 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:30:22.101401 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 2 19:30:22.101419 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 2 19:30:22.101434 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:30:22.101449 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Oct 2 19:30:22.101464 kernel: TSC deadline timer available Oct 2 19:30:22.101479 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Oct 2 19:30:22.101494 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Oct 2 19:30:22.101509 kernel: Booting paravirtualized kernel on KVM Oct 2 19:30:22.101525 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:30:22.101540 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Oct 2 19:30:22.101559 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Oct 2 19:30:22.101572 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Oct 2 19:30:22.101586 kernel: pcpu-alloc: [0] 0 1 Oct 2 19:30:22.101600 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Oct 2 19:30:22.101614 kernel: kvm-guest: PV spinlocks enabled Oct 2 19:30:22.101628 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 2 19:30:22.101643 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Oct 2 19:30:22.101657 kernel: Policy zone: DMA32 Oct 2 19:30:22.101673 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:30:22.101692 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:30:22.101706 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 19:30:22.101721 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 2 19:30:22.101736 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:30:22.101751 kernel: Memory: 1936476K/2057760K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 121024K reserved, 0K cma-reserved) Oct 2 19:30:22.101765 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 19:30:22.101779 kernel: Kernel/User page tables isolation: enabled Oct 2 19:30:22.101793 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:30:22.101810 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:30:22.101824 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:30:22.101840 kernel: rcu: RCU event tracing is enabled. Oct 2 19:30:22.101854 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 19:30:22.101869 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:30:22.101885 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:30:22.101899 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:30:22.101913 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 19:30:22.101928 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Oct 2 19:30:22.101945 kernel: random: crng init done Oct 2 19:30:22.101958 kernel: Console: colour VGA+ 80x25 Oct 2 19:30:22.101973 kernel: printk: console [ttyS0] enabled Oct 2 19:30:22.101987 kernel: ACPI: Core revision 20210730 Oct 2 19:30:22.102011 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Oct 2 19:30:22.102026 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:30:22.102040 kernel: x2apic enabled Oct 2 19:30:22.102054 kernel: Switched APIC routing to physical x2apic. Oct 2 19:30:22.102068 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093fa6a7c, max_idle_ns: 440795295209 ns Oct 2 19:30:22.102083 kernel: Calibrating delay loop (skipped) preset value.. 5000.01 BogoMIPS (lpj=2500006) Oct 2 19:30:22.102102 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 2 19:30:22.102117 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Oct 2 19:30:22.102132 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:30:22.102159 kernel: Spectre V2 : Mitigation: Retpolines Oct 2 19:30:22.102177 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:30:22.102193 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 2 19:30:22.102209 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Oct 2 19:30:22.102225 kernel: RETBleed: Vulnerable Oct 2 19:30:22.102240 kernel: Speculative Store Bypass: Vulnerable Oct 2 19:30:22.102255 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:30:22.102270 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:30:22.102284 kernel: GDS: Unknown: Dependent on hypervisor status Oct 2 19:30:22.102299 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:30:22.102317 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:30:22.102333 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:30:22.102347 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Oct 2 19:30:22.102362 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Oct 2 19:30:22.102377 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Oct 2 19:30:22.102392 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Oct 2 19:30:22.102409 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Oct 2 19:30:22.102424 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Oct 2 19:30:22.102440 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:30:22.102455 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Oct 2 19:30:22.102470 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Oct 2 19:30:22.102484 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Oct 2 19:30:22.102499 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Oct 2 19:30:22.102514 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Oct 2 19:30:22.102528 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Oct 2 19:30:22.102543 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Oct 2 19:30:22.102558 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:30:22.102576 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:30:22.102591 kernel: LSM: Security Framework initializing Oct 2 19:30:22.102605 kernel: SELinux: Initializing. Oct 2 19:30:22.102620 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:30:22.102636 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:30:22.102652 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Oct 2 19:30:22.102668 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Oct 2 19:30:22.102682 kernel: signal: max sigframe size: 3632 Oct 2 19:30:22.102698 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:30:22.102715 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 2 19:30:22.102731 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:30:22.102751 kernel: x86: Booting SMP configuration: Oct 2 19:30:22.102765 kernel: .... node #0, CPUs: #1 Oct 2 19:30:22.102781 kernel: kvm-clock: cpu 1, msr 49f8a041, secondary cpu clock Oct 2 19:30:22.102796 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Oct 2 19:30:22.102811 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Oct 2 19:30:22.102827 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Oct 2 19:30:22.102842 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 19:30:22.102857 kernel: smpboot: Max logical packages: 1 Oct 2 19:30:22.102875 kernel: smpboot: Total of 2 processors activated (10000.02 BogoMIPS) Oct 2 19:30:22.102890 kernel: devtmpfs: initialized Oct 2 19:30:22.102905 kernel: x86/mm: Memory block size: 128MB Oct 2 19:30:22.102921 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:30:22.102935 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 19:30:22.102951 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:30:22.102966 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:30:22.102982 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:30:22.103010 kernel: audit: type=2000 audit(1696275020.662:1): state=initialized audit_enabled=0 res=1 Oct 2 19:30:22.103030 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:30:22.103046 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:30:22.103061 kernel: cpuidle: using governor menu Oct 2 19:30:22.103076 kernel: ACPI: bus type PCI registered Oct 2 19:30:22.103092 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:30:22.103108 kernel: dca service started, version 1.12.1 Oct 2 19:30:22.103124 kernel: PCI: Using configuration type 1 for base access Oct 2 19:30:22.103140 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:30:22.103155 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:30:22.103173 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:30:22.103188 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:30:22.103203 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:30:22.103218 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:30:22.103233 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:30:22.103248 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:30:22.103263 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:30:22.103278 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:30:22.103293 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Oct 2 19:30:22.103311 kernel: ACPI: Interpreter enabled Oct 2 19:30:22.103505 kernel: ACPI: PM: (supports S0 S5) Oct 2 19:30:22.103524 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:30:22.103539 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:30:22.103553 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Oct 2 19:30:22.103567 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 2 19:30:22.103779 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:30:22.103911 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Oct 2 19:30:22.103934 kernel: acpiphp: Slot [3] registered Oct 2 19:30:22.103949 kernel: acpiphp: Slot [4] registered Oct 2 19:30:22.103964 kernel: acpiphp: Slot [5] registered Oct 2 19:30:22.103978 kernel: acpiphp: Slot [6] registered Oct 2 19:30:22.104013 kernel: acpiphp: Slot [7] registered Oct 2 19:30:22.104027 kernel: acpiphp: Slot [8] registered Oct 2 19:30:22.104042 kernel: acpiphp: Slot [9] registered Oct 2 19:30:22.104057 kernel: acpiphp: Slot [10] registered Oct 2 19:30:22.104071 kernel: acpiphp: Slot [11] registered Oct 2 19:30:22.104089 kernel: acpiphp: Slot [12] registered Oct 2 19:30:22.104103 kernel: acpiphp: Slot [13] registered Oct 2 19:30:22.104118 kernel: acpiphp: Slot [14] registered Oct 2 19:30:22.104133 kernel: acpiphp: Slot [15] registered Oct 2 19:30:22.104147 kernel: acpiphp: Slot [16] registered Oct 2 19:30:22.104162 kernel: acpiphp: Slot [17] registered Oct 2 19:30:22.104177 kernel: acpiphp: Slot [18] registered Oct 2 19:30:22.104191 kernel: acpiphp: Slot [19] registered Oct 2 19:30:22.104206 kernel: acpiphp: Slot [20] registered Oct 2 19:30:22.104223 kernel: acpiphp: Slot [21] registered Oct 2 19:30:22.104237 kernel: acpiphp: Slot [22] registered Oct 2 19:30:22.104252 kernel: acpiphp: Slot [23] registered Oct 2 19:30:22.104267 kernel: acpiphp: Slot [24] registered Oct 2 19:30:22.104282 kernel: acpiphp: Slot [25] registered Oct 2 19:30:22.104297 kernel: acpiphp: Slot [26] registered Oct 2 19:30:22.104311 kernel: acpiphp: Slot [27] registered Oct 2 19:30:22.104326 kernel: acpiphp: Slot [28] registered Oct 2 19:30:22.104341 kernel: acpiphp: Slot [29] registered Oct 2 19:30:22.104355 kernel: acpiphp: Slot [30] registered Oct 2 19:30:22.104372 kernel: acpiphp: Slot [31] registered Oct 2 19:30:22.104387 kernel: PCI host bridge to bus 0000:00 Oct 2 19:30:22.104518 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 19:30:22.104637 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 2 19:30:22.104748 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 19:30:22.104855 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Oct 2 19:30:22.104963 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 2 19:30:22.105141 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Oct 2 19:30:22.105280 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Oct 2 19:30:22.105412 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Oct 2 19:30:22.105541 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Oct 2 19:30:22.105669 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Oct 2 19:30:22.105795 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Oct 2 19:30:22.105924 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Oct 2 19:30:22.106066 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Oct 2 19:30:22.106196 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Oct 2 19:30:22.106322 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Oct 2 19:30:22.106449 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Oct 2 19:30:22.106583 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Oct 2 19:30:22.106710 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Oct 2 19:30:22.106837 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Oct 2 19:30:22.106967 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 2 19:30:22.107114 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Oct 2 19:30:22.107241 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Oct 2 19:30:22.107449 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Oct 2 19:30:22.107585 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Oct 2 19:30:22.107605 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 2 19:30:22.107625 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 2 19:30:22.107640 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 2 19:30:22.107655 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 2 19:30:22.107670 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 2 19:30:22.107692 kernel: iommu: Default domain type: Translated Oct 2 19:30:22.107708 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:30:22.107837 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Oct 2 19:30:22.107964 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 2 19:30:22.108103 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Oct 2 19:30:22.108127 kernel: vgaarb: loaded Oct 2 19:30:22.108142 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:30:22.108157 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:30:22.108172 kernel: PTP clock support registered Oct 2 19:30:22.108186 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:30:22.108201 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 19:30:22.108216 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 2 19:30:22.108230 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Oct 2 19:30:22.108245 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Oct 2 19:30:22.108262 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Oct 2 19:30:22.108277 kernel: clocksource: Switched to clocksource kvm-clock Oct 2 19:30:22.108291 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:30:22.108306 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:30:22.108320 kernel: pnp: PnP ACPI init Oct 2 19:30:22.108334 kernel: pnp: PnP ACPI: found 5 devices Oct 2 19:30:22.108349 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:30:22.108364 kernel: NET: Registered PF_INET protocol family Oct 2 19:30:22.108382 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 19:30:22.108397 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 2 19:30:22.108411 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:30:22.108426 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:30:22.108441 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 2 19:30:22.108455 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 2 19:30:22.108470 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:30:22.108484 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:30:22.108499 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:30:22.108516 kernel: NET: Registered PF_XDP protocol family Oct 2 19:30:22.108636 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 2 19:30:22.108751 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 2 19:30:22.108863 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 2 19:30:22.108975 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Oct 2 19:30:22.109117 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 2 19:30:22.109346 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Oct 2 19:30:22.109373 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:30:22.109388 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 2 19:30:22.109404 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093fa6a7c, max_idle_ns: 440795295209 ns Oct 2 19:30:22.109419 kernel: clocksource: Switched to clocksource tsc Oct 2 19:30:22.109434 kernel: Initialise system trusted keyrings Oct 2 19:30:22.109448 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 2 19:30:22.109462 kernel: Key type asymmetric registered Oct 2 19:30:22.109477 kernel: Asymmetric key parser 'x509' registered Oct 2 19:30:22.109492 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:30:22.109510 kernel: io scheduler mq-deadline registered Oct 2 19:30:22.109524 kernel: io scheduler kyber registered Oct 2 19:30:22.109539 kernel: io scheduler bfq registered Oct 2 19:30:22.109554 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:30:22.109569 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:30:22.109584 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:30:22.109598 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 2 19:30:22.109613 kernel: i8042: Warning: Keylock active Oct 2 19:30:22.109627 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 2 19:30:22.109642 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 2 19:30:22.109780 kernel: rtc_cmos 00:00: RTC can wake from S4 Oct 2 19:30:22.109898 kernel: rtc_cmos 00:00: registered as rtc0 Oct 2 19:30:22.110027 kernel: rtc_cmos 00:00: setting system clock to 2023-10-02T19:30:21 UTC (1696275021) Oct 2 19:30:22.110250 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Oct 2 19:30:22.110271 kernel: intel_pstate: CPU model not supported Oct 2 19:30:22.110287 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:30:22.110302 kernel: Segment Routing with IPv6 Oct 2 19:30:22.110322 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:30:22.110337 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:30:22.110351 kernel: Key type dns_resolver registered Oct 2 19:30:22.110365 kernel: IPI shorthand broadcast: enabled Oct 2 19:30:22.110381 kernel: sched_clock: Marking stable (378610913, 254566661)->(752770050, -119592476) Oct 2 19:30:22.110396 kernel: registered taskstats version 1 Oct 2 19:30:22.110411 kernel: Loading compiled-in X.509 certificates Oct 2 19:30:22.110426 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:30:22.110440 kernel: Key type .fscrypt registered Oct 2 19:30:22.110458 kernel: Key type fscrypt-provisioning registered Oct 2 19:30:22.110473 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 19:30:22.110488 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:30:22.110503 kernel: ima: No architecture policies found Oct 2 19:30:22.110518 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:30:22.110533 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:30:22.110548 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:30:22.110563 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:30:22.110577 kernel: Run /init as init process Oct 2 19:30:22.110595 kernel: with arguments: Oct 2 19:30:22.110609 kernel: /init Oct 2 19:30:22.110624 kernel: with environment: Oct 2 19:30:22.110638 kernel: HOME=/ Oct 2 19:30:22.110652 kernel: TERM=linux Oct 2 19:30:22.110664 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:30:22.110682 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:30:22.110700 systemd[1]: Detected virtualization amazon. Oct 2 19:30:22.110719 systemd[1]: Detected architecture x86-64. Oct 2 19:30:22.110734 systemd[1]: Running in initrd. Oct 2 19:30:22.110749 systemd[1]: No hostname configured, using default hostname. Oct 2 19:30:22.110764 systemd[1]: Hostname set to . Oct 2 19:30:22.110796 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:30:22.110816 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 2 19:30:22.110832 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:30:22.110849 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:30:22.110864 systemd[1]: Reached target cryptsetup.target. Oct 2 19:30:22.110880 systemd[1]: Reached target paths.target. Oct 2 19:30:22.110896 systemd[1]: Reached target slices.target. Oct 2 19:30:22.110912 systemd[1]: Reached target swap.target. Oct 2 19:30:22.110928 systemd[1]: Reached target timers.target. Oct 2 19:30:22.110948 systemd[1]: Listening on iscsid.socket. Oct 2 19:30:22.110964 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:30:22.110980 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:30:22.111007 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:30:22.111024 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:30:22.111040 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:30:22.111057 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:30:22.111073 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:30:22.111089 systemd[1]: Reached target sockets.target. Oct 2 19:30:22.111108 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:30:22.111124 systemd[1]: Finished network-cleanup.service. Oct 2 19:30:22.111140 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:30:22.111157 systemd[1]: Starting systemd-journald.service... Oct 2 19:30:22.111173 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:30:22.111188 systemd[1]: Starting systemd-resolved.service... Oct 2 19:30:22.111218 systemd-journald[185]: Journal started Oct 2 19:30:22.111295 systemd-journald[185]: Runtime Journal (/run/log/journal/ec279c6dba793910a1991ac5fbff6fc0) is 4.8M, max 38.7M, 33.9M free. Oct 2 19:30:22.115016 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:30:22.125017 systemd[1]: Started systemd-journald.service. Oct 2 19:30:22.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:22.133531 kernel: audit: type=1130 audit(1696275022.124:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:22.133671 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:30:22.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:22.142086 kernel: audit: type=1130 audit(1696275022.134:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:22.142460 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:30:22.142659 systemd-modules-load[186]: Inserted module 'overlay' Oct 2 19:30:22.151950 systemd-resolved[187]: Positive Trust Anchors: Oct 2 19:30:22.311932 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:30:22.311960 kernel: Bridge firewalling registered Oct 2 19:30:22.311976 kernel: SCSI subsystem initialized Oct 2 19:30:22.311990 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:30:22.312012 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:30:22.312023 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:30:22.151968 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:30:22.152025 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:30:22.159554 systemd-resolved[187]: Defaulting to hostname 'linux'. Oct 2 19:30:22.337688 kernel: audit: type=1130 audit(1696275022.328:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:22.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:22.199497 systemd-modules-load[186]: Inserted module 'br_netfilter' Oct 2 19:30:22.242166 systemd-modules-load[186]: Inserted module 'dm_multipath' Oct 2 19:30:22.348917 kernel: audit: type=1130 audit(1696275022.338:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:22.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:22.331157 systemd[1]: Started systemd-resolved.service. Oct 2 19:30:22.349012 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:30:22.357087 kernel: audit: type=1130 audit(1696275022.348:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:22.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:22.351101 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:30:22.363405 kernel: audit: type=1130 audit(1696275022.355:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:22.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:22.357321 systemd[1]: Reached target nss-lookup.target. Oct 2 19:30:22.364554 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:30:22.366648 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:30:22.368864 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:30:22.377875 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:30:22.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:22.383010 kernel: audit: type=1130 audit(1696275022.376:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:22.390200 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:30:22.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:22.401015 kernel: audit: type=1130 audit(1696275022.388:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:22.418025 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:30:22.421115 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:30:22.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:22.431065 kernel: audit: type=1130 audit(1696275022.417:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:22.437545 dracut-cmdline[206]: dracut-dracut-053 Oct 2 19:30:22.441671 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:30:22.522016 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:30:22.535015 kernel: iscsi: registered transport (tcp) Oct 2 19:30:22.560050 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:30:22.560126 kernel: QLogic iSCSI HBA Driver Oct 2 19:30:22.602266 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:30:22.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:22.609474 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:30:22.685700 kernel: raid6: avx512x4 gen() 16535 MB/s Oct 2 19:30:22.702092 kernel: raid6: avx512x4 xor() 6349 MB/s Oct 2 19:30:22.719089 kernel: raid6: avx512x2 gen() 16817 MB/s Oct 2 19:30:22.736039 kernel: raid6: avx512x2 xor() 15211 MB/s Oct 2 19:30:22.753039 kernel: raid6: avx512x1 gen() 11737 MB/s Oct 2 19:30:22.770049 kernel: raid6: avx512x1 xor() 19724 MB/s Oct 2 19:30:22.787054 kernel: raid6: avx2x4 gen() 16803 MB/s Oct 2 19:30:22.804044 kernel: raid6: avx2x4 xor() 6935 MB/s Oct 2 19:30:22.825035 kernel: raid6: avx2x2 gen() 15679 MB/s Oct 2 19:30:22.843041 kernel: raid6: avx2x2 xor() 15592 MB/s Oct 2 19:30:22.861044 kernel: raid6: avx2x1 gen() 11696 MB/s Oct 2 19:30:22.878043 kernel: raid6: avx2x1 xor() 14556 MB/s Oct 2 19:30:22.896049 kernel: raid6: sse2x4 gen() 8096 MB/s Oct 2 19:30:22.914042 kernel: raid6: sse2x4 xor() 5645 MB/s Oct 2 19:30:22.931032 kernel: raid6: sse2x2 gen() 9300 MB/s Oct 2 19:30:22.950043 kernel: raid6: sse2x2 xor() 5239 MB/s Oct 2 19:30:22.968125 kernel: raid6: sse2x1 gen() 4325 MB/s Oct 2 19:30:22.986434 kernel: raid6: sse2x1 xor() 4204 MB/s Oct 2 19:30:22.986509 kernel: raid6: using algorithm avx512x2 gen() 16817 MB/s Oct 2 19:30:22.986528 kernel: raid6: .... xor() 15211 MB/s, rmw enabled Oct 2 19:30:22.987540 kernel: raid6: using avx512x2 recovery algorithm Oct 2 19:30:23.004025 kernel: xor: automatically using best checksumming function avx Oct 2 19:30:23.124022 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:30:23.133055 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:30:23.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:23.133000 audit: BPF prog-id=7 op=LOAD Oct 2 19:30:23.133000 audit: BPF prog-id=8 op=LOAD Oct 2 19:30:23.135836 systemd[1]: Starting systemd-udevd.service... Oct 2 19:30:23.154377 systemd-udevd[385]: Using default interface naming scheme 'v252'. Oct 2 19:30:23.160654 systemd[1]: Started systemd-udevd.service. Oct 2 19:30:23.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:23.163163 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:30:23.185205 dracut-pre-trigger[389]: rd.md=0: removing MD RAID activation Oct 2 19:30:23.224431 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:30:23.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:23.226756 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:30:23.284230 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:30:23.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:23.360017 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:30:23.377505 kernel: ena 0000:00:05.0: ENA device version: 0.10 Oct 2 19:30:23.377758 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Oct 2 19:30:23.384017 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Oct 2 19:30:23.397027 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:90:1c:88:92:29 Oct 2 19:30:23.403569 kernel: nvme nvme0: pci function 0000:00:04.0 Oct 2 19:30:23.403861 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Oct 2 19:30:23.403881 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:30:23.403898 kernel: AES CTR mode by8 optimization enabled Oct 2 19:30:23.412017 kernel: nvme nvme0: 2/0/0 default/read/poll queues Oct 2 19:30:23.415520 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 19:30:23.415584 kernel: GPT:9289727 != 16777215 Oct 2 19:30:23.415603 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 19:30:23.415621 kernel: GPT:9289727 != 16777215 Oct 2 19:30:23.415637 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 19:30:23.415653 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:30:23.418421 (udev-worker)[439]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:30:23.636386 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (434) Oct 2 19:30:23.537827 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:30:23.643777 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:30:23.664417 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:30:23.664560 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:30:23.674112 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:30:23.678897 systemd[1]: Starting disk-uuid.service... Oct 2 19:30:23.695184 disk-uuid[586]: Primary Header is updated. Oct 2 19:30:23.695184 disk-uuid[586]: Secondary Entries is updated. Oct 2 19:30:23.695184 disk-uuid[586]: Secondary Header is updated. Oct 2 19:30:23.700702 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:30:23.706008 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:30:23.712013 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:30:24.714364 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:30:24.716146 disk-uuid[587]: The operation has completed successfully. Oct 2 19:30:24.841258 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:30:24.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:24.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:24.841369 systemd[1]: Finished disk-uuid.service. Oct 2 19:30:24.860203 systemd[1]: Starting verity-setup.service... Oct 2 19:30:24.901012 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:30:24.998854 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:30:25.005444 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:30:25.012103 systemd[1]: Finished verity-setup.service. Oct 2 19:30:25.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:25.115674 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:30:25.115909 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:30:25.116156 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:30:25.120526 systemd[1]: Starting ignition-setup.service... Oct 2 19:30:25.125004 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:30:25.145376 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:30:25.145438 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:30:25.145457 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:30:25.178225 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:30:25.194682 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:30:25.220106 systemd[1]: Finished ignition-setup.service. Oct 2 19:30:25.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:25.221309 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:30:25.235172 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:30:25.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:25.235000 audit: BPF prog-id=9 op=LOAD Oct 2 19:30:25.239221 systemd[1]: Starting systemd-networkd.service... Oct 2 19:30:25.273645 systemd-networkd[1099]: lo: Link UP Oct 2 19:30:25.273658 systemd-networkd[1099]: lo: Gained carrier Oct 2 19:30:25.274458 systemd-networkd[1099]: Enumeration completed Oct 2 19:30:25.274801 systemd[1]: Started systemd-networkd.service. Oct 2 19:30:25.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:25.275391 systemd-networkd[1099]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:30:25.279872 systemd[1]: Reached target network.target. Oct 2 19:30:25.282049 systemd[1]: Starting iscsiuio.service... Oct 2 19:30:25.290376 systemd[1]: Started iscsiuio.service. Oct 2 19:30:25.290825 systemd-networkd[1099]: eth0: Link UP Oct 2 19:30:25.290831 systemd-networkd[1099]: eth0: Gained carrier Oct 2 19:30:25.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:25.295520 systemd[1]: Starting iscsid.service... Oct 2 19:30:25.302027 iscsid[1104]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:30:25.302027 iscsid[1104]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:30:25.302027 iscsid[1104]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:30:25.302027 iscsid[1104]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:30:25.302027 iscsid[1104]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:30:25.302027 iscsid[1104]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:30:25.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:25.302132 systemd[1]: Started iscsid.service. Oct 2 19:30:25.304090 systemd-networkd[1099]: eth0: DHCPv4 address 172.31.22.61/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 19:30:25.313046 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:30:25.337455 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:30:25.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:25.338779 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:30:25.340034 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:30:25.341287 systemd[1]: Reached target remote-fs.target. Oct 2 19:30:25.343474 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:30:25.355148 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:30:25.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:25.930788 ignition[1093]: Ignition 2.14.0 Oct 2 19:30:25.930803 ignition[1093]: Stage: fetch-offline Oct 2 19:30:25.930936 ignition[1093]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:30:25.930977 ignition[1093]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:30:25.952188 ignition[1093]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:30:25.954217 ignition[1093]: Ignition finished successfully Oct 2 19:30:25.956093 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:30:25.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:25.958439 systemd[1]: Starting ignition-fetch.service... Oct 2 19:30:25.968115 ignition[1123]: Ignition 2.14.0 Oct 2 19:30:25.968128 ignition[1123]: Stage: fetch Oct 2 19:30:25.968561 ignition[1123]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:30:25.968596 ignition[1123]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:30:25.978023 ignition[1123]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:30:25.979481 ignition[1123]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:30:25.988895 ignition[1123]: INFO : PUT result: OK Oct 2 19:30:25.991227 ignition[1123]: DEBUG : parsed url from cmdline: "" Oct 2 19:30:25.991227 ignition[1123]: INFO : no config URL provided Oct 2 19:30:25.991227 ignition[1123]: INFO : reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:30:25.994724 ignition[1123]: INFO : no config at "/usr/lib/ignition/user.ign" Oct 2 19:30:25.994724 ignition[1123]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:30:25.994724 ignition[1123]: INFO : PUT result: OK Oct 2 19:30:25.994724 ignition[1123]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Oct 2 19:30:26.000328 ignition[1123]: INFO : GET result: OK Oct 2 19:30:26.001389 ignition[1123]: DEBUG : parsing config with SHA512: b1d3cc9341d83110cfe89655718c1758af348afdf88414bd0ad313d802c6a2aa1a430d94df3d97dee471883d9f80706e45be2a1cf5a38712394ee40f66b6edbf Oct 2 19:30:26.036305 unknown[1123]: fetched base config from "system" Oct 2 19:30:26.036531 unknown[1123]: fetched base config from "system" Oct 2 19:30:26.036537 unknown[1123]: fetched user config from "aws" Oct 2 19:30:26.040625 ignition[1123]: fetch: fetch complete Oct 2 19:30:26.040720 ignition[1123]: fetch: fetch passed Oct 2 19:30:26.040772 ignition[1123]: Ignition finished successfully Oct 2 19:30:26.045081 systemd[1]: Finished ignition-fetch.service. Oct 2 19:30:26.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:26.047175 systemd[1]: Starting ignition-kargs.service... Oct 2 19:30:26.069691 ignition[1129]: Ignition 2.14.0 Oct 2 19:30:26.069702 ignition[1129]: Stage: kargs Oct 2 19:30:26.069891 ignition[1129]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:30:26.069914 ignition[1129]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:30:26.079008 ignition[1129]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:30:26.080966 ignition[1129]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:30:26.083127 ignition[1129]: INFO : PUT result: OK Oct 2 19:30:26.086920 ignition[1129]: kargs: kargs passed Oct 2 19:30:26.087091 ignition[1129]: Ignition finished successfully Oct 2 19:30:26.090009 systemd[1]: Finished ignition-kargs.service. Oct 2 19:30:26.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:26.092280 systemd[1]: Starting ignition-disks.service... Oct 2 19:30:26.106250 ignition[1135]: Ignition 2.14.0 Oct 2 19:30:26.106263 ignition[1135]: Stage: disks Oct 2 19:30:26.106471 ignition[1135]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:30:26.106500 ignition[1135]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:30:26.116200 ignition[1135]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:30:26.118027 ignition[1135]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:30:26.119957 ignition[1135]: INFO : PUT result: OK Oct 2 19:30:26.122783 ignition[1135]: disks: disks passed Oct 2 19:30:26.122850 ignition[1135]: Ignition finished successfully Oct 2 19:30:26.125397 systemd[1]: Finished ignition-disks.service. Oct 2 19:30:26.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:26.126607 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:30:26.129594 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:30:26.131433 systemd[1]: Reached target local-fs.target. Oct 2 19:30:26.133360 systemd[1]: Reached target sysinit.target. Oct 2 19:30:26.134386 systemd[1]: Reached target basic.target. Oct 2 19:30:26.138257 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:30:26.185141 systemd-fsck[1143]: ROOT: clean, 603/553520 files, 56012/553472 blocks Oct 2 19:30:26.195538 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:30:26.207455 kernel: kauditd_printk_skb: 22 callbacks suppressed Oct 2 19:30:26.207484 kernel: audit: type=1130 audit(1696275026.195:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:26.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:26.198470 systemd[1]: Mounting sysroot.mount... Oct 2 19:30:26.220668 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:30:26.219967 systemd[1]: Mounted sysroot.mount. Oct 2 19:30:26.221876 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:30:26.236437 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:30:26.237799 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 19:30:26.237846 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:30:26.237873 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:30:26.253229 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:30:26.280935 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:30:26.282777 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:30:26.300576 initrd-setup-root[1165]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:30:26.303123 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1160) Oct 2 19:30:26.309914 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:30:26.309973 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:30:26.310006 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:30:26.313200 initrd-setup-root[1173]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:30:26.321017 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:30:26.322384 initrd-setup-root[1199]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:30:26.328230 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:30:26.332730 initrd-setup-root[1207]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:30:26.542539 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:30:26.553111 kernel: audit: type=1130 audit(1696275026.540:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:26.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:26.544489 systemd[1]: Starting ignition-mount.service... Oct 2 19:30:26.554563 systemd[1]: Starting sysroot-boot.service... Oct 2 19:30:26.565463 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 19:30:26.565682 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 19:30:26.596567 ignition[1226]: INFO : Ignition 2.14.0 Oct 2 19:30:26.596567 ignition[1226]: INFO : Stage: mount Oct 2 19:30:26.599550 ignition[1226]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:30:26.599550 ignition[1226]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:30:26.619971 systemd[1]: Finished sysroot-boot.service. Oct 2 19:30:26.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:26.625626 ignition[1226]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:30:26.625626 ignition[1226]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:30:26.633567 kernel: audit: type=1130 audit(1696275026.622:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:26.633603 ignition[1226]: INFO : PUT result: OK Oct 2 19:30:26.633603 ignition[1226]: INFO : mount: mount passed Oct 2 19:30:26.633603 ignition[1226]: INFO : Ignition finished successfully Oct 2 19:30:26.637867 systemd[1]: Finished ignition-mount.service. Oct 2 19:30:26.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:26.640838 systemd[1]: Starting ignition-files.service... Oct 2 19:30:26.647948 kernel: audit: type=1130 audit(1696275026.637:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:26.652659 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:30:26.668059 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1235) Oct 2 19:30:26.673790 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:30:26.673893 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:30:26.673914 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:30:26.681022 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:30:26.686473 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:30:26.701504 ignition[1254]: INFO : Ignition 2.14.0 Oct 2 19:30:26.701504 ignition[1254]: INFO : Stage: files Oct 2 19:30:26.704395 ignition[1254]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:30:26.704395 ignition[1254]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:30:26.716880 ignition[1254]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:30:26.720514 ignition[1254]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:30:26.723947 ignition[1254]: INFO : PUT result: OK Oct 2 19:30:26.728413 ignition[1254]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:30:26.733629 ignition[1254]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:30:26.733629 ignition[1254]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:30:26.748013 ignition[1254]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:30:26.751052 ignition[1254]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:30:26.753785 unknown[1254]: wrote ssh authorized keys file for user: core Oct 2 19:30:26.755595 ignition[1254]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:30:26.757730 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:30:26.761450 ignition[1254]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Oct 2 19:30:26.771174 systemd-networkd[1099]: eth0: Gained IPv6LL Oct 2 19:30:27.024918 ignition[1254]: INFO : GET result: OK Oct 2 19:30:27.620163 ignition[1254]: DEBUG : file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Oct 2 19:30:27.623416 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:30:27.623416 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:30:27.623416 ignition[1254]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Oct 2 19:30:27.717299 ignition[1254]: INFO : GET result: OK Oct 2 19:30:27.863687 ignition[1254]: DEBUG : file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Oct 2 19:30:27.867491 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:30:27.867491 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:30:27.867491 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:30:27.867491 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 19:30:27.867491 ignition[1254]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:30:27.887422 ignition[1254]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4226458710" Oct 2 19:30:27.892321 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1259) Oct 2 19:30:27.892355 ignition[1254]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4226458710": device or resource busy Oct 2 19:30:27.892355 ignition[1254]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4226458710", trying btrfs: device or resource busy Oct 2 19:30:27.892355 ignition[1254]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4226458710" Oct 2 19:30:27.902205 ignition[1254]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4226458710" Oct 2 19:30:27.907925 ignition[1254]: INFO : op(3): [started] unmounting "/mnt/oem4226458710" Oct 2 19:30:27.910588 systemd[1]: mnt-oem4226458710.mount: Deactivated successfully. Oct 2 19:30:27.912534 ignition[1254]: INFO : op(3): [finished] unmounting "/mnt/oem4226458710" Oct 2 19:30:27.914019 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 19:30:27.914019 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:30:27.919057 ignition[1254]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:30:28.001906 ignition[1254]: INFO : GET result: OK Oct 2 19:30:29.111247 ignition[1254]: DEBUG : file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Oct 2 19:30:29.114743 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:30:29.114743 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:30:29.114743 ignition[1254]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:30:29.166495 ignition[1254]: INFO : GET result: OK Oct 2 19:30:30.438335 ignition[1254]: DEBUG : file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Oct 2 19:30:30.442576 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:30:30.442576 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:30:30.442576 ignition[1254]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubectl: attempt #1 Oct 2 19:30:30.500324 ignition[1254]: INFO : GET result: OK Oct 2 19:30:30.959142 ignition[1254]: DEBUG : file matches expected sum of: 33cf3f6e37bcee4dff7ce14ab933c605d07353d4e31446dd2b52c3f05e0b150b60e531f6069f112d8a76331322a72b593537531e62104cfc7c70cb03d46f76b3 Oct 2 19:30:30.962425 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:30:30.962425 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/bin/cilium.tar.gz" Oct 2 19:30:30.962425 ignition[1254]: INFO : GET https://github.com/cilium/cilium-cli/releases/download/v0.12.12/cilium-linux-amd64.tar.gz: attempt #1 Oct 2 19:30:31.252955 ignition[1254]: INFO : GET result: OK Oct 2 19:30:32.330424 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/bin/cilium.tar.gz" Oct 2 19:30:32.335606 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:30:32.335606 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:30:32.335606 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:30:32.335606 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:30:32.349946 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:30:32.349946 ignition[1254]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:30:32.356205 ignition[1254]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3074355020" Oct 2 19:30:32.360141 ignition[1254]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3074355020": device or resource busy Oct 2 19:30:32.360141 ignition[1254]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3074355020", trying btrfs: device or resource busy Oct 2 19:30:32.360141 ignition[1254]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3074355020" Oct 2 19:30:32.360141 ignition[1254]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3074355020" Oct 2 19:30:32.370333 ignition[1254]: INFO : op(6): [started] unmounting "/mnt/oem3074355020" Oct 2 19:30:32.372127 systemd[1]: mnt-oem3074355020.mount: Deactivated successfully. Oct 2 19:30:32.374254 ignition[1254]: INFO : op(6): [finished] unmounting "/mnt/oem3074355020" Oct 2 19:30:32.375744 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:30:32.375744 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 19:30:32.375744 ignition[1254]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:30:32.389161 ignition[1254]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem346927646" Oct 2 19:30:32.392502 ignition[1254]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem346927646": device or resource busy Oct 2 19:30:32.392502 ignition[1254]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem346927646", trying btrfs: device or resource busy Oct 2 19:30:32.392502 ignition[1254]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem346927646" Oct 2 19:30:32.392502 ignition[1254]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem346927646" Oct 2 19:30:32.402480 ignition[1254]: INFO : op(9): [started] unmounting "/mnt/oem346927646" Oct 2 19:30:32.403939 ignition[1254]: INFO : op(9): [finished] unmounting "/mnt/oem346927646" Oct 2 19:30:32.403939 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 19:30:32.403939 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 19:30:32.403939 ignition[1254]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:30:32.407014 systemd[1]: mnt-oem346927646.mount: Deactivated successfully. Oct 2 19:30:32.424530 ignition[1254]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4249542603" Oct 2 19:30:32.426484 ignition[1254]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4249542603": device or resource busy Oct 2 19:30:32.426484 ignition[1254]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4249542603", trying btrfs: device or resource busy Oct 2 19:30:32.426484 ignition[1254]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4249542603" Oct 2 19:30:32.434118 ignition[1254]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4249542603" Oct 2 19:30:32.435879 ignition[1254]: INFO : op(c): [started] unmounting "/mnt/oem4249542603" Oct 2 19:30:32.437233 ignition[1254]: INFO : op(c): [finished] unmounting "/mnt/oem4249542603" Oct 2 19:30:32.437233 ignition[1254]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 19:30:32.437233 ignition[1254]: INFO : files: op(10): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:30:32.437233 ignition[1254]: INFO : files: op(10): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:30:32.437233 ignition[1254]: INFO : files: op(11): [started] processing unit "amazon-ssm-agent.service" Oct 2 19:30:32.437233 ignition[1254]: INFO : files: op(11): op(12): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 19:30:32.437233 ignition[1254]: INFO : files: op(11): op(12): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 19:30:32.437233 ignition[1254]: INFO : files: op(11): [finished] processing unit "amazon-ssm-agent.service" Oct 2 19:30:32.437233 ignition[1254]: INFO : files: op(13): [started] processing unit "nvidia.service" Oct 2 19:30:32.437233 ignition[1254]: INFO : files: op(13): [finished] processing unit "nvidia.service" Oct 2 19:30:32.437233 ignition[1254]: INFO : files: op(14): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:30:32.437233 ignition[1254]: INFO : files: op(14): op(15): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:30:32.437233 ignition[1254]: INFO : files: op(14): op(15): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:30:32.437233 ignition[1254]: INFO : files: op(14): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:30:32.437233 ignition[1254]: INFO : files: op(16): [started] processing unit "prepare-critools.service" Oct 2 19:30:32.437233 ignition[1254]: INFO : files: op(16): op(17): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:30:32.437233 ignition[1254]: INFO : files: op(16): op(17): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:30:32.437233 ignition[1254]: INFO : files: op(16): [finished] processing unit "prepare-critools.service" Oct 2 19:30:32.437233 ignition[1254]: INFO : files: op(18): [started] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 19:30:32.437233 ignition[1254]: INFO : files: op(18): [finished] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 19:30:32.479370 ignition[1254]: INFO : files: op(19): [started] setting preset to enabled for "nvidia.service" Oct 2 19:30:32.479370 ignition[1254]: INFO : files: op(19): [finished] setting preset to enabled for "nvidia.service" Oct 2 19:30:32.479370 ignition[1254]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:30:32.479370 ignition[1254]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:30:32.479370 ignition[1254]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:30:32.479370 ignition[1254]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:30:32.479370 ignition[1254]: INFO : files: op(1c): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:30:32.479370 ignition[1254]: INFO : files: op(1c): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:30:32.500172 ignition[1254]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:30:32.502350 ignition[1254]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:30:32.502350 ignition[1254]: INFO : files: files passed Oct 2 19:30:32.502350 ignition[1254]: INFO : Ignition finished successfully Oct 2 19:30:32.510015 systemd[1]: Finished ignition-files.service. Oct 2 19:30:32.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.523014 kernel: audit: type=1130 audit(1696275032.514:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.526069 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:30:32.529430 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:30:32.530506 systemd[1]: Starting ignition-quench.service... Oct 2 19:30:32.536704 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:30:32.549600 kernel: audit: type=1130 audit(1696275032.537:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.549640 kernel: audit: type=1131 audit(1696275032.537:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.536819 systemd[1]: Finished ignition-quench.service. Oct 2 19:30:32.551698 initrd-setup-root-after-ignition[1279]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:30:32.554984 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:30:32.562532 kernel: audit: type=1130 audit(1696275032.555:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.556875 systemd[1]: Reached target ignition-complete.target. Oct 2 19:30:32.565498 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:30:32.584804 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:30:32.584924 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:30:32.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.587576 systemd[1]: Reached target initrd-fs.target. Oct 2 19:30:32.604483 kernel: audit: type=1130 audit(1696275032.586:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.604518 kernel: audit: type=1131 audit(1696275032.586:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.598069 systemd[1]: Reached target initrd.target. Oct 2 19:30:32.605569 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:30:32.607082 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:30:32.620968 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:30:32.632568 kernel: audit: type=1130 audit(1696275032.619:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.622211 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:30:32.639820 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:30:32.640047 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:30:32.647186 systemd[1]: Stopped target timers.target. Oct 2 19:30:32.648954 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:30:32.650252 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:30:32.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.652916 systemd[1]: Stopped target initrd.target. Oct 2 19:30:32.660362 kernel: audit: type=1131 audit(1696275032.651:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.660682 systemd[1]: Stopped target basic.target. Oct 2 19:30:32.669944 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:30:32.672398 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:30:32.674651 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:30:32.677201 systemd[1]: Stopped target remote-fs.target. Oct 2 19:30:32.679253 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:30:32.681286 systemd[1]: Stopped target sysinit.target. Oct 2 19:30:32.683125 systemd[1]: Stopped target local-fs.target. Oct 2 19:30:32.685238 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:30:32.687479 systemd[1]: Stopped target swap.target. Oct 2 19:30:32.689396 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:30:32.690623 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:30:32.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.693210 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:30:32.700924 kernel: audit: type=1131 audit(1696275032.691:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.700921 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:30:32.702453 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:30:32.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.705094 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:30:32.712561 kernel: audit: type=1131 audit(1696275032.703:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.705206 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:30:32.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.714098 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:30:32.715358 systemd[1]: Stopped ignition-files.service. Oct 2 19:30:32.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.718509 systemd[1]: Stopping ignition-mount.service... Oct 2 19:30:32.729421 iscsid[1104]: iscsid shutting down. Oct 2 19:30:32.719801 systemd[1]: Stopping iscsid.service... Oct 2 19:30:32.723541 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:30:32.724538 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:30:32.724662 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:30:32.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.725968 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:30:32.726068 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:30:32.729399 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:30:32.729485 systemd[1]: Stopped iscsid.service. Oct 2 19:30:32.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.739896 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:30:32.747416 ignition[1292]: INFO : Ignition 2.14.0 Oct 2 19:30:32.747416 ignition[1292]: INFO : Stage: umount Oct 2 19:30:32.747416 ignition[1292]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:30:32.747416 ignition[1292]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:30:32.741031 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:30:32.756330 systemd[1]: Stopping iscsiuio.service... Oct 2 19:30:32.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.759294 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:30:32.759412 systemd[1]: Stopped iscsiuio.service. Oct 2 19:30:32.771765 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:30:32.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.771898 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:30:32.778630 ignition[1292]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:30:32.778630 ignition[1292]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:30:32.782099 ignition[1292]: INFO : PUT result: OK Oct 2 19:30:32.785424 ignition[1292]: INFO : umount: umount passed Oct 2 19:30:32.786618 ignition[1292]: INFO : Ignition finished successfully Oct 2 19:30:32.788677 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:30:32.788771 systemd[1]: Stopped ignition-mount.service. Oct 2 19:30:32.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.791522 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:30:32.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.791589 systemd[1]: Stopped ignition-disks.service. Oct 2 19:30:32.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.793657 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:30:32.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.793694 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:30:32.799070 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 19:30:32.799116 systemd[1]: Stopped ignition-fetch.service. Oct 2 19:30:32.799204 systemd[1]: Stopped target network.target. Oct 2 19:30:32.802042 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:30:32.802107 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:30:32.802220 systemd[1]: Stopped target paths.target. Oct 2 19:30:32.805147 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:30:32.809149 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:30:32.810465 systemd[1]: Stopped target slices.target. Oct 2 19:30:32.813689 systemd[1]: Stopped target sockets.target. Oct 2 19:30:32.816892 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:30:32.816946 systemd[1]: Closed iscsid.socket. Oct 2 19:30:32.820861 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:30:32.821859 systemd[1]: Closed iscsiuio.socket. Oct 2 19:30:32.826097 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:30:32.827294 systemd[1]: Stopped ignition-setup.service. Oct 2 19:30:32.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.829334 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:30:32.830062 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:30:32.835528 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:30:32.837352 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:30:32.841036 systemd-networkd[1099]: eth0: DHCPv6 lease lost Oct 2 19:30:32.843289 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:30:32.843385 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:30:32.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.852280 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:30:32.852403 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:30:32.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.854000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:30:32.854944 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:30:32.855811 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:30:32.858000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:30:32.859445 systemd[1]: Stopping network-cleanup.service... Oct 2 19:30:32.861224 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:30:32.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.861294 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:30:32.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.863463 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:30:32.863508 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:30:32.866954 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:30:32.867045 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:30:32.869600 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:30:32.880317 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:30:32.881914 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:30:32.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.884039 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:30:32.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.884142 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:30:32.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.886022 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:30:32.886060 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:30:32.887206 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:30:32.887250 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:30:32.890129 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:30:32.890170 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:30:32.892636 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:30:32.892676 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:30:32.894714 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:30:32.909441 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 2 19:30:32.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.909779 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 2 19:30:32.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.913347 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:30:32.913403 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:30:32.918094 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:30:32.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.919069 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:30:32.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:32.920935 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:30:32.921074 systemd[1]: Stopped network-cleanup.service. Oct 2 19:30:32.923213 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:30:32.923333 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:30:32.924476 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:30:32.927418 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:30:32.951156 systemd[1]: Switching root. Oct 2 19:30:32.973365 systemd-journald[185]: Journal stopped Oct 2 19:30:38.696897 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Oct 2 19:30:38.700623 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:30:38.700684 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:30:38.701680 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:30:38.701703 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:30:38.701722 kernel: SELinux: policy capability open_perms=1 Oct 2 19:30:38.701743 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:30:38.701763 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:30:38.701782 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:30:38.701802 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:30:38.701820 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:30:38.701840 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:30:38.701865 systemd[1]: Successfully loaded SELinux policy in 106.893ms. Oct 2 19:30:38.701905 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.464ms. Oct 2 19:30:38.701927 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:30:38.701949 systemd[1]: Detected virtualization amazon. Oct 2 19:30:38.701969 systemd[1]: Detected architecture x86-64. Oct 2 19:30:38.702080 systemd[1]: Detected first boot. Oct 2 19:30:38.702107 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:30:38.702127 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:30:38.702148 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:30:38.702176 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:30:38.702198 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:30:38.702216 kernel: kauditd_printk_skb: 40 callbacks suppressed Oct 2 19:30:38.702235 kernel: audit: type=1334 audit(1696275038.340:87): prog-id=12 op=LOAD Oct 2 19:30:38.702252 kernel: audit: type=1334 audit(1696275038.340:88): prog-id=3 op=UNLOAD Oct 2 19:30:38.702270 kernel: audit: type=1334 audit(1696275038.343:89): prog-id=13 op=LOAD Oct 2 19:30:38.702291 kernel: audit: type=1334 audit(1696275038.343:90): prog-id=14 op=LOAD Oct 2 19:30:38.702320 kernel: audit: type=1334 audit(1696275038.343:91): prog-id=4 op=UNLOAD Oct 2 19:30:38.702337 kernel: audit: type=1334 audit(1696275038.343:92): prog-id=5 op=UNLOAD Oct 2 19:30:38.702355 kernel: audit: type=1131 audit(1696275038.345:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.702373 kernel: audit: type=1334 audit(1696275038.356:94): prog-id=12 op=UNLOAD Oct 2 19:30:38.702390 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:30:38.702409 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:30:38.702430 kernel: audit: type=1130 audit(1696275038.364:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.702451 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:30:38.702476 kernel: audit: type=1131 audit(1696275038.364:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.702496 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:30:38.702515 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:30:38.702535 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 19:30:38.702555 systemd[1]: Created slice system-getty.slice. Oct 2 19:30:38.702575 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:30:38.702597 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:30:38.702617 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:30:38.702637 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:30:38.702657 systemd[1]: Created slice user.slice. Oct 2 19:30:38.702693 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:30:38.702713 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:30:38.702732 systemd[1]: Set up automount boot.automount. Oct 2 19:30:38.702754 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:30:38.702773 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:30:38.702795 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:30:38.702821 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:30:38.702841 systemd[1]: Reached target integritysetup.target. Oct 2 19:30:38.702861 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:30:38.702880 systemd[1]: Reached target remote-fs.target. Oct 2 19:30:38.702900 systemd[1]: Reached target slices.target. Oct 2 19:30:38.702920 systemd[1]: Reached target swap.target. Oct 2 19:30:38.702940 systemd[1]: Reached target torcx.target. Oct 2 19:30:38.702960 systemd[1]: Reached target veritysetup.target. Oct 2 19:30:38.705256 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:30:38.705295 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:30:38.705315 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:30:38.705335 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:30:38.705353 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:30:38.705372 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:30:38.705394 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:30:38.705412 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:30:38.705432 systemd[1]: Mounting media.mount... Oct 2 19:30:38.705451 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:30:38.705470 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:30:38.705489 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:30:38.705507 systemd[1]: Mounting tmp.mount... Oct 2 19:30:38.705526 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:30:38.705546 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:30:38.705567 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:30:38.705586 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:30:38.705605 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:30:38.705623 systemd[1]: Starting modprobe@drm.service... Oct 2 19:30:38.705641 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:30:38.705660 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:30:38.705678 systemd[1]: Starting modprobe@loop.service... Oct 2 19:30:38.705697 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:30:38.705716 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:30:38.705738 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:30:38.705757 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:30:38.705776 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:30:38.705794 systemd[1]: Stopped systemd-journald.service. Oct 2 19:30:38.705813 systemd[1]: Starting systemd-journald.service... Oct 2 19:30:38.705831 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:30:38.705850 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:30:38.705868 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:30:38.705887 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:30:38.705910 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:30:38.705930 systemd[1]: Stopped verity-setup.service. Oct 2 19:30:38.705949 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:30:38.705969 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:30:38.705987 kernel: loop: module loaded Oct 2 19:30:38.706027 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:30:38.706047 systemd[1]: Mounted media.mount. Oct 2 19:30:38.706066 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:30:38.706085 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:30:38.706108 systemd[1]: Mounted tmp.mount. Oct 2 19:30:38.706127 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:30:38.706146 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:30:38.706165 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:30:38.706185 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:30:38.706203 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:30:38.706222 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:30:38.706241 systemd[1]: Finished modprobe@drm.service. Oct 2 19:30:38.706260 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:30:38.706282 kernel: fuse: init (API version 7.34) Oct 2 19:30:38.706305 systemd-journald[1401]: Journal started Oct 2 19:30:38.706381 systemd-journald[1401]: Runtime Journal (/run/log/journal/ec279c6dba793910a1991ac5fbff6fc0) is 4.8M, max 38.7M, 33.9M free. Oct 2 19:30:33.772000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:30:33.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:30:33.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:30:33.925000 audit: BPF prog-id=10 op=LOAD Oct 2 19:30:33.925000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:30:33.925000 audit: BPF prog-id=11 op=LOAD Oct 2 19:30:33.925000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:30:38.340000 audit: BPF prog-id=12 op=LOAD Oct 2 19:30:38.340000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:30:38.343000 audit: BPF prog-id=13 op=LOAD Oct 2 19:30:38.343000 audit: BPF prog-id=14 op=LOAD Oct 2 19:30:38.343000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:30:38.343000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:30:38.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.356000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:30:38.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.711377 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:30:38.711433 systemd[1]: Started systemd-journald.service. Oct 2 19:30:38.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.608000 audit: BPF prog-id=15 op=LOAD Oct 2 19:30:38.608000 audit: BPF prog-id=16 op=LOAD Oct 2 19:30:38.609000 audit: BPF prog-id=17 op=LOAD Oct 2 19:30:38.609000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:30:38.609000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:30:38.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.690000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:30:38.690000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fff031a7630 a2=4000 a3=7fff031a76cc items=0 ppid=1 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:38.690000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:30:38.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.340015 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:30:34.220733 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:30:38.346866 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:30:34.221269 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:34Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:30:38.713494 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:30:34.221289 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:34Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:30:38.713669 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:30:34.222181 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:34Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:30:38.715217 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:30:34.222223 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:34Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:30:38.715395 systemd[1]: Finished modprobe@loop.service. Oct 2 19:30:34.222267 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:34Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:30:38.717235 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:30:34.222281 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:34Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:30:38.718878 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:30:34.222486 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:34Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:30:38.720489 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:30:34.222526 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:34Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:30:38.722274 systemd[1]: Reached target network-pre.target. Oct 2 19:30:34.222545 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:34Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:30:38.724713 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:30:34.223736 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:34Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:30:38.727385 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:30:34.223776 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:34Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:30:34.223796 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:34Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:30:34.223811 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:34Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:30:34.223828 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:34Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:30:34.223842 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:34Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:30:38.732285 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:30:37.718793 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:37Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:30:37.719110 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:37Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:30:37.719229 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:37Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:30:37.719503 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:37Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:30:37.719561 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:37Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:30:37.719627 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:30:37Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:30:38.735078 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:30:38.737634 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:30:38.738857 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:30:38.740225 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:30:38.741315 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:30:38.742693 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:30:38.747451 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:30:38.751285 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:30:38.763677 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:30:38.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.765085 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:30:38.772339 systemd-journald[1401]: Time spent on flushing to /var/log/journal/ec279c6dba793910a1991ac5fbff6fc0 is 92.466ms for 1203 entries. Oct 2 19:30:38.772339 systemd-journald[1401]: System Journal (/var/log/journal/ec279c6dba793910a1991ac5fbff6fc0) is 8.0M, max 195.6M, 187.6M free. Oct 2 19:30:38.898967 systemd-journald[1401]: Received client request to flush runtime journal. Oct 2 19:30:38.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.787574 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:30:38.799969 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:30:38.804327 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:30:38.894969 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:30:38.897360 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:30:38.902716 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:30:38.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.914444 udevadm[1441]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 2 19:30:38.988016 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:30:38.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:38.990763 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:30:39.120857 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:30:39.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:39.672147 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:30:39.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:39.672000 audit: BPF prog-id=18 op=LOAD Oct 2 19:30:39.672000 audit: BPF prog-id=19 op=LOAD Oct 2 19:30:39.672000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:30:39.672000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:30:39.675068 systemd[1]: Starting systemd-udevd.service... Oct 2 19:30:39.701880 systemd-udevd[1444]: Using default interface naming scheme 'v252'. Oct 2 19:30:39.872810 systemd[1]: Started systemd-udevd.service. Oct 2 19:30:39.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:39.884000 audit: BPF prog-id=20 op=LOAD Oct 2 19:30:39.887436 systemd[1]: Starting systemd-networkd.service... Oct 2 19:30:39.898000 audit: BPF prog-id=21 op=LOAD Oct 2 19:30:39.899000 audit: BPF prog-id=22 op=LOAD Oct 2 19:30:39.899000 audit: BPF prog-id=23 op=LOAD Oct 2 19:30:39.902288 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:30:39.968670 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:30:39.980454 (udev-worker)[1447]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:30:40.016487 systemd[1]: Started systemd-userdbd.service. Oct 2 19:30:40.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:40.080020 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Oct 2 19:30:40.116398 kernel: ACPI: button: Power Button [PWRF] Oct 2 19:30:40.135037 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Oct 2 19:30:40.160096 kernel: ACPI: button: Sleep Button [SLPF] Oct 2 19:30:40.160205 systemd-networkd[1454]: lo: Link UP Oct 2 19:30:40.160211 systemd-networkd[1454]: lo: Gained carrier Oct 2 19:30:40.160940 systemd-networkd[1454]: Enumeration completed Oct 2 19:30:40.161273 systemd[1]: Started systemd-networkd.service. Oct 2 19:30:40.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:40.164684 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:30:40.166984 systemd-networkd[1454]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:30:40.173024 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:30:40.173586 systemd-networkd[1454]: eth0: Link UP Oct 2 19:30:40.173883 systemd-networkd[1454]: eth0: Gained carrier Oct 2 19:30:40.125000 audit[1455]: AVC avc: denied { confidentiality } for pid=1455 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:30:40.125000 audit[1455]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c932ac4100 a1=32194 a2=7fee73dffbc5 a3=5 items=106 ppid=1444 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:40.125000 audit: CWD cwd="/" Oct 2 19:30:40.125000 audit: PATH item=0 name=(null) inode=14270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=1 name=(null) inode=14271 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=2 name=(null) inode=14270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=3 name=(null) inode=14272 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=4 name=(null) inode=14270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=5 name=(null) inode=14273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=6 name=(null) inode=14273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=7 name=(null) inode=14274 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=8 name=(null) inode=14273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=9 name=(null) inode=14275 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=10 name=(null) inode=14273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=11 name=(null) inode=14276 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=12 name=(null) inode=14273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=13 name=(null) inode=14277 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=14 name=(null) inode=14273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=15 name=(null) inode=14278 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=16 name=(null) inode=14270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=17 name=(null) inode=14279 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=18 name=(null) inode=14279 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=19 name=(null) inode=14280 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=20 name=(null) inode=14279 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=21 name=(null) inode=14281 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=22 name=(null) inode=14279 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=23 name=(null) inode=14282 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=24 name=(null) inode=14279 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=25 name=(null) inode=14283 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=26 name=(null) inode=14279 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=27 name=(null) inode=14284 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=28 name=(null) inode=14270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=29 name=(null) inode=14285 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=30 name=(null) inode=14285 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=31 name=(null) inode=14286 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=32 name=(null) inode=14285 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=33 name=(null) inode=14287 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=34 name=(null) inode=14285 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=35 name=(null) inode=14288 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=36 name=(null) inode=14285 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=37 name=(null) inode=14289 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=38 name=(null) inode=14285 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=39 name=(null) inode=14290 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=40 name=(null) inode=14270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=41 name=(null) inode=14291 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=42 name=(null) inode=14291 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=43 name=(null) inode=14292 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=44 name=(null) inode=14291 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=45 name=(null) inode=14293 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=46 name=(null) inode=14291 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=47 name=(null) inode=14294 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=48 name=(null) inode=14291 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=49 name=(null) inode=14295 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=50 name=(null) inode=14291 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=51 name=(null) inode=14296 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=52 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=53 name=(null) inode=14297 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=54 name=(null) inode=14297 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=55 name=(null) inode=14298 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=56 name=(null) inode=14297 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=57 name=(null) inode=14299 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=58 name=(null) inode=14297 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=59 name=(null) inode=14300 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=60 name=(null) inode=14300 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=61 name=(null) inode=14301 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=62 name=(null) inode=14300 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=63 name=(null) inode=14302 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=64 name=(null) inode=14300 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=65 name=(null) inode=14303 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=66 name=(null) inode=14300 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=67 name=(null) inode=14304 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=68 name=(null) inode=14300 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=69 name=(null) inode=14305 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=70 name=(null) inode=14297 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=71 name=(null) inode=14306 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=72 name=(null) inode=14306 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=73 name=(null) inode=14307 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=74 name=(null) inode=14306 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=75 name=(null) inode=14308 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=76 name=(null) inode=14306 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=77 name=(null) inode=14309 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=78 name=(null) inode=14306 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=79 name=(null) inode=14310 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=80 name=(null) inode=14306 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=81 name=(null) inode=14311 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=82 name=(null) inode=14297 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=83 name=(null) inode=14312 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=84 name=(null) inode=14312 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=85 name=(null) inode=14313 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=86 name=(null) inode=14312 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=87 name=(null) inode=14314 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=88 name=(null) inode=14312 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=89 name=(null) inode=14315 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=90 name=(null) inode=14312 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=91 name=(null) inode=14316 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=92 name=(null) inode=14312 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=93 name=(null) inode=14317 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=94 name=(null) inode=14297 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=95 name=(null) inode=14318 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=96 name=(null) inode=14318 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=97 name=(null) inode=14319 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=98 name=(null) inode=14318 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=99 name=(null) inode=14320 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=100 name=(null) inode=14318 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=101 name=(null) inode=14321 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=102 name=(null) inode=14318 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=103 name=(null) inode=14322 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=104 name=(null) inode=14318 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PATH item=105 name=(null) inode=14323 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:30:40.125000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:30:40.185272 systemd-networkd[1454]: eth0: DHCPv4 address 172.31.22.61/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 19:30:40.218068 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 Oct 2 19:30:40.223042 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1458) Oct 2 19:30:40.236032 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Oct 2 19:30:40.265052 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:30:40.377376 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:30:40.507559 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:30:40.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:40.511988 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:30:40.582681 lvm[1558]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:30:40.614861 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:30:40.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:40.616688 systemd[1]: Reached target cryptsetup.target. Oct 2 19:30:40.620979 systemd[1]: Starting lvm2-activation.service... Oct 2 19:30:40.632312 lvm[1559]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:30:40.670338 systemd[1]: Finished lvm2-activation.service. Oct 2 19:30:40.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:40.671859 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:30:40.673252 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:30:40.673294 systemd[1]: Reached target local-fs.target. Oct 2 19:30:40.675105 systemd[1]: Reached target machines.target. Oct 2 19:30:40.679889 systemd[1]: Starting ldconfig.service... Oct 2 19:30:40.682325 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:30:40.682401 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:30:40.686314 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:30:40.692481 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:30:40.696756 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:30:40.701748 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:30:40.701855 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:30:40.703720 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:30:40.730515 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1561 (bootctl) Oct 2 19:30:40.732341 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:30:40.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:40.748603 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:30:40.751048 systemd-tmpfiles[1564]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:30:40.752189 systemd-tmpfiles[1564]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:30:40.763044 systemd-tmpfiles[1564]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:30:40.868028 systemd-fsck[1569]: fsck.fat 4.2 (2021-01-31) Oct 2 19:30:40.868028 systemd-fsck[1569]: /dev/nvme0n1p1: 789 files, 115069/258078 clusters Oct 2 19:30:40.869706 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:30:40.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:40.874363 systemd[1]: Mounting boot.mount... Oct 2 19:30:40.892164 systemd[1]: Mounted boot.mount. Oct 2 19:30:40.921538 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:30:40.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:41.054030 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:30:41.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:41.056787 systemd[1]: Starting audit-rules.service... Oct 2 19:30:41.058970 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:30:41.063500 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:30:41.064000 audit: BPF prog-id=24 op=LOAD Oct 2 19:30:41.069000 audit: BPF prog-id=25 op=LOAD Oct 2 19:30:41.067863 systemd[1]: Starting systemd-resolved.service... Oct 2 19:30:41.071327 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:30:41.073611 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:30:41.079000 audit[1589]: SYSTEM_BOOT pid=1589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:30:41.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:41.087073 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:30:41.088942 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:30:41.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:41.094464 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:30:41.165282 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:30:41.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:41.298660 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:30:41.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:41.300512 systemd[1]: Reached target time-set.target. Oct 2 19:30:41.373656 systemd-resolved[1587]: Positive Trust Anchors: Oct 2 19:30:41.373726 systemd-resolved[1587]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:30:41.373772 systemd-resolved[1587]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:30:41.399000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:30:41.399000 audit[1606]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdeb588940 a2=420 a3=0 items=0 ppid=1583 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:41.399000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:30:41.401496 augenrules[1606]: No rules Oct 2 19:30:41.402163 systemd[1]: Finished audit-rules.service. Oct 2 19:30:41.611373 systemd-timesyncd[1588]: Contacted time server 216.31.16.12:123 (0.flatcar.pool.ntp.org). Oct 2 19:30:41.611474 systemd-timesyncd[1588]: Initial clock synchronization to Mon 2023-10-02 19:30:41.456347 UTC. Oct 2 19:30:41.719703 systemd-resolved[1587]: Defaulting to hostname 'linux'. Oct 2 19:30:41.721558 systemd[1]: Started systemd-resolved.service. Oct 2 19:30:41.722677 systemd[1]: Reached target network.target. Oct 2 19:30:41.723801 systemd[1]: Reached target nss-lookup.target. Oct 2 19:30:41.900711 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:30:41.901715 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:30:42.131128 systemd-networkd[1454]: eth0: Gained IPv6LL Oct 2 19:30:42.133334 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:30:42.134609 systemd[1]: Reached target network-online.target. Oct 2 19:30:42.459259 ldconfig[1560]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:30:42.465086 systemd[1]: Finished ldconfig.service. Oct 2 19:30:42.468403 systemd[1]: Starting systemd-update-done.service... Oct 2 19:30:42.482030 systemd[1]: Finished systemd-update-done.service. Oct 2 19:30:42.484112 systemd[1]: Reached target sysinit.target. Oct 2 19:30:42.486718 systemd[1]: Started motdgen.path. Oct 2 19:30:42.489861 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:30:42.492297 systemd[1]: Started logrotate.timer. Oct 2 19:30:42.494256 systemd[1]: Started mdadm.timer. Oct 2 19:30:42.495173 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:30:42.496247 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:30:42.496277 systemd[1]: Reached target paths.target. Oct 2 19:30:42.497596 systemd[1]: Reached target timers.target. Oct 2 19:30:42.498923 systemd[1]: Listening on dbus.socket. Oct 2 19:30:42.501343 systemd[1]: Starting docker.socket... Oct 2 19:30:42.506571 systemd[1]: Listening on sshd.socket. Oct 2 19:30:42.514180 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:30:42.516572 systemd[1]: Listening on docker.socket. Oct 2 19:30:42.521053 systemd[1]: Reached target sockets.target. Oct 2 19:30:42.522130 systemd[1]: Reached target basic.target. Oct 2 19:30:42.523851 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:30:42.523883 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:30:42.525348 systemd[1]: Started amazon-ssm-agent.service. Oct 2 19:30:42.529283 systemd[1]: Starting containerd.service... Oct 2 19:30:42.533087 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 19:30:42.537492 systemd[1]: Starting dbus.service... Oct 2 19:30:42.541794 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:30:42.547269 systemd[1]: Starting extend-filesystems.service... Oct 2 19:30:42.549127 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:30:42.552545 systemd[1]: Starting motdgen.service... Oct 2 19:30:42.556178 systemd[1]: Started nvidia.service. Oct 2 19:30:42.562366 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:30:42.576721 systemd[1]: Starting prepare-critools.service... Oct 2 19:30:42.581341 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:30:42.584862 systemd[1]: Starting sshd-keygen.service... Oct 2 19:30:42.593291 systemd[1]: Starting systemd-logind.service... Oct 2 19:30:42.598111 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:30:42.598182 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 19:30:42.600437 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:30:42.601828 systemd[1]: Starting update-engine.service... Oct 2 19:30:42.636644 jq[1634]: true Oct 2 19:30:42.604774 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:30:42.616756 systemd[1]: Created slice system-sshd.slice. Oct 2 19:30:42.660890 jq[1642]: true Oct 2 19:30:42.683926 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:30:42.684181 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:30:42.689489 tar[1640]: ./ Oct 2 19:30:42.692262 tar[1640]: ./loopback Oct 2 19:30:42.704589 jq[1622]: false Oct 2 19:30:42.705541 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:30:42.705787 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:30:42.730846 tar[1637]: crictl Oct 2 19:30:42.768540 extend-filesystems[1623]: Found nvme0n1 Oct 2 19:30:42.770064 extend-filesystems[1623]: Found nvme0n1p1 Oct 2 19:30:42.773576 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:30:42.773810 systemd[1]: Finished motdgen.service. Oct 2 19:30:42.849963 extend-filesystems[1623]: Found nvme0n1p2 Oct 2 19:30:42.849963 extend-filesystems[1623]: Found nvme0n1p3 Oct 2 19:30:42.849963 extend-filesystems[1623]: Found usr Oct 2 19:30:42.849963 extend-filesystems[1623]: Found nvme0n1p4 Oct 2 19:30:42.849963 extend-filesystems[1623]: Found nvme0n1p6 Oct 2 19:30:42.849963 extend-filesystems[1623]: Found nvme0n1p7 Oct 2 19:30:42.849963 extend-filesystems[1623]: Found nvme0n1p9 Oct 2 19:30:42.849963 extend-filesystems[1623]: Checking size of /dev/nvme0n1p9 Oct 2 19:30:42.917050 dbus-daemon[1621]: [system] SELinux support is enabled Oct 2 19:30:42.924479 extend-filesystems[1623]: Resized partition /dev/nvme0n1p9 Oct 2 19:30:42.917252 systemd[1]: Started dbus.service. Oct 2 19:30:42.919017 dbus-daemon[1621]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1454 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 2 19:30:42.921402 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:30:42.921433 systemd[1]: Reached target system-config.target. Oct 2 19:30:42.922772 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:30:42.922796 systemd[1]: Reached target user-config.target. Oct 2 19:30:42.931200 dbus-daemon[1621]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 19:30:42.938507 systemd[1]: Starting systemd-hostnamed.service... Oct 2 19:30:42.950129 extend-filesystems[1682]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 19:30:42.955013 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Oct 2 19:30:43.026499 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Oct 2 19:30:43.075292 extend-filesystems[1682]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Oct 2 19:30:43.075292 extend-filesystems[1682]: old_desc_blocks = 1, new_desc_blocks = 1 Oct 2 19:30:43.075292 extend-filesystems[1682]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Oct 2 19:30:43.090622 extend-filesystems[1623]: Resized filesystem in /dev/nvme0n1p9 Oct 2 19:30:43.095039 amazon-ssm-agent[1618]: 2023/10/02 19:30:43 Failed to load instance info from vault. RegistrationKey does not exist. Oct 2 19:30:43.095039 amazon-ssm-agent[1618]: Initializing new seelog logger Oct 2 19:30:43.095039 amazon-ssm-agent[1618]: New Seelog Logger Creation Complete Oct 2 19:30:43.076306 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:30:43.095473 update_engine[1633]: I1002 19:30:43.075254 1633 main.cc:92] Flatcar Update Engine starting Oct 2 19:30:43.095473 update_engine[1633]: I1002 19:30:43.090291 1633 update_check_scheduler.cc:74] Next update check in 5m1s Oct 2 19:30:43.076515 systemd[1]: Finished extend-filesystems.service. Oct 2 19:30:43.090198 systemd[1]: Started update-engine.service. Oct 2 19:30:43.095385 systemd[1]: Started locksmithd.service. Oct 2 19:30:43.096864 amazon-ssm-agent[1618]: 2023/10/02 19:30:43 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 19:30:43.096864 amazon-ssm-agent[1618]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 19:30:43.102322 bash[1685]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:30:43.102217 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:30:43.111106 amazon-ssm-agent[1618]: 2023/10/02 19:30:43 processing appconfig overrides Oct 2 19:30:43.138258 env[1641]: time="2023-10-02T19:30:43.138194432Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:30:43.178622 tar[1640]: ./bandwidth Oct 2 19:30:43.214025 systemd-logind[1632]: Watching system buttons on /dev/input/event1 (Power Button) Oct 2 19:30:43.214059 systemd-logind[1632]: Watching system buttons on /dev/input/event2 (Sleep Button) Oct 2 19:30:43.214082 systemd-logind[1632]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:30:43.215159 systemd-logind[1632]: New seat seat0. Oct 2 19:30:43.218811 systemd[1]: Started systemd-logind.service. Oct 2 19:30:43.277778 systemd[1]: nvidia.service: Deactivated successfully. Oct 2 19:30:43.356001 env[1641]: time="2023-10-02T19:30:43.355879110Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:30:43.356116 env[1641]: time="2023-10-02T19:30:43.356078452Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:30:43.359179 dbus-daemon[1621]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 2 19:30:43.359356 systemd[1]: Started systemd-hostnamed.service. Oct 2 19:30:43.362394 dbus-daemon[1621]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1683 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 2 19:30:43.366070 systemd[1]: Starting polkit.service... Oct 2 19:30:43.372627 env[1641]: time="2023-10-02T19:30:43.372568903Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:30:43.372627 env[1641]: time="2023-10-02T19:30:43.372626027Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:30:43.372954 env[1641]: time="2023-10-02T19:30:43.372922760Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:30:43.373039 env[1641]: time="2023-10-02T19:30:43.372957162Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:30:43.373039 env[1641]: time="2023-10-02T19:30:43.372986956Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:30:43.373039 env[1641]: time="2023-10-02T19:30:43.373021524Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:30:43.373158 env[1641]: time="2023-10-02T19:30:43.373123998Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:30:43.373452 env[1641]: time="2023-10-02T19:30:43.373418577Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:30:43.373678 env[1641]: time="2023-10-02T19:30:43.373647099Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:30:43.373876 env[1641]: time="2023-10-02T19:30:43.373679811Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:30:43.373925 env[1641]: time="2023-10-02T19:30:43.373883324Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:30:43.373925 env[1641]: time="2023-10-02T19:30:43.373903750Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:30:43.383137 env[1641]: time="2023-10-02T19:30:43.383090025Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:30:43.383278 env[1641]: time="2023-10-02T19:30:43.383155308Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:30:43.383278 env[1641]: time="2023-10-02T19:30:43.383174092Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:30:43.383435 env[1641]: time="2023-10-02T19:30:43.383300004Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:30:43.383435 env[1641]: time="2023-10-02T19:30:43.383323216Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:30:43.383435 env[1641]: time="2023-10-02T19:30:43.383342084Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:30:43.383435 env[1641]: time="2023-10-02T19:30:43.383429838Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:30:43.383598 env[1641]: time="2023-10-02T19:30:43.383450019Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:30:43.383598 env[1641]: time="2023-10-02T19:30:43.383485485Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:30:43.383598 env[1641]: time="2023-10-02T19:30:43.383506593Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:30:43.383598 env[1641]: time="2023-10-02T19:30:43.383528954Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:30:43.383598 env[1641]: time="2023-10-02T19:30:43.383561566Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:30:43.383906 env[1641]: time="2023-10-02T19:30:43.383866570Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:30:43.384037 env[1641]: time="2023-10-02T19:30:43.384016332Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:30:43.384720 env[1641]: time="2023-10-02T19:30:43.384675590Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:30:43.384798 env[1641]: time="2023-10-02T19:30:43.384738714Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:30:43.384798 env[1641]: time="2023-10-02T19:30:43.384758568Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:30:43.384924 env[1641]: time="2023-10-02T19:30:43.384903598Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:30:43.384970 env[1641]: time="2023-10-02T19:30:43.384942352Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:30:43.384970 env[1641]: time="2023-10-02T19:30:43.384963321Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:30:43.385065 env[1641]: time="2023-10-02T19:30:43.384979878Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:30:43.385065 env[1641]: time="2023-10-02T19:30:43.385020848Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:30:43.385065 env[1641]: time="2023-10-02T19:30:43.385040181Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:30:43.385065 env[1641]: time="2023-10-02T19:30:43.385059846Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:30:43.385217 env[1641]: time="2023-10-02T19:30:43.385092190Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:30:43.385217 env[1641]: time="2023-10-02T19:30:43.385113427Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:30:43.385335 env[1641]: time="2023-10-02T19:30:43.385301013Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:30:43.385385 env[1641]: time="2023-10-02T19:30:43.385345211Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:30:43.385385 env[1641]: time="2023-10-02T19:30:43.385365627Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:30:43.385461 env[1641]: time="2023-10-02T19:30:43.385401824Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:30:43.385461 env[1641]: time="2023-10-02T19:30:43.385424612Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:30:43.385461 env[1641]: time="2023-10-02T19:30:43.385441279Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:30:43.385568 env[1641]: time="2023-10-02T19:30:43.385480798Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:30:43.385568 env[1641]: time="2023-10-02T19:30:43.385526281Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:30:43.385952 env[1641]: time="2023-10-02T19:30:43.385869516Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:30:43.389092 env[1641]: time="2023-10-02T19:30:43.385963621Z" level=info msg="Connect containerd service" Oct 2 19:30:43.389092 env[1641]: time="2023-10-02T19:30:43.386154666Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:30:43.389092 env[1641]: time="2023-10-02T19:30:43.387180556Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:30:43.389092 env[1641]: time="2023-10-02T19:30:43.387261350Z" level=info msg="Start subscribing containerd event" Oct 2 19:30:43.389092 env[1641]: time="2023-10-02T19:30:43.387307508Z" level=info msg="Start recovering state" Oct 2 19:30:43.391134 env[1641]: time="2023-10-02T19:30:43.391109221Z" level=info msg="Start event monitor" Oct 2 19:30:43.391255 env[1641]: time="2023-10-02T19:30:43.391238987Z" level=info msg="Start snapshots syncer" Oct 2 19:30:43.391344 env[1641]: time="2023-10-02T19:30:43.391331766Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:30:43.391437 env[1641]: time="2023-10-02T19:30:43.391422581Z" level=info msg="Start streaming server" Oct 2 19:30:43.392329 env[1641]: time="2023-10-02T19:30:43.392293012Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:30:43.392583 env[1641]: time="2023-10-02T19:30:43.392564567Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:30:43.393234 systemd[1]: Started containerd.service. Oct 2 19:30:43.421131 env[1641]: time="2023-10-02T19:30:43.421080592Z" level=info msg="containerd successfully booted in 0.284511s" Oct 2 19:30:43.432521 polkitd[1722]: Started polkitd version 121 Oct 2 19:30:43.452333 tar[1640]: ./ptp Oct 2 19:30:43.459473 polkitd[1722]: Loading rules from directory /etc/polkit-1/rules.d Oct 2 19:30:43.459779 polkitd[1722]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 2 19:30:43.506807 polkitd[1722]: Finished loading, compiling and executing 2 rules Oct 2 19:30:43.508076 dbus-daemon[1621]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 2 19:30:43.508282 systemd[1]: Started polkit.service. Oct 2 19:30:43.511465 polkitd[1722]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 2 19:30:43.546627 systemd-hostnamed[1683]: Hostname set to (transient) Oct 2 19:30:43.546740 systemd-resolved[1587]: System hostname changed to 'ip-172-31-22-61'. Oct 2 19:30:43.700166 coreos-metadata[1620]: Oct 02 19:30:43.700 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Oct 2 19:30:43.703598 coreos-metadata[1620]: Oct 02 19:30:43.703 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Oct 2 19:30:43.706210 coreos-metadata[1620]: Oct 02 19:30:43.706 INFO Fetch successful Oct 2 19:30:43.706210 coreos-metadata[1620]: Oct 02 19:30:43.706 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Oct 2 19:30:43.707308 coreos-metadata[1620]: Oct 02 19:30:43.706 INFO Fetch successful Oct 2 19:30:43.710014 unknown[1620]: wrote ssh authorized keys file for user: core Oct 2 19:30:43.714849 tar[1640]: ./vlan Oct 2 19:30:43.742023 update-ssh-keys[1776]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:30:43.742502 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 19:30:43.920663 amazon-ssm-agent[1618]: 2023-10-02 19:30:43 INFO Entering SSM Agent hibernate - AccessDeniedException: User: arn:aws:sts::075585003325:assumed-role/jenkins-test/i-0fdabe0a2e35a3734 is not authorized to perform: ssm:UpdateInstanceInformation on resource: arn:aws:ec2:us-west-2:075585003325:instance/i-0fdabe0a2e35a3734 because no identity-based policy allows the ssm:UpdateInstanceInformation action Oct 2 19:30:43.920663 amazon-ssm-agent[1618]: status code: 400, request id: 2f4282b1-875a-4801-bd86-2db35280650a Oct 2 19:30:43.921619 amazon-ssm-agent[1618]: 2023-10-02 19:30:43 INFO Agent is in hibernate mode. Reducing logging. Logging will be reduced to one log per backoff period Oct 2 19:30:43.947312 tar[1640]: ./host-device Oct 2 19:30:44.061059 tar[1640]: ./tuning Oct 2 19:30:44.161567 tar[1640]: ./vrf Oct 2 19:30:44.220533 tar[1640]: ./sbr Oct 2 19:30:44.277953 tar[1640]: ./tap Oct 2 19:30:44.379374 tar[1640]: ./dhcp Oct 2 19:30:44.627867 tar[1640]: ./static Oct 2 19:30:44.669180 systemd[1]: Finished prepare-critools.service. Oct 2 19:30:44.689776 tar[1640]: ./firewall Oct 2 19:30:44.743577 tar[1640]: ./macvlan Oct 2 19:30:44.792943 tar[1640]: ./dummy Oct 2 19:30:44.841157 tar[1640]: ./bridge Oct 2 19:30:44.893908 tar[1640]: ./ipvlan Oct 2 19:30:44.961944 tar[1640]: ./portmap Oct 2 19:30:45.015742 tar[1640]: ./host-local Oct 2 19:30:45.098888 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:30:45.264710 locksmithd[1696]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:30:46.247864 sshd_keygen[1662]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:30:46.273747 systemd[1]: Finished sshd-keygen.service. Oct 2 19:30:46.278478 systemd[1]: Starting issuegen.service... Oct 2 19:30:46.281233 systemd[1]: Started sshd@0-172.31.22.61:22-139.178.89.65:55078.service. Oct 2 19:30:46.294262 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:30:46.294476 systemd[1]: Finished issuegen.service. Oct 2 19:30:46.298106 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:30:46.312263 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:30:46.315276 systemd[1]: Started getty@tty1.service. Oct 2 19:30:46.319286 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:30:46.321214 systemd[1]: Reached target getty.target. Oct 2 19:30:46.323119 systemd[1]: Reached target multi-user.target. Oct 2 19:30:46.327728 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:30:46.340874 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:30:46.341088 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:30:46.342852 systemd[1]: Startup finished in 684ms (kernel) + 11.829s (initrd) + 12.695s (userspace) = 25.209s. Oct 2 19:30:46.719894 sshd[1824]: Accepted publickey for core from 139.178.89.65 port 55078 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:30:46.722456 sshd[1824]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:30:46.736083 systemd[1]: Created slice user-500.slice. Oct 2 19:30:46.738862 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:30:46.749680 systemd-logind[1632]: New session 1 of user core. Oct 2 19:30:46.763626 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:30:46.766356 systemd[1]: Starting user@500.service... Oct 2 19:30:46.770797 (systemd)[1833]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:30:46.980182 systemd[1833]: Queued start job for default target default.target. Oct 2 19:30:46.982400 systemd[1833]: Reached target paths.target. Oct 2 19:30:46.982934 systemd[1833]: Reached target sockets.target. Oct 2 19:30:46.982957 systemd[1833]: Reached target timers.target. Oct 2 19:30:46.982979 systemd[1833]: Reached target basic.target. Oct 2 19:30:46.983063 systemd[1833]: Reached target default.target. Oct 2 19:30:46.983936 systemd[1833]: Startup finished in 202ms. Oct 2 19:30:46.985034 systemd[1]: Started user@500.service. Oct 2 19:30:46.990520 systemd[1]: Started session-1.scope. Oct 2 19:30:47.159169 systemd[1]: Started sshd@1-172.31.22.61:22-139.178.89.65:46642.service. Oct 2 19:30:47.335938 sshd[1842]: Accepted publickey for core from 139.178.89.65 port 46642 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:30:47.339644 sshd[1842]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:30:47.348052 systemd-logind[1632]: New session 2 of user core. Oct 2 19:30:47.349880 systemd[1]: Started session-2.scope. Oct 2 19:30:47.512658 sshd[1842]: pam_unix(sshd:session): session closed for user core Oct 2 19:30:47.517258 systemd[1]: sshd@1-172.31.22.61:22-139.178.89.65:46642.service: Deactivated successfully. Oct 2 19:30:47.518592 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 19:30:47.519668 systemd-logind[1632]: Session 2 logged out. Waiting for processes to exit. Oct 2 19:30:47.521109 systemd-logind[1632]: Removed session 2. Oct 2 19:30:47.541869 systemd[1]: Started sshd@2-172.31.22.61:22-139.178.89.65:46646.service. Oct 2 19:30:47.712141 sshd[1848]: Accepted publickey for core from 139.178.89.65 port 46646 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:30:47.714229 sshd[1848]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:30:47.723096 systemd-logind[1632]: New session 3 of user core. Oct 2 19:30:47.724605 systemd[1]: Started session-3.scope. Oct 2 19:30:47.842094 sshd[1848]: pam_unix(sshd:session): session closed for user core Oct 2 19:30:47.845195 systemd[1]: sshd@2-172.31.22.61:22-139.178.89.65:46646.service: Deactivated successfully. Oct 2 19:30:47.846110 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 19:30:47.846816 systemd-logind[1632]: Session 3 logged out. Waiting for processes to exit. Oct 2 19:30:47.847845 systemd-logind[1632]: Removed session 3. Oct 2 19:30:47.867860 systemd[1]: Started sshd@3-172.31.22.61:22-139.178.89.65:46654.service. Oct 2 19:30:48.030864 sshd[1854]: Accepted publickey for core from 139.178.89.65 port 46654 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:30:48.032512 sshd[1854]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:30:48.037681 systemd[1]: Started session-4.scope. Oct 2 19:30:48.038154 systemd-logind[1632]: New session 4 of user core. Oct 2 19:30:48.165302 sshd[1854]: pam_unix(sshd:session): session closed for user core Oct 2 19:30:48.169004 systemd[1]: sshd@3-172.31.22.61:22-139.178.89.65:46654.service: Deactivated successfully. Oct 2 19:30:48.169811 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:30:48.170522 systemd-logind[1632]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:30:48.171516 systemd-logind[1632]: Removed session 4. Oct 2 19:30:48.190017 systemd[1]: Started sshd@4-172.31.22.61:22-139.178.89.65:46658.service. Oct 2 19:30:48.355083 sshd[1860]: Accepted publickey for core from 139.178.89.65 port 46658 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:30:48.356748 sshd[1860]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:30:48.366904 systemd-logind[1632]: New session 5 of user core. Oct 2 19:30:48.367809 systemd[1]: Started session-5.scope. Oct 2 19:30:48.534786 sudo[1863]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:30:48.535102 sudo[1863]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:30:48.545259 dbus-daemon[1621]: н\x86\xc4\u0010V: received setenforce notice (enforcing=1590213008) Oct 2 19:30:48.547773 sudo[1863]: pam_unix(sudo:session): session closed for user root Oct 2 19:30:48.572074 sshd[1860]: pam_unix(sshd:session): session closed for user core Oct 2 19:30:48.575943 systemd[1]: sshd@4-172.31.22.61:22-139.178.89.65:46658.service: Deactivated successfully. Oct 2 19:30:48.577166 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:30:48.577820 systemd-logind[1632]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:30:48.578868 systemd-logind[1632]: Removed session 5. Oct 2 19:30:48.597783 systemd[1]: Started sshd@5-172.31.22.61:22-139.178.89.65:46674.service. Oct 2 19:30:48.760435 sshd[1867]: Accepted publickey for core from 139.178.89.65 port 46674 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:30:48.765369 sshd[1867]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:30:48.771019 systemd[1]: Started session-6.scope. Oct 2 19:30:48.771489 systemd-logind[1632]: New session 6 of user core. Oct 2 19:30:48.869917 sudo[1871]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:30:48.870314 sudo[1871]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:30:48.874026 sudo[1871]: pam_unix(sudo:session): session closed for user root Oct 2 19:30:48.879528 sudo[1870]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:30:48.879863 sudo[1870]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:30:48.890459 systemd[1]: Stopping audit-rules.service... Oct 2 19:30:48.891000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:30:48.893457 kernel: kauditd_printk_skb: 176 callbacks suppressed Oct 2 19:30:48.893539 kernel: audit: type=1305 audit(1696275048.891:160): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:30:48.895249 auditctl[1874]: No rules Oct 2 19:30:48.891000 audit[1874]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe1c2601e0 a2=420 a3=0 items=0 ppid=1 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:48.897369 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:30:48.897633 systemd[1]: Stopped audit-rules.service. Oct 2 19:30:48.904648 kernel: audit: type=1300 audit(1696275048.891:160): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe1c2601e0 a2=420 a3=0 items=0 ppid=1 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:48.904292 systemd[1]: Starting audit-rules.service... Oct 2 19:30:48.891000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:30:48.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:48.913592 kernel: audit: type=1327 audit(1696275048.891:160): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:30:48.913699 kernel: audit: type=1131 audit(1696275048.896:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:48.931000 augenrules[1891]: No rules Oct 2 19:30:48.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:48.931814 systemd[1]: Finished audit-rules.service. Oct 2 19:30:48.938221 sudo[1870]: pam_unix(sudo:session): session closed for user root Oct 2 19:30:48.943770 kernel: audit: type=1130 audit(1696275048.931:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:48.943860 kernel: audit: type=1106 audit(1696275048.937:163): pid=1870 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:30:48.937000 audit[1870]: USER_END pid=1870 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:30:48.937000 audit[1870]: CRED_DISP pid=1870 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:30:48.950092 kernel: audit: type=1104 audit(1696275048.937:164): pid=1870 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:30:48.965552 sshd[1867]: pam_unix(sshd:session): session closed for user core Oct 2 19:30:48.966000 audit[1867]: USER_END pid=1867 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:48.970833 systemd[1]: sshd@5-172.31.22.61:22-139.178.89.65:46674.service: Deactivated successfully. Oct 2 19:30:48.972257 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:30:48.976020 kernel: audit: type=1106 audit(1696275048.966:165): pid=1867 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:48.966000 audit[1867]: CRED_DISP pid=1867 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:48.982029 kernel: audit: type=1104 audit(1696275048.966:166): pid=1867 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:48.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.22.61:22-139.178.89.65:46674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:48.982220 systemd-logind[1632]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:30:48.988241 kernel: audit: type=1131 audit(1696275048.966:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.22.61:22-139.178.89.65:46674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:48.987603 systemd-logind[1632]: Removed session 6. Oct 2 19:30:48.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.22.61:22-139.178.89.65:46686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:48.992602 systemd[1]: Started sshd@6-172.31.22.61:22-139.178.89.65:46686.service. Oct 2 19:30:49.165000 audit[1897]: USER_ACCT pid=1897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:49.168552 sshd[1897]: Accepted publickey for core from 139.178.89.65 port 46686 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:30:49.167000 audit[1897]: CRED_ACQ pid=1897 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:49.167000 audit[1897]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe753b00f0 a2=3 a3=0 items=0 ppid=1 pid=1897 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:49.167000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:30:49.169357 sshd[1897]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:30:49.179941 systemd[1]: Started session-7.scope. Oct 2 19:30:49.180508 systemd-logind[1632]: New session 7 of user core. Oct 2 19:30:49.189000 audit[1897]: USER_START pid=1897 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:49.192000 audit[1899]: CRED_ACQ pid=1899 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:49.286000 audit[1900]: USER_ACCT pid=1900 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:30:49.287634 sudo[1900]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:30:49.287000 audit[1900]: CRED_REFR pid=1900 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:30:49.288560 sudo[1900]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:30:49.291000 audit[1900]: USER_START pid=1900 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:30:49.923639 systemd[1]: Starting docker.service... Oct 2 19:30:49.969838 env[1915]: time="2023-10-02T19:30:49.969791631Z" level=info msg="Starting up" Oct 2 19:30:49.971492 env[1915]: time="2023-10-02T19:30:49.971452301Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:30:49.971492 env[1915]: time="2023-10-02T19:30:49.971478651Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:30:49.971636 env[1915]: time="2023-10-02T19:30:49.971509072Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:30:49.971636 env[1915]: time="2023-10-02T19:30:49.971523373Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:30:49.973391 env[1915]: time="2023-10-02T19:30:49.973370628Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:30:49.973488 env[1915]: time="2023-10-02T19:30:49.973478189Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:30:49.973537 env[1915]: time="2023-10-02T19:30:49.973527444Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:30:49.973576 env[1915]: time="2023-10-02T19:30:49.973568880Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:30:50.320973 env[1915]: time="2023-10-02T19:30:50.320813095Z" level=info msg="Loading containers: start." Oct 2 19:30:50.425000 audit[1946]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1946 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.425000 audit[1946]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd32a7e5c0 a2=0 a3=7ffd32a7e5ac items=0 ppid=1915 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.425000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 19:30:50.428000 audit[1948]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1948 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.428000 audit[1948]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffdc74ee9d0 a2=0 a3=7ffdc74ee9bc items=0 ppid=1915 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.428000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 19:30:50.430000 audit[1950]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.430000 audit[1950]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc321c8190 a2=0 a3=7ffc321c817c items=0 ppid=1915 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.430000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:30:50.432000 audit[1952]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1952 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.432000 audit[1952]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff101f0360 a2=0 a3=7fff101f034c items=0 ppid=1915 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.432000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:30:50.436000 audit[1954]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1954 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.436000 audit[1954]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd1a3e8d50 a2=0 a3=7ffd1a3e8d3c items=0 ppid=1915 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.436000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 19:30:50.454000 audit[1959]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.454000 audit[1959]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffec7b91d70 a2=0 a3=7ffec7b91d5c items=0 ppid=1915 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.454000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 19:30:50.463000 audit[1961]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1961 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.463000 audit[1961]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcdc2f3880 a2=0 a3=7ffcdc2f386c items=0 ppid=1915 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.463000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 19:30:50.467000 audit[1963]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1963 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.467000 audit[1963]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fffa80f7850 a2=0 a3=7fffa80f783c items=0 ppid=1915 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.467000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 19:30:50.473000 audit[1965]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1965 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.473000 audit[1965]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd8ef9ae80 a2=0 a3=7ffd8ef9ae6c items=0 ppid=1915 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.473000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:30:50.488000 audit[1969]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1969 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.488000 audit[1969]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc1ebc6bc0 a2=0 a3=7ffc1ebc6bac items=0 ppid=1915 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.488000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:30:50.491000 audit[1970]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1970 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.491000 audit[1970]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe6550d2b0 a2=0 a3=7ffe6550d29c items=0 ppid=1915 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.491000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:30:50.509020 kernel: Initializing XFRM netlink socket Oct 2 19:30:50.565725 env[1915]: time="2023-10-02T19:30:50.565687807Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 19:30:50.568134 (udev-worker)[1925]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:30:50.662000 audit[1978]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1978 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.662000 audit[1978]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc3e58c3d0 a2=0 a3=7ffc3e58c3bc items=0 ppid=1915 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.662000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 19:30:50.729000 audit[1981]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1981 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.729000 audit[1981]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc807471e0 a2=0 a3=7ffc807471cc items=0 ppid=1915 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.729000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 19:30:50.735000 audit[1984]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1984 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.735000 audit[1984]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd82c88b80 a2=0 a3=7ffd82c88b6c items=0 ppid=1915 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.735000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 19:30:50.739000 audit[1986]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1986 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.739000 audit[1986]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffed2562e90 a2=0 a3=7ffed2562e7c items=0 ppid=1915 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.739000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 19:30:50.743000 audit[1988]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1988 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.743000 audit[1988]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe0499d820 a2=0 a3=7ffe0499d80c items=0 ppid=1915 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.743000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 19:30:50.745000 audit[1990]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1990 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.745000 audit[1990]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffdf0f3cd10 a2=0 a3=7ffdf0f3ccfc items=0 ppid=1915 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.745000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 19:30:50.748000 audit[1992]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.748000 audit[1992]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffcd50566f0 a2=0 a3=7ffcd50566dc items=0 ppid=1915 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.748000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 19:30:50.760000 audit[1995]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1995 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.760000 audit[1995]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc86f58790 a2=0 a3=7ffc86f5877c items=0 ppid=1915 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.760000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 19:30:50.764000 audit[1997]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1997 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.764000 audit[1997]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffdd6f1f3c0 a2=0 a3=7ffdd6f1f3ac items=0 ppid=1915 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.764000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:30:50.767000 audit[1999]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1999 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.767000 audit[1999]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd88889b90 a2=0 a3=7ffd88889b7c items=0 ppid=1915 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.767000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:30:50.770000 audit[2001]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2001 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.770000 audit[2001]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc3986a810 a2=0 a3=7ffc3986a7fc items=0 ppid=1915 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.770000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 19:30:50.772225 systemd-networkd[1454]: docker0: Link UP Oct 2 19:30:50.784000 audit[2005]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2005 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.784000 audit[2005]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffce1058d10 a2=0 a3=7ffce1058cfc items=0 ppid=1915 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.784000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:30:50.786000 audit[2006]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2006 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:30:50.786000 audit[2006]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdb1ba47f0 a2=0 a3=7ffdb1ba47dc items=0 ppid=1915 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:50.786000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:30:50.787682 env[1915]: time="2023-10-02T19:30:50.787646191Z" level=info msg="Loading containers: done." Oct 2 19:30:50.822711 env[1915]: time="2023-10-02T19:30:50.822628873Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 19:30:50.823509 env[1915]: time="2023-10-02T19:30:50.823478006Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 19:30:50.823673 env[1915]: time="2023-10-02T19:30:50.823651628Z" level=info msg="Daemon has completed initialization" Oct 2 19:30:50.849560 systemd[1]: Started docker.service. Oct 2 19:30:50.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:50.870018 env[1915]: time="2023-10-02T19:30:50.869906704Z" level=info msg="API listen on /run/docker.sock" Oct 2 19:30:50.912789 systemd[1]: Reloading. Oct 2 19:30:51.034673 /usr/lib/systemd/system-generators/torcx-generator[2051]: time="2023-10-02T19:30:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:30:51.034713 /usr/lib/systemd/system-generators/torcx-generator[2051]: time="2023-10-02T19:30:51Z" level=info msg="torcx already run" Oct 2 19:30:51.161189 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:30:51.161217 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:30:51.198654 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:30:51.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.295000 audit: BPF prog-id=34 op=LOAD Oct 2 19:30:51.295000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:30:51.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.296000 audit: BPF prog-id=35 op=LOAD Oct 2 19:30:51.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.296000 audit: BPF prog-id=36 op=LOAD Oct 2 19:30:51.296000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:30:51.296000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:30:51.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.299000 audit: BPF prog-id=37 op=LOAD Oct 2 19:30:51.299000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:30:51.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.299000 audit: BPF prog-id=38 op=LOAD Oct 2 19:30:51.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.300000 audit: BPF prog-id=39 op=LOAD Oct 2 19:30:51.300000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:30:51.300000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:30:51.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.301000 audit: BPF prog-id=40 op=LOAD Oct 2 19:30:51.301000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:30:51.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.302000 audit: BPF prog-id=41 op=LOAD Oct 2 19:30:51.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.302000 audit: BPF prog-id=42 op=LOAD Oct 2 19:30:51.302000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:30:51.302000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:30:51.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.304000 audit: BPF prog-id=43 op=LOAD Oct 2 19:30:51.304000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:30:51.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.305000 audit: BPF prog-id=44 op=LOAD Oct 2 19:30:51.305000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit: BPF prog-id=45 op=LOAD Oct 2 19:30:51.306000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit: BPF prog-id=46 op=LOAD Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.306000 audit: BPF prog-id=47 op=LOAD Oct 2 19:30:51.306000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:30:51.306000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:30:51.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.308000 audit: BPF prog-id=48 op=LOAD Oct 2 19:30:51.308000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:30:51.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit: BPF prog-id=49 op=LOAD Oct 2 19:30:51.309000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit: BPF prog-id=50 op=LOAD Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:51.309000 audit: BPF prog-id=51 op=LOAD Oct 2 19:30:51.309000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:30:51.309000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:30:51.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:51.325363 systemd[1]: Started kubelet.service. Oct 2 19:30:51.401106 kubelet[2103]: E1002 19:30:51.401048 2103 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:30:51.403216 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:30:51.403376 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:30:51.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:30:51.894618 env[1641]: time="2023-10-02T19:30:51.894564775Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\"" Oct 2 19:30:52.507818 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1027244155.mount: Deactivated successfully. Oct 2 19:30:57.358634 env[1641]: time="2023-10-02T19:30:57.358580724Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:30:57.361329 env[1641]: time="2023-10-02T19:30:57.361271552Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcab12b2dd16cce4efc5dd43c082469364f19ad978e922d110b74a42eff7cce,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:30:57.363890 env[1641]: time="2023-10-02T19:30:57.363834299Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:30:57.366176 env[1641]: time="2023-10-02T19:30:57.366121937Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:6beea2e5531a0606613594fd3ed92d71bbdcef99dd3237522049a0b32cad736c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:30:57.367368 env[1641]: time="2023-10-02T19:30:57.367328341Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\" returns image reference \"sha256:cdcab12b2dd16cce4efc5dd43c082469364f19ad978e922d110b74a42eff7cce\"" Oct 2 19:30:57.383870 env[1641]: time="2023-10-02T19:30:57.383825570Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\"" Oct 2 19:31:01.595043 env[1641]: time="2023-10-02T19:31:01.594906363Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:01.598390 env[1641]: time="2023-10-02T19:31:01.598339707Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:55f13c92defb1eb854040a76e366da866bdcb1cc31fd97b2cde94433c8bf3f57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:01.607200 env[1641]: time="2023-10-02T19:31:01.607146317Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:01.614328 env[1641]: time="2023-10-02T19:31:01.614247627Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6a42ce14d716205a99763f3c732c0a8f0ea041bdbbea7d2dfffcc53dafd7cac4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:01.617581 env[1641]: time="2023-10-02T19:31:01.617293449Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\" returns image reference \"sha256:55f13c92defb1eb854040a76e366da866bdcb1cc31fd97b2cde94433c8bf3f57\"" Oct 2 19:31:01.655702 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 19:31:01.664462 kernel: kauditd_printk_skb: 292 callbacks suppressed Oct 2 19:31:01.664538 kernel: audit: type=1130 audit(1696275061.655:410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:01.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:01.664882 env[1641]: time="2023-10-02T19:31:01.660255714Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\"" Oct 2 19:31:01.656004 systemd[1]: Stopped kubelet.service. Oct 2 19:31:01.662885 systemd[1]: Started kubelet.service. Oct 2 19:31:01.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:01.677185 kernel: audit: type=1131 audit(1696275061.655:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:01.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:01.684031 kernel: audit: type=1130 audit(1696275061.662:412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:01.757571 kubelet[2133]: E1002 19:31:01.757530 2133 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:31:01.764498 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:31:01.764714 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:31:01.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:31:01.772045 kernel: audit: type=1131 audit(1696275061.764:413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:31:04.040473 env[1641]: time="2023-10-02T19:31:04.040406669Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:04.048456 env[1641]: time="2023-10-02T19:31:04.048274374Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7a5d9d67a13f6ae031989bc2969ec55b06437725f397e6eb75b1dccac465a7b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:04.056624 env[1641]: time="2023-10-02T19:31:04.056571679Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:04.060326 env[1641]: time="2023-10-02T19:31:04.060276682Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:6511193f8114a2f011790619698efe12a8119ed9a17e2e36f4c1c759ccf173ab,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:04.061247 env[1641]: time="2023-10-02T19:31:04.061201053Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\" returns image reference \"sha256:7a5d9d67a13f6ae031989bc2969ec55b06437725f397e6eb75b1dccac465a7b8\"" Oct 2 19:31:04.073284 env[1641]: time="2023-10-02T19:31:04.073234878Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\"" Oct 2 19:31:05.921745 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1774930451.mount: Deactivated successfully. Oct 2 19:31:06.692084 env[1641]: time="2023-10-02T19:31:06.692028059Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:06.694525 env[1641]: time="2023-10-02T19:31:06.694478654Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c120fed2beb84b861c2382ce81ab046c0ae612e91264ef7c9e61df5900fa0bb0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:06.697642 env[1641]: time="2023-10-02T19:31:06.697599106Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:06.700375 env[1641]: time="2023-10-02T19:31:06.700331219Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:41c8f92d1cd571e0e36af431f35c78379f84f5daf5b85d43014a9940d697afcf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:06.700926 env[1641]: time="2023-10-02T19:31:06.700892273Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\" returns image reference \"sha256:c120fed2beb84b861c2382ce81ab046c0ae612e91264ef7c9e61df5900fa0bb0\"" Oct 2 19:31:06.713653 env[1641]: time="2023-10-02T19:31:06.713615072Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 19:31:07.213713 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2236528926.mount: Deactivated successfully. Oct 2 19:31:07.223827 env[1641]: time="2023-10-02T19:31:07.223774758Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:07.226738 env[1641]: time="2023-10-02T19:31:07.226688382Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:07.228869 env[1641]: time="2023-10-02T19:31:07.228824298Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:07.230563 env[1641]: time="2023-10-02T19:31:07.230522713Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:07.231198 env[1641]: time="2023-10-02T19:31:07.231162279Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Oct 2 19:31:07.254516 env[1641]: time="2023-10-02T19:31:07.254470764Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Oct 2 19:31:12.044669 kernel: audit: type=1130 audit(1696275072.014:414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:12.044942 kernel: audit: type=1131 audit(1696275072.014:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:12.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:12.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:12.015698 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 2 19:31:12.015890 systemd[1]: Stopped kubelet.service. Oct 2 19:31:12.036337 systemd[1]: Started kubelet.service. Oct 2 19:31:12.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:12.054028 kernel: audit: type=1130 audit(1696275072.035:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:12.147924 kubelet[2154]: E1002 19:31:12.147876 2154 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:31:12.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:31:12.150200 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:31:12.150329 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:31:12.157038 kernel: audit: type=1131 audit(1696275072.150:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:31:13.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:13.559516 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 2 19:31:13.566069 kernel: audit: type=1131 audit(1696275073.558:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:13.590261 kernel: audit: type=1334 audit(1696275073.583:419): prog-id=39 op=UNLOAD Oct 2 19:31:13.590536 kernel: audit: type=1334 audit(1696275073.583:420): prog-id=38 op=UNLOAD Oct 2 19:31:13.590662 kernel: audit: type=1334 audit(1696275073.583:421): prog-id=37 op=UNLOAD Oct 2 19:31:13.583000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:31:13.583000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:31:13.583000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:31:15.812841 env[1641]: time="2023-10-02T19:31:15.812785586Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:15.815821 env[1641]: time="2023-10-02T19:31:15.815777859Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:15.818535 env[1641]: time="2023-10-02T19:31:15.818494914Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:15.820548 env[1641]: time="2023-10-02T19:31:15.820514197Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:15.821369 env[1641]: time="2023-10-02T19:31:15.821326638Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9\"" Oct 2 19:31:15.836784 env[1641]: time="2023-10-02T19:31:15.836747199Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Oct 2 19:31:16.393022 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3130840620.mount: Deactivated successfully. Oct 2 19:31:17.363314 env[1641]: time="2023-10-02T19:31:17.363261895Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:17.366374 env[1641]: time="2023-10-02T19:31:17.366323296Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:17.369588 env[1641]: time="2023-10-02T19:31:17.369544380Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:17.372881 env[1641]: time="2023-10-02T19:31:17.372830836Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:17.373732 env[1641]: time="2023-10-02T19:31:17.373693311Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Oct 2 19:31:20.091177 systemd[1]: Stopped kubelet.service. Oct 2 19:31:20.102512 kernel: audit: type=1130 audit(1696275080.090:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:20.102645 kernel: audit: type=1131 audit(1696275080.090:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:20.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:20.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:20.129846 systemd[1]: Reloading. Oct 2 19:31:20.262440 /usr/lib/systemd/system-generators/torcx-generator[2251]: time="2023-10-02T19:31:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:31:20.262513 /usr/lib/systemd/system-generators/torcx-generator[2251]: time="2023-10-02T19:31:20Z" level=info msg="torcx already run" Oct 2 19:31:20.430358 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:31:20.430383 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:31:20.457863 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:31:20.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.566011 kernel: audit: type=1400 audit(1696275080.559:424): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.573061 kernel: audit: type=1400 audit(1696275080.559:425): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.580396 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:31:20.580522 kernel: audit: type=1400 audit(1696275080.559:426): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.580610 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:31:20.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.587605 kernel: audit: type=1400 audit(1696275080.559:427): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.587736 kernel: audit: backlog limit exceeded Oct 2 19:31:20.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.592889 kernel: audit: type=1400 audit(1696275080.559:428): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.564000 audit: BPF prog-id=52 op=LOAD Oct 2 19:31:20.564000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:31:20.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.564000 audit: BPF prog-id=53 op=LOAD Oct 2 19:31:20.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.564000 audit: BPF prog-id=54 op=LOAD Oct 2 19:31:20.565000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:31:20.565000 audit: BPF prog-id=36 op=UNLOAD Oct 2 19:31:20.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.571000 audit: BPF prog-id=55 op=LOAD Oct 2 19:31:20.571000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:31:20.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.573000 audit: BPF prog-id=56 op=LOAD Oct 2 19:31:20.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.573000 audit: BPF prog-id=57 op=LOAD Oct 2 19:31:20.573000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:31:20.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.593000 audit: BPF prog-id=58 op=LOAD Oct 2 19:31:20.593000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:31:20.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.594000 audit: BPF prog-id=59 op=LOAD Oct 2 19:31:20.594000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit: BPF prog-id=60 op=LOAD Oct 2 19:31:20.595000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit: BPF prog-id=61 op=LOAD Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.595000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:31:20.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.597000 audit: BPF prog-id=63 op=LOAD Oct 2 19:31:20.597000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit: BPF prog-id=64 op=LOAD Oct 2 19:31:20.598000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit: BPF prog-id=65 op=LOAD Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:20.598000 audit: BPF prog-id=66 op=LOAD Oct 2 19:31:20.598000 audit: BPF prog-id=50 op=UNLOAD Oct 2 19:31:20.598000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:31:20.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:20.629863 systemd[1]: Started kubelet.service. Oct 2 19:31:20.713042 kubelet[2303]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:31:20.713042 kubelet[2303]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:31:20.713042 kubelet[2303]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:31:20.713766 kubelet[2303]: I1002 19:31:20.713091 2303 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:31:21.250826 kubelet[2303]: I1002 19:31:21.250790 2303 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Oct 2 19:31:21.250826 kubelet[2303]: I1002 19:31:21.250823 2303 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:31:21.251141 kubelet[2303]: I1002 19:31:21.251120 2303 server.go:895] "Client rotation is on, will bootstrap in background" Oct 2 19:31:21.257397 kubelet[2303]: I1002 19:31:21.257368 2303 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:31:21.258163 kubelet[2303]: E1002 19:31:21.258146 2303 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.22.61:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.22.61:6443: connect: connection refused Oct 2 19:31:21.266435 kubelet[2303]: I1002 19:31:21.266376 2303 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:31:21.266870 kubelet[2303]: I1002 19:31:21.266851 2303 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:31:21.269529 kubelet[2303]: I1002 19:31:21.267121 2303 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Oct 2 19:31:21.270139 kubelet[2303]: I1002 19:31:21.269582 2303 topology_manager.go:138] "Creating topology manager with none policy" Oct 2 19:31:21.270139 kubelet[2303]: I1002 19:31:21.269603 2303 container_manager_linux.go:301] "Creating device plugin manager" Oct 2 19:31:21.270252 kubelet[2303]: I1002 19:31:21.270145 2303 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:31:21.270294 kubelet[2303]: I1002 19:31:21.270260 2303 kubelet.go:393] "Attempting to sync node with API server" Oct 2 19:31:21.270294 kubelet[2303]: I1002 19:31:21.270280 2303 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:31:21.270370 kubelet[2303]: I1002 19:31:21.270313 2303 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:31:21.270370 kubelet[2303]: I1002 19:31:21.270328 2303 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:31:21.271816 kubelet[2303]: W1002 19:31:21.271462 2303 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.22.61:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-22-61&limit=500&resourceVersion=0": dial tcp 172.31.22.61:6443: connect: connection refused Oct 2 19:31:21.271816 kubelet[2303]: E1002 19:31:21.271676 2303 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.22.61:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-22-61&limit=500&resourceVersion=0": dial tcp 172.31.22.61:6443: connect: connection refused Oct 2 19:31:21.271816 kubelet[2303]: W1002 19:31:21.271775 2303 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.22.61:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.22.61:6443: connect: connection refused Oct 2 19:31:21.272025 kubelet[2303]: E1002 19:31:21.271837 2303 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.22.61:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.22.61:6443: connect: connection refused Oct 2 19:31:21.272025 kubelet[2303]: I1002 19:31:21.271938 2303 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:31:21.272265 kubelet[2303]: W1002 19:31:21.272250 2303 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:31:21.272827 kubelet[2303]: I1002 19:31:21.272808 2303 server.go:1232] "Started kubelet" Oct 2 19:31:21.273000 audit[2303]: AVC avc: denied { mac_admin } for pid=2303 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:21.273000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:31:21.273000 audit[2303]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00007da70 a1=c000c2b818 a2=c00007d740 a3=25 items=0 ppid=1 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:21.273000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:31:21.275195 kubelet[2303]: I1002 19:31:21.275180 2303 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:31:21.274000 audit[2303]: AVC avc: denied { mac_admin } for pid=2303 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:21.274000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:31:21.274000 audit[2303]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c575e0 a1=c000c2b830 a2=c00007db00 a3=25 items=0 ppid=1 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:21.274000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:31:21.275573 kubelet[2303]: I1002 19:31:21.275559 2303 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:31:21.275729 kubelet[2303]: I1002 19:31:21.275717 2303 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:31:21.279676 kubelet[2303]: E1002 19:31:21.279219 2303 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-22-61.178a6132fc9c7dd3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-22-61", UID:"ip-172-31-22-61", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-22-61"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 31, 21, 272786387, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 31, 21, 272786387, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ip-172-31-22-61"}': 'Post "https://172.31.22.61:6443/api/v1/namespaces/default/events": dial tcp 172.31.22.61:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:31:21.279676 kubelet[2303]: E1002 19:31:21.279552 2303 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:31:21.279676 kubelet[2303]: E1002 19:31:21.279580 2303 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:31:21.280000 audit[2313]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:21.280000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc4462b010 a2=0 a3=7ffc4462affc items=0 ppid=2303 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:21.282340 kubelet[2303]: I1002 19:31:21.282278 2303 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:31:21.280000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:31:21.283343 kubelet[2303]: I1002 19:31:21.283321 2303 server.go:462] "Adding debug handlers to kubelet server" Oct 2 19:31:21.283000 audit[2314]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:21.283000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffedefec770 a2=0 a3=7ffedefec75c items=0 ppid=2303 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:21.283000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:31:21.284921 kubelet[2303]: I1002 19:31:21.284900 2303 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:31:21.285182 kubelet[2303]: I1002 19:31:21.285165 2303 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 2 19:31:21.287838 kubelet[2303]: I1002 19:31:21.286806 2303 volume_manager.go:291] "Starting Kubelet Volume Manager" Oct 2 19:31:21.287838 kubelet[2303]: I1002 19:31:21.286942 2303 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:31:21.287838 kubelet[2303]: I1002 19:31:21.287092 2303 reconciler_new.go:29] "Reconciler: start to sync state" Oct 2 19:31:21.287838 kubelet[2303]: W1002 19:31:21.287641 2303 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.22.61:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.22.61:6443: connect: connection refused Oct 2 19:31:21.287838 kubelet[2303]: E1002 19:31:21.287713 2303 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.22.61:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.22.61:6443: connect: connection refused Oct 2 19:31:21.288830 kubelet[2303]: E1002 19:31:21.288807 2303 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.22.61:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-22-61?timeout=10s\": dial tcp 172.31.22.61:6443: connect: connection refused" interval="200ms" Oct 2 19:31:21.290000 audit[2316]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:21.290000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe2e7e51c0 a2=0 a3=7ffe2e7e51ac items=0 ppid=2303 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:21.290000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:31:21.294000 audit[2318]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:21.294000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffde4a36550 a2=0 a3=7ffde4a3653c items=0 ppid=2303 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:21.294000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:31:21.319000 audit[2322]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:21.319000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd706fd0c0 a2=0 a3=7ffd706fd0ac items=0 ppid=2303 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:21.319000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:31:21.321940 kubelet[2303]: I1002 19:31:21.321914 2303 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 2 19:31:21.326052 kubelet[2303]: I1002 19:31:21.326025 2303 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:31:21.326052 kubelet[2303]: I1002 19:31:21.326051 2303 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:31:21.326241 kubelet[2303]: I1002 19:31:21.326070 2303 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:31:21.325000 audit[2327]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:21.325000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda79be9e0 a2=0 a3=7ffda79be9cc items=0 ppid=2303 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:21.325000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:31:21.326000 audit[2326]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:21.326000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff9a6d4220 a2=0 a3=7fff9a6d420c items=0 ppid=2303 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:21.326000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:31:21.330604 kubelet[2303]: I1002 19:31:21.327898 2303 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 2 19:31:21.330604 kubelet[2303]: I1002 19:31:21.327988 2303 status_manager.go:217] "Starting to sync pod status with apiserver" Oct 2 19:31:21.330604 kubelet[2303]: I1002 19:31:21.328035 2303 kubelet.go:2303] "Starting kubelet main sync loop" Oct 2 19:31:21.330604 kubelet[2303]: E1002 19:31:21.328096 2303 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:31:21.330604 kubelet[2303]: W1002 19:31:21.328752 2303 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.22.61:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.22.61:6443: connect: connection refused Oct 2 19:31:21.330604 kubelet[2303]: E1002 19:31:21.328805 2303 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.22.61:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.22.61:6443: connect: connection refused Oct 2 19:31:21.329000 audit[2329]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:21.329000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeda2bd660 a2=0 a3=7ffeda2bd64c items=0 ppid=2303 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:21.329000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:31:21.331430 kubelet[2303]: I1002 19:31:21.330860 2303 policy_none.go:49] "None policy: Start" Oct 2 19:31:21.332368 kubelet[2303]: I1002 19:31:21.332348 2303 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:31:21.332465 kubelet[2303]: I1002 19:31:21.332379 2303 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:31:21.332000 audit[2331]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:21.332000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd5dab7c0 a2=0 a3=7fffd5dab7ac items=0 ppid=2303 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:21.332000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:31:21.333000 audit[2330]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:21.333000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff2a5b3190 a2=0 a3=10e3 items=0 ppid=2303 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:21.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:31:21.336000 audit[2333]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:21.336000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff842e00d0 a2=0 a3=7fff842e00bc items=0 ppid=2303 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:21.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:31:21.340197 systemd[1]: Created slice kubepods.slice. Oct 2 19:31:21.340000 audit[2334]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:21.340000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe5277fe70 a2=0 a3=7ffe5277fe5c items=0 ppid=2303 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:21.340000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:31:21.347277 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:31:21.352395 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:31:21.360347 kubelet[2303]: I1002 19:31:21.360317 2303 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:31:21.359000 audit[2303]: AVC avc: denied { mac_admin } for pid=2303 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:21.359000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:31:21.359000 audit[2303]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fc0000 a1=c000fb1650 a2=c000b53fb0 a3=25 items=0 ppid=1 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:21.359000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:31:21.360764 kubelet[2303]: I1002 19:31:21.360403 2303 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:31:21.360764 kubelet[2303]: I1002 19:31:21.360626 2303 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:31:21.364234 kubelet[2303]: E1002 19:31:21.362315 2303 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-22-61\" not found" Oct 2 19:31:21.389194 kubelet[2303]: I1002 19:31:21.389164 2303 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-22-61" Oct 2 19:31:21.389665 kubelet[2303]: E1002 19:31:21.389642 2303 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.22.61:6443/api/v1/nodes\": dial tcp 172.31.22.61:6443: connect: connection refused" node="ip-172-31-22-61" Oct 2 19:31:21.428987 kubelet[2303]: I1002 19:31:21.428949 2303 topology_manager.go:215] "Topology Admit Handler" podUID="0f527690843331f05b7e6e60e2ef4b2e" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-22-61" Oct 2 19:31:21.445527 kubelet[2303]: I1002 19:31:21.445490 2303 topology_manager.go:215] "Topology Admit Handler" podUID="9a3955c348c065bd917d934ab26d5a4b" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-22-61" Oct 2 19:31:21.454497 kubelet[2303]: I1002 19:31:21.453372 2303 topology_manager.go:215] "Topology Admit Handler" podUID="96251bb458ea5ac5d7ba8a5a6d2e1b02" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-22-61" Oct 2 19:31:21.463343 systemd[1]: Created slice kubepods-burstable-pod0f527690843331f05b7e6e60e2ef4b2e.slice. Oct 2 19:31:21.481561 systemd[1]: Created slice kubepods-burstable-pod9a3955c348c065bd917d934ab26d5a4b.slice. Oct 2 19:31:21.490040 kubelet[2303]: E1002 19:31:21.489448 2303 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.22.61:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-22-61?timeout=10s\": dial tcp 172.31.22.61:6443: connect: connection refused" interval="400ms" Oct 2 19:31:21.491485 systemd[1]: Created slice kubepods-burstable-pod96251bb458ea5ac5d7ba8a5a6d2e1b02.slice. Oct 2 19:31:21.588297 kubelet[2303]: I1002 19:31:21.588179 2303 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/9a3955c348c065bd917d934ab26d5a4b-ca-certs\") pod \"kube-controller-manager-ip-172-31-22-61\" (UID: \"9a3955c348c065bd917d934ab26d5a4b\") " pod="kube-system/kube-controller-manager-ip-172-31-22-61" Oct 2 19:31:21.588739 kubelet[2303]: I1002 19:31:21.588589 2303 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/9a3955c348c065bd917d934ab26d5a4b-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-22-61\" (UID: \"9a3955c348c065bd917d934ab26d5a4b\") " pod="kube-system/kube-controller-manager-ip-172-31-22-61" Oct 2 19:31:21.589021 kubelet[2303]: I1002 19:31:21.588951 2303 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/96251bb458ea5ac5d7ba8a5a6d2e1b02-kubeconfig\") pod \"kube-scheduler-ip-172-31-22-61\" (UID: \"96251bb458ea5ac5d7ba8a5a6d2e1b02\") " pod="kube-system/kube-scheduler-ip-172-31-22-61" Oct 2 19:31:21.589255 kubelet[2303]: I1002 19:31:21.589189 2303 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0f527690843331f05b7e6e60e2ef4b2e-ca-certs\") pod \"kube-apiserver-ip-172-31-22-61\" (UID: \"0f527690843331f05b7e6e60e2ef4b2e\") " pod="kube-system/kube-apiserver-ip-172-31-22-61" Oct 2 19:31:21.591296 kubelet[2303]: I1002 19:31:21.590774 2303 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0f527690843331f05b7e6e60e2ef4b2e-k8s-certs\") pod \"kube-apiserver-ip-172-31-22-61\" (UID: \"0f527690843331f05b7e6e60e2ef4b2e\") " pod="kube-system/kube-apiserver-ip-172-31-22-61" Oct 2 19:31:21.591569 kubelet[2303]: I1002 19:31:21.591555 2303 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0f527690843331f05b7e6e60e2ef4b2e-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-22-61\" (UID: \"0f527690843331f05b7e6e60e2ef4b2e\") " pod="kube-system/kube-apiserver-ip-172-31-22-61" Oct 2 19:31:21.592547 kubelet[2303]: I1002 19:31:21.592530 2303 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/9a3955c348c065bd917d934ab26d5a4b-k8s-certs\") pod \"kube-controller-manager-ip-172-31-22-61\" (UID: \"9a3955c348c065bd917d934ab26d5a4b\") " pod="kube-system/kube-controller-manager-ip-172-31-22-61" Oct 2 19:31:21.593717 kubelet[2303]: I1002 19:31:21.593669 2303 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9a3955c348c065bd917d934ab26d5a4b-kubeconfig\") pod \"kube-controller-manager-ip-172-31-22-61\" (UID: \"9a3955c348c065bd917d934ab26d5a4b\") " pod="kube-system/kube-controller-manager-ip-172-31-22-61" Oct 2 19:31:21.597273 kubelet[2303]: I1002 19:31:21.597243 2303 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/9a3955c348c065bd917d934ab26d5a4b-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-22-61\" (UID: \"9a3955c348c065bd917d934ab26d5a4b\") " pod="kube-system/kube-controller-manager-ip-172-31-22-61" Oct 2 19:31:21.600659 kubelet[2303]: I1002 19:31:21.600635 2303 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-22-61" Oct 2 19:31:21.601095 kubelet[2303]: E1002 19:31:21.601080 2303 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.22.61:6443/api/v1/nodes\": dial tcp 172.31.22.61:6443: connect: connection refused" node="ip-172-31-22-61" Oct 2 19:31:21.780397 env[1641]: time="2023-10-02T19:31:21.780351995Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-22-61,Uid:0f527690843331f05b7e6e60e2ef4b2e,Namespace:kube-system,Attempt:0,}" Oct 2 19:31:21.793461 env[1641]: time="2023-10-02T19:31:21.793405932Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-22-61,Uid:9a3955c348c065bd917d934ab26d5a4b,Namespace:kube-system,Attempt:0,}" Oct 2 19:31:21.795461 env[1641]: time="2023-10-02T19:31:21.795099284Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-22-61,Uid:96251bb458ea5ac5d7ba8a5a6d2e1b02,Namespace:kube-system,Attempt:0,}" Oct 2 19:31:21.891032 kubelet[2303]: E1002 19:31:21.890837 2303 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.22.61:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-22-61?timeout=10s\": dial tcp 172.31.22.61:6443: connect: connection refused" interval="800ms" Oct 2 19:31:22.005519 kubelet[2303]: I1002 19:31:22.005490 2303 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-22-61" Oct 2 19:31:22.006106 kubelet[2303]: E1002 19:31:22.005974 2303 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.22.61:6443/api/v1/nodes\": dial tcp 172.31.22.61:6443: connect: connection refused" node="ip-172-31-22-61" Oct 2 19:31:22.287937 kubelet[2303]: W1002 19:31:22.287646 2303 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.22.61:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.22.61:6443: connect: connection refused Oct 2 19:31:22.287937 kubelet[2303]: E1002 19:31:22.287906 2303 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.22.61:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.22.61:6443: connect: connection refused Oct 2 19:31:22.306403 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1848390824.mount: Deactivated successfully. Oct 2 19:31:22.336393 env[1641]: time="2023-10-02T19:31:22.336353191Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:22.341447 env[1641]: time="2023-10-02T19:31:22.341407741Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:22.345686 env[1641]: time="2023-10-02T19:31:22.345643771Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:22.355719 env[1641]: time="2023-10-02T19:31:22.355669616Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:22.361964 env[1641]: time="2023-10-02T19:31:22.361909174Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:22.363925 env[1641]: time="2023-10-02T19:31:22.363527405Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:22.366623 env[1641]: time="2023-10-02T19:31:22.366557361Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:22.370355 env[1641]: time="2023-10-02T19:31:22.370307920Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:22.375467 env[1641]: time="2023-10-02T19:31:22.375421239Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:22.377959 env[1641]: time="2023-10-02T19:31:22.377914153Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:22.383946 env[1641]: time="2023-10-02T19:31:22.383890285Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:22.396095 env[1641]: time="2023-10-02T19:31:22.396048521Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:31:22.435343 env[1641]: time="2023-10-02T19:31:22.428667238Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:31:22.435343 env[1641]: time="2023-10-02T19:31:22.428891648Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:31:22.435343 env[1641]: time="2023-10-02T19:31:22.428918855Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:31:22.435343 env[1641]: time="2023-10-02T19:31:22.429331915Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3f04cac4af2626eb7845f25215fa278844797c45aa095aa3a08a80397a65a2dc pid=2343 runtime=io.containerd.runc.v2 Oct 2 19:31:22.448844 env[1641]: time="2023-10-02T19:31:22.448697278Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:31:22.449073 env[1641]: time="2023-10-02T19:31:22.448814369Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:31:22.449073 env[1641]: time="2023-10-02T19:31:22.448829918Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:31:22.449722 env[1641]: time="2023-10-02T19:31:22.449634747Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0017a25b74309a129fa514e136fe68b61555b7909c501f923b037052fc7edd88 pid=2360 runtime=io.containerd.runc.v2 Oct 2 19:31:22.464811 env[1641]: time="2023-10-02T19:31:22.464673783Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:31:22.465340 env[1641]: time="2023-10-02T19:31:22.465254540Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:31:22.465777 env[1641]: time="2023-10-02T19:31:22.465560022Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:31:22.466774 env[1641]: time="2023-10-02T19:31:22.466572303Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/68fae3f6337706299f3aad20fc034d97d4485b52b3c7c32ae1e5b1272985cc82 pid=2375 runtime=io.containerd.runc.v2 Oct 2 19:31:22.474663 systemd[1]: Started cri-containerd-3f04cac4af2626eb7845f25215fa278844797c45aa095aa3a08a80397a65a2dc.scope. Oct 2 19:31:22.525947 kubelet[2303]: W1002 19:31:22.525673 2303 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.22.61:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.22.61:6443: connect: connection refused Oct 2 19:31:22.525947 kubelet[2303]: E1002 19:31:22.525910 2303 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.22.61:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.22.61:6443: connect: connection refused Oct 2 19:31:22.534925 systemd[1]: Started cri-containerd-0017a25b74309a129fa514e136fe68b61555b7909c501f923b037052fc7edd88.scope. Oct 2 19:31:22.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.540000 audit: BPF prog-id=67 op=LOAD Oct 2 19:31:22.541000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.541000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2343 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366303463616334616632363236656237383435663235323135666132 Oct 2 19:31:22.541000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.541000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2343 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366303463616334616632363236656237383435663235323135666132 Oct 2 19:31:22.541000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.541000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.541000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.541000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.541000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.541000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.541000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.541000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.541000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.541000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.541000 audit: BPF prog-id=68 op=LOAD Oct 2 19:31:22.541000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000300d90 items=0 ppid=2343 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366303463616334616632363236656237383435663235323135666132 Oct 2 19:31:22.542000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.542000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.542000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.542000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.542000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.542000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.542000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.542000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.542000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.542000 audit: BPF prog-id=69 op=LOAD Oct 2 19:31:22.542000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000300dd8 items=0 ppid=2343 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366303463616334616632363236656237383435663235323135666132 Oct 2 19:31:22.542000 audit: BPF prog-id=69 op=UNLOAD Oct 2 19:31:22.542000 audit: BPF prog-id=68 op=UNLOAD Oct 2 19:31:22.542000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.542000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.542000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.542000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.542000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.542000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.542000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.542000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.542000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.542000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.542000 audit: BPF prog-id=70 op=LOAD Oct 2 19:31:22.542000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003011e8 items=0 ppid=2343 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366303463616334616632363236656237383435663235323135666132 Oct 2 19:31:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.559000 audit: BPF prog-id=71 op=LOAD Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2360 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030313761323562373433303961313239666135313465313336666536 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2360 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030313761323562373433303961313239666135313465313336666536 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit: BPF prog-id=72 op=LOAD Oct 2 19:31:22.560000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000308510 items=0 ppid=2360 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030313761323562373433303961313239666135313465313336666536 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit: BPF prog-id=73 op=LOAD Oct 2 19:31:22.560000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000308558 items=0 ppid=2360 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030313761323562373433303961313239666135313465313336666536 Oct 2 19:31:22.560000 audit: BPF prog-id=73 op=UNLOAD Oct 2 19:31:22.560000 audit: BPF prog-id=72 op=UNLOAD Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { perfmon } for pid=2379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit[2379]: AVC avc: denied { bpf } for pid=2379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.560000 audit: BPF prog-id=74 op=LOAD Oct 2 19:31:22.560000 audit[2379]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000308968 items=0 ppid=2360 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030313761323562373433303961313239666135313465313336666536 Oct 2 19:31:22.578685 kubelet[2303]: W1002 19:31:22.578416 2303 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.22.61:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-22-61&limit=500&resourceVersion=0": dial tcp 172.31.22.61:6443: connect: connection refused Oct 2 19:31:22.578685 kubelet[2303]: E1002 19:31:22.578502 2303 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.22.61:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-22-61&limit=500&resourceVersion=0": dial tcp 172.31.22.61:6443: connect: connection refused Oct 2 19:31:22.596170 systemd[1]: Started cri-containerd-68fae3f6337706299f3aad20fc034d97d4485b52b3c7c32ae1e5b1272985cc82.scope. Oct 2 19:31:22.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.615000 audit: BPF prog-id=75 op=LOAD Oct 2 19:31:22.616000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.616000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2375 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638666165336636333337373036323939663361616432306663303334 Oct 2 19:31:22.617000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.617000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2375 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638666165336636333337373036323939663361616432306663303334 Oct 2 19:31:22.617000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.617000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.617000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.617000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.617000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.617000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.617000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.617000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.617000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.617000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.617000 audit: BPF prog-id=76 op=LOAD Oct 2 19:31:22.617000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000218360 items=0 ppid=2375 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638666165336636333337373036323939663361616432306663303334 Oct 2 19:31:22.623000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.623000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.623000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.623000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.623000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.623000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.623000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.623000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.623000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.623000 audit: BPF prog-id=77 op=LOAD Oct 2 19:31:22.623000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0002183a8 items=0 ppid=2375 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638666165336636333337373036323939663361616432306663303334 Oct 2 19:31:22.625000 audit: BPF prog-id=77 op=UNLOAD Oct 2 19:31:22.625000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:31:22.625000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.625000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.625000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.625000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.625000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.625000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.625000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.625000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.625000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.625000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.625000 audit: BPF prog-id=78 op=LOAD Oct 2 19:31:22.625000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0002187b8 items=0 ppid=2375 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638666165336636333337373036323939663361616432306663303334 Oct 2 19:31:22.646689 env[1641]: time="2023-10-02T19:31:22.646643748Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-22-61,Uid:9a3955c348c065bd917d934ab26d5a4b,Namespace:kube-system,Attempt:0,} returns sandbox id \"3f04cac4af2626eb7845f25215fa278844797c45aa095aa3a08a80397a65a2dc\"" Oct 2 19:31:22.654431 env[1641]: time="2023-10-02T19:31:22.654385860Z" level=info msg="CreateContainer within sandbox \"3f04cac4af2626eb7845f25215fa278844797c45aa095aa3a08a80397a65a2dc\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 19:31:22.662555 env[1641]: time="2023-10-02T19:31:22.662509404Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-22-61,Uid:96251bb458ea5ac5d7ba8a5a6d2e1b02,Namespace:kube-system,Attempt:0,} returns sandbox id \"0017a25b74309a129fa514e136fe68b61555b7909c501f923b037052fc7edd88\"" Oct 2 19:31:22.667188 env[1641]: time="2023-10-02T19:31:22.667141401Z" level=info msg="CreateContainer within sandbox \"0017a25b74309a129fa514e136fe68b61555b7909c501f923b037052fc7edd88\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 19:31:22.690597 env[1641]: time="2023-10-02T19:31:22.690553101Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-22-61,Uid:0f527690843331f05b7e6e60e2ef4b2e,Namespace:kube-system,Attempt:0,} returns sandbox id \"68fae3f6337706299f3aad20fc034d97d4485b52b3c7c32ae1e5b1272985cc82\"" Oct 2 19:31:22.691757 kubelet[2303]: E1002 19:31:22.691731 2303 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.22.61:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-22-61?timeout=10s\": dial tcp 172.31.22.61:6443: connect: connection refused" interval="1.6s" Oct 2 19:31:22.695977 env[1641]: time="2023-10-02T19:31:22.695935035Z" level=info msg="CreateContainer within sandbox \"3f04cac4af2626eb7845f25215fa278844797c45aa095aa3a08a80397a65a2dc\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"c5d420aeb2b7935827ed6645d0bd47617a7817ba47adcb6910c648a3983966f6\"" Oct 2 19:31:22.696436 env[1641]: time="2023-10-02T19:31:22.696401001Z" level=info msg="CreateContainer within sandbox \"68fae3f6337706299f3aad20fc034d97d4485b52b3c7c32ae1e5b1272985cc82\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 19:31:22.698048 env[1641]: time="2023-10-02T19:31:22.698018509Z" level=info msg="StartContainer for \"c5d420aeb2b7935827ed6645d0bd47617a7817ba47adcb6910c648a3983966f6\"" Oct 2 19:31:22.702538 env[1641]: time="2023-10-02T19:31:22.702486217Z" level=info msg="CreateContainer within sandbox \"0017a25b74309a129fa514e136fe68b61555b7909c501f923b037052fc7edd88\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"5f4de091ed54263a195aa5e6d14c5afd00a9fa703026fee8c52edc57deeba479\"" Oct 2 19:31:22.703475 env[1641]: time="2023-10-02T19:31:22.703385664Z" level=info msg="StartContainer for \"5f4de091ed54263a195aa5e6d14c5afd00a9fa703026fee8c52edc57deeba479\"" Oct 2 19:31:22.722391 env[1641]: time="2023-10-02T19:31:22.722294438Z" level=info msg="CreateContainer within sandbox \"68fae3f6337706299f3aad20fc034d97d4485b52b3c7c32ae1e5b1272985cc82\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"7e72620fa089d470a350ca1d6ee40fdc41c08d3873ff3ec83d49f6f1c79e7fc2\"" Oct 2 19:31:22.723254 env[1641]: time="2023-10-02T19:31:22.723212440Z" level=info msg="StartContainer for \"7e72620fa089d470a350ca1d6ee40fdc41c08d3873ff3ec83d49f6f1c79e7fc2\"" Oct 2 19:31:22.740356 systemd[1]: Started cri-containerd-c5d420aeb2b7935827ed6645d0bd47617a7817ba47adcb6910c648a3983966f6.scope. Oct 2 19:31:22.773488 systemd[1]: Started cri-containerd-5f4de091ed54263a195aa5e6d14c5afd00a9fa703026fee8c52edc57deeba479.scope. Oct 2 19:31:22.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.784000 audit: BPF prog-id=79 op=LOAD Oct 2 19:31:22.785000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.785000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2343 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643432306165623262373933353832376564363634356430626434 Oct 2 19:31:22.785000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.785000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2343 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643432306165623262373933353832376564363634356430626434 Oct 2 19:31:22.785000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.785000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.785000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.785000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.785000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.785000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.785000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.785000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.785000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.785000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.785000 audit: BPF prog-id=80 op=LOAD Oct 2 19:31:22.785000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002901e0 items=0 ppid=2343 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643432306165623262373933353832376564363634356430626434 Oct 2 19:31:22.786000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.786000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.786000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.786000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.786000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.786000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.786000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.786000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.786000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.786000 audit: BPF prog-id=81 op=LOAD Oct 2 19:31:22.786000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000290228 items=0 ppid=2343 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643432306165623262373933353832376564363634356430626434 Oct 2 19:31:22.786000 audit: BPF prog-id=81 op=UNLOAD Oct 2 19:31:22.786000 audit: BPF prog-id=80 op=UNLOAD Oct 2 19:31:22.787000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.787000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.787000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.787000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.787000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.787000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.787000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.787000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.787000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.787000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.787000 audit: BPF prog-id=82 op=LOAD Oct 2 19:31:22.787000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000290638 items=0 ppid=2343 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643432306165623262373933353832376564363634356430626434 Oct 2 19:31:22.801607 kubelet[2303]: W1002 19:31:22.801367 2303 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.22.61:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.22.61:6443: connect: connection refused Oct 2 19:31:22.801607 kubelet[2303]: E1002 19:31:22.801546 2303 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.22.61:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.22.61:6443: connect: connection refused Oct 2 19:31:22.812394 kubelet[2303]: I1002 19:31:22.811189 2303 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-22-61" Oct 2 19:31:22.812394 kubelet[2303]: E1002 19:31:22.812283 2303 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.22.61:6443/api/v1/nodes\": dial tcp 172.31.22.61:6443: connect: connection refused" node="ip-172-31-22-61" Oct 2 19:31:22.817466 systemd[1]: Started cri-containerd-7e72620fa089d470a350ca1d6ee40fdc41c08d3873ff3ec83d49f6f1c79e7fc2.scope. Oct 2 19:31:22.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.857000 audit: BPF prog-id=83 op=LOAD Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2360 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566346465303931656435343236336131393561613565366431346335 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2360 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566346465303931656435343236336131393561613565366431346335 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit: BPF prog-id=84 op=LOAD Oct 2 19:31:22.858000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002187a0 items=0 ppid=2360 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566346465303931656435343236336131393561613565366431346335 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit: BPF prog-id=85 op=LOAD Oct 2 19:31:22.858000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002187e8 items=0 ppid=2360 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566346465303931656435343236336131393561613565366431346335 Oct 2 19:31:22.858000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:31:22.858000 audit: BPF prog-id=84 op=UNLOAD Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.858000 audit: BPF prog-id=86 op=LOAD Oct 2 19:31:22.858000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000218bf8 items=0 ppid=2360 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566346465303931656435343236336131393561613565366431346335 Oct 2 19:31:22.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.895000 audit: BPF prog-id=87 op=LOAD Oct 2 19:31:22.898000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.898000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2375 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765373236323066613038396434373061333530636131643665653430 Oct 2 19:31:22.898000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.898000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2375 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765373236323066613038396434373061333530636131643665653430 Oct 2 19:31:22.898000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.898000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.898000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.898000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.898000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.898000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.898000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.898000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.898000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.898000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.898000 audit: BPF prog-id=88 op=LOAD Oct 2 19:31:22.898000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003e4810 items=0 ppid=2375 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765373236323066613038396434373061333530636131643665653430 Oct 2 19:31:22.898000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.898000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.898000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.898000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.898000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.898000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.898000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.898000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.898000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.898000 audit: BPF prog-id=89 op=LOAD Oct 2 19:31:22.898000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003e4858 items=0 ppid=2375 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765373236323066613038396434373061333530636131643665653430 Oct 2 19:31:22.899000 audit: BPF prog-id=89 op=UNLOAD Oct 2 19:31:22.899000 audit: BPF prog-id=88 op=UNLOAD Oct 2 19:31:22.899000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.899000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.899000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.899000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.899000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.899000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.899000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.899000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.899000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.899000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:22.899000 audit: BPF prog-id=90 op=LOAD Oct 2 19:31:22.899000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e4c68 items=0 ppid=2375 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:22.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765373236323066613038396434373061333530636131643665653430 Oct 2 19:31:22.919946 env[1641]: time="2023-10-02T19:31:22.919893197Z" level=info msg="StartContainer for \"c5d420aeb2b7935827ed6645d0bd47617a7817ba47adcb6910c648a3983966f6\" returns successfully" Oct 2 19:31:22.977959 env[1641]: time="2023-10-02T19:31:22.977906477Z" level=info msg="StartContainer for \"5f4de091ed54263a195aa5e6d14c5afd00a9fa703026fee8c52edc57deeba479\" returns successfully" Oct 2 19:31:22.993350 env[1641]: time="2023-10-02T19:31:22.993257368Z" level=info msg="StartContainer for \"7e72620fa089d470a350ca1d6ee40fdc41c08d3873ff3ec83d49f6f1c79e7fc2\" returns successfully" Oct 2 19:31:23.399498 kubelet[2303]: E1002 19:31:23.399469 2303 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.22.61:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.22.61:6443: connect: connection refused Oct 2 19:31:24.259493 kubelet[2303]: W1002 19:31:24.259456 2303 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.22.61:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.22.61:6443: connect: connection refused Oct 2 19:31:24.260927 kubelet[2303]: E1002 19:31:24.260876 2303 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.22.61:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.22.61:6443: connect: connection refused Oct 2 19:31:24.292874 kubelet[2303]: E1002 19:31:24.292842 2303 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.22.61:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-22-61?timeout=10s\": dial tcp 172.31.22.61:6443: connect: connection refused" interval="3.2s" Oct 2 19:31:24.414132 kubelet[2303]: I1002 19:31:24.414109 2303 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-22-61" Oct 2 19:31:24.917000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:24.917000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000132270 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:31:24.917000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:31:24.917000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:24.917000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0000d4700 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:31:24.917000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:31:26.326000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:26.328974 kernel: kauditd_printk_skb: 577 callbacks suppressed Oct 2 19:31:26.329099 kernel: audit: type=1400 audit(1696275086.326:714): avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:26.342699 kernel: audit: type=1400 audit(1696275086.330:715): avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:26.330000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:26.330000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003b968a0 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:31:26.358656 kernel: audit: type=1300 audit(1696275086.330:715): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003b968a0 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:31:26.358803 kernel: audit: type=1327 audit(1696275086.330:715): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:31:26.330000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:31:26.326000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c005f51620 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:31:26.376511 kernel: audit: type=1300 audit(1696275086.326:714): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c005f51620 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:31:26.326000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:31:26.395033 kernel: audit: type=1327 audit(1696275086.326:714): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:31:26.331000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:26.411646 kernel: audit: type=1400 audit(1696275086.331:716): avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:26.411860 kernel: audit: type=1300 audit(1696275086.331:716): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00621c940 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:31:26.331000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00621c940 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:31:26.331000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:31:26.434003 kernel: audit: type=1327 audit(1696275086.331:716): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:31:26.434136 kernel: audit: type=1400 audit(1696275086.346:717): avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:26.346000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:26.346000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c003ca0990 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:31:26.346000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:31:26.358000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:26.358000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0071d83e0 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:31:26.358000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:31:26.358000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:26.358000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c003fde5a0 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:31:26.358000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:31:26.594123 kubelet[2303]: I1002 19:31:26.594007 2303 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-22-61" Oct 2 19:31:26.628915 kubelet[2303]: E1002 19:31:26.628809 2303 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-22-61.178a6132fc9c7dd3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-22-61", UID:"ip-172-31-22-61", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-22-61"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 31, 21, 272786387, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 31, 21, 272786387, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ip-172-31-22-61"}': 'namespaces "default" not found' (will not retry!) Oct 2 19:31:27.274084 kubelet[2303]: I1002 19:31:27.274035 2303 apiserver.go:52] "Watching apiserver" Oct 2 19:31:27.287167 kubelet[2303]: I1002 19:31:27.287113 2303 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:31:28.138098 update_engine[1633]: I1002 19:31:28.138053 1633 update_attempter.cc:505] Updating boot flags... Oct 2 19:31:28.677000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:28.677000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e5fc60 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:31:28.677000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:31:28.680000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:28.680000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e5fda0 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:31:28.682000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:28.682000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e5fee0 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:31:28.682000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:31:28.680000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:31:28.685000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:28.685000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ffa160 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:31:28.685000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:31:29.788562 systemd[1]: Reloading. Oct 2 19:31:29.917815 /usr/lib/systemd/system-generators/torcx-generator[2692]: time="2023-10-02T19:31:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:31:29.917857 /usr/lib/systemd/system-generators/torcx-generator[2692]: time="2023-10-02T19:31:29Z" level=info msg="torcx already run" Oct 2 19:31:30.152947 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:31:30.152971 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:31:30.207529 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:31:30.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.339000 audit: BPF prog-id=91 op=LOAD Oct 2 19:31:30.339000 audit: BPF prog-id=52 op=UNLOAD Oct 2 19:31:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.339000 audit: BPF prog-id=92 op=LOAD Oct 2 19:31:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.339000 audit: BPF prog-id=93 op=LOAD Oct 2 19:31:30.339000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:31:30.339000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:31:30.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.341000 audit: BPF prog-id=94 op=LOAD Oct 2 19:31:30.341000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:31:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.341000 audit: BPF prog-id=95 op=LOAD Oct 2 19:31:30.341000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:31:30.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.344000 audit: BPF prog-id=96 op=LOAD Oct 2 19:31:30.344000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:31:30.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.345000 audit: BPF prog-id=97 op=LOAD Oct 2 19:31:30.345000 audit: BPF prog-id=55 op=UNLOAD Oct 2 19:31:30.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.348000 audit: BPF prog-id=98 op=LOAD Oct 2 19:31:30.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.348000 audit: BPF prog-id=99 op=LOAD Oct 2 19:31:30.348000 audit: BPF prog-id=56 op=UNLOAD Oct 2 19:31:30.348000 audit: BPF prog-id=57 op=UNLOAD Oct 2 19:31:30.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.351000 audit: BPF prog-id=100 op=LOAD Oct 2 19:31:30.351000 audit: BPF prog-id=58 op=UNLOAD Oct 2 19:31:30.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.351000 audit: BPF prog-id=101 op=LOAD Oct 2 19:31:30.352000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:31:30.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.352000 audit: BPF prog-id=102 op=LOAD Oct 2 19:31:30.352000 audit: BPF prog-id=59 op=UNLOAD Oct 2 19:31:30.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.353000 audit: BPF prog-id=103 op=LOAD Oct 2 19:31:30.353000 audit: BPF prog-id=60 op=UNLOAD Oct 2 19:31:30.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.353000 audit: BPF prog-id=104 op=LOAD Oct 2 19:31:30.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.354000 audit: BPF prog-id=105 op=LOAD Oct 2 19:31:30.354000 audit: BPF prog-id=61 op=UNLOAD Oct 2 19:31:30.354000 audit: BPF prog-id=62 op=UNLOAD Oct 2 19:31:30.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.356000 audit: BPF prog-id=106 op=LOAD Oct 2 19:31:30.356000 audit: BPF prog-id=63 op=UNLOAD Oct 2 19:31:30.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.357000 audit: BPF prog-id=107 op=LOAD Oct 2 19:31:30.357000 audit: BPF prog-id=67 op=UNLOAD Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit: BPF prog-id=108 op=LOAD Oct 2 19:31:30.358000 audit: BPF prog-id=64 op=UNLOAD Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit: BPF prog-id=109 op=LOAD Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.358000 audit: BPF prog-id=110 op=LOAD Oct 2 19:31:30.358000 audit: BPF prog-id=65 op=UNLOAD Oct 2 19:31:30.358000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:31:30.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.360000 audit: BPF prog-id=111 op=LOAD Oct 2 19:31:30.360000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:31:30.408012 kubelet[2303]: I1002 19:31:30.407176 2303 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:31:30.407440 systemd[1]: Stopping kubelet.service... Oct 2 19:31:30.436746 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 19:31:30.437414 systemd[1]: Stopped kubelet.service. Oct 2 19:31:30.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:30.440368 systemd[1]: Started kubelet.service. Oct 2 19:31:30.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:30.618118 kubelet[2744]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:31:30.618454 kubelet[2744]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:31:30.618504 kubelet[2744]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:31:30.618720 kubelet[2744]: I1002 19:31:30.618681 2744 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:31:30.634000 audit[2754]: USER_ACCT pid=2754 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:31:30.635577 sudo[2754]: root : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/tar -xf /opt/bin/cilium.tar.gz -C /opt/bin Oct 2 19:31:30.634000 audit[2754]: CRED_REFR pid=2754 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:31:30.635948 sudo[2754]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 2 19:31:30.639000 audit[2754]: USER_START pid=2754 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:31:30.652729 kubelet[2744]: I1002 19:31:30.652654 2744 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Oct 2 19:31:30.653301 kubelet[2744]: I1002 19:31:30.653244 2744 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:31:30.654475 kubelet[2744]: I1002 19:31:30.654448 2744 server.go:895] "Client rotation is on, will bootstrap in background" Oct 2 19:31:30.664154 kubelet[2744]: I1002 19:31:30.664056 2744 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 19:31:30.667962 kubelet[2744]: I1002 19:31:30.667933 2744 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:31:30.679861 kubelet[2744]: I1002 19:31:30.679798 2744 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:31:30.680761 kubelet[2744]: I1002 19:31:30.680676 2744 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:31:30.681304 kubelet[2744]: I1002 19:31:30.681286 2744 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Oct 2 19:31:30.681721 kubelet[2744]: I1002 19:31:30.681644 2744 topology_manager.go:138] "Creating topology manager with none policy" Oct 2 19:31:30.682056 kubelet[2744]: I1002 19:31:30.682043 2744 container_manager_linux.go:301] "Creating device plugin manager" Oct 2 19:31:30.682232 kubelet[2744]: I1002 19:31:30.682221 2744 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:31:30.682541 kubelet[2744]: I1002 19:31:30.682528 2744 kubelet.go:393] "Attempting to sync node with API server" Oct 2 19:31:30.682716 kubelet[2744]: I1002 19:31:30.682706 2744 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:31:30.682912 kubelet[2744]: I1002 19:31:30.682902 2744 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:31:30.683157 kubelet[2744]: I1002 19:31:30.683146 2744 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:31:30.717774 kubelet[2744]: I1002 19:31:30.717746 2744 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:31:30.718795 kubelet[2744]: I1002 19:31:30.718776 2744 server.go:1232] "Started kubelet" Oct 2 19:31:30.731000 audit[2744]: AVC avc: denied { mac_admin } for pid=2744 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.731000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:31:30.731000 audit[2744]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b9f9b0 a1=c0006c55f0 a2=c000b9f980 a3=25 items=0 ppid=1 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:30.731000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:31:30.733355 kubelet[2744]: I1002 19:31:30.733331 2744 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:31:30.732000 audit[2744]: AVC avc: denied { mac_admin } for pid=2744 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.732000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:31:30.732000 audit[2744]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008e32e0 a1=c0006c5608 a2=c000b9fa40 a3=25 items=0 ppid=1 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:30.732000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:31:30.733935 kubelet[2744]: I1002 19:31:30.733918 2744 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:31:30.734089 kubelet[2744]: I1002 19:31:30.734079 2744 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:31:30.740040 kubelet[2744]: E1002 19:31:30.739985 2744 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:31:30.740040 kubelet[2744]: E1002 19:31:30.740038 2744 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:31:30.746364 kubelet[2744]: I1002 19:31:30.746337 2744 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:31:30.747605 kubelet[2744]: I1002 19:31:30.747502 2744 server.go:462] "Adding debug handlers to kubelet server" Oct 2 19:31:30.750321 kubelet[2744]: I1002 19:31:30.750215 2744 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:31:30.751013 kubelet[2744]: I1002 19:31:30.750978 2744 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 2 19:31:30.781419 kubelet[2744]: I1002 19:31:30.781304 2744 volume_manager.go:291] "Starting Kubelet Volume Manager" Oct 2 19:31:30.781578 kubelet[2744]: I1002 19:31:30.781562 2744 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:31:30.781928 kubelet[2744]: I1002 19:31:30.781744 2744 reconciler_new.go:29] "Reconciler: start to sync state" Oct 2 19:31:30.850624 kubelet[2744]: I1002 19:31:30.850592 2744 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 2 19:31:30.880613 kubelet[2744]: I1002 19:31:30.879511 2744 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 2 19:31:30.880613 kubelet[2744]: I1002 19:31:30.879560 2744 status_manager.go:217] "Starting to sync pod status with apiserver" Oct 2 19:31:30.880613 kubelet[2744]: I1002 19:31:30.879584 2744 kubelet.go:2303] "Starting kubelet main sync loop" Oct 2 19:31:30.880613 kubelet[2744]: E1002 19:31:30.879660 2744 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:31:30.952581 kubelet[2744]: I1002 19:31:30.952554 2744 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:31:30.952581 kubelet[2744]: I1002 19:31:30.952580 2744 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:31:30.952866 kubelet[2744]: I1002 19:31:30.952600 2744 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:31:30.953470 kubelet[2744]: I1002 19:31:30.953448 2744 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 19:31:30.953570 kubelet[2744]: I1002 19:31:30.953484 2744 state_mem.go:96] "Updated CPUSet assignments" assignments={} Oct 2 19:31:30.953570 kubelet[2744]: I1002 19:31:30.953501 2744 policy_none.go:49] "None policy: Start" Oct 2 19:31:30.955304 kubelet[2744]: I1002 19:31:30.955283 2744 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:31:30.955447 kubelet[2744]: I1002 19:31:30.955391 2744 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:31:30.955880 kubelet[2744]: I1002 19:31:30.955863 2744 state_mem.go:75] "Updated machine memory state" Oct 2 19:31:30.972099 kubelet[2744]: I1002 19:31:30.972050 2744 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:31:30.971000 audit[2744]: AVC avc: denied { mac_admin } for pid=2744 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:30.971000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:31:30.971000 audit[2744]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0011ad110 a1=c0011cff68 a2=c0011ad0e0 a3=25 items=0 ppid=1 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:30.989815 kubelet[2744]: E1002 19:31:30.989789 2744 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Oct 2 19:31:30.971000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:31:30.992165 kubelet[2744]: I1002 19:31:30.992134 2744 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:31:30.993937 kubelet[2744]: I1002 19:31:30.993912 2744 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:31:31.105791 kubelet[2744]: I1002 19:31:31.105765 2744 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-22-61" Oct 2 19:31:31.122506 kubelet[2744]: I1002 19:31:31.122470 2744 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-22-61" Oct 2 19:31:31.122669 kubelet[2744]: I1002 19:31:31.122581 2744 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-22-61" Oct 2 19:31:31.193235 kubelet[2744]: I1002 19:31:31.193183 2744 topology_manager.go:215] "Topology Admit Handler" podUID="0f527690843331f05b7e6e60e2ef4b2e" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-22-61" Oct 2 19:31:31.195035 kubelet[2744]: I1002 19:31:31.194983 2744 topology_manager.go:215] "Topology Admit Handler" podUID="9a3955c348c065bd917d934ab26d5a4b" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-22-61" Oct 2 19:31:31.195515 kubelet[2744]: I1002 19:31:31.195480 2744 topology_manager.go:215] "Topology Admit Handler" podUID="96251bb458ea5ac5d7ba8a5a6d2e1b02" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-22-61" Oct 2 19:31:31.215874 kubelet[2744]: E1002 19:31:31.215767 2744 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-22-61\" already exists" pod="kube-system/kube-scheduler-ip-172-31-22-61" Oct 2 19:31:31.294820 kubelet[2744]: I1002 19:31:31.294084 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/9a3955c348c065bd917d934ab26d5a4b-k8s-certs\") pod \"kube-controller-manager-ip-172-31-22-61\" (UID: \"9a3955c348c065bd917d934ab26d5a4b\") " pod="kube-system/kube-controller-manager-ip-172-31-22-61" Oct 2 19:31:31.294820 kubelet[2744]: I1002 19:31:31.294135 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9a3955c348c065bd917d934ab26d5a4b-kubeconfig\") pod \"kube-controller-manager-ip-172-31-22-61\" (UID: \"9a3955c348c065bd917d934ab26d5a4b\") " pod="kube-system/kube-controller-manager-ip-172-31-22-61" Oct 2 19:31:31.294820 kubelet[2744]: I1002 19:31:31.294160 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/9a3955c348c065bd917d934ab26d5a4b-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-22-61\" (UID: \"9a3955c348c065bd917d934ab26d5a4b\") " pod="kube-system/kube-controller-manager-ip-172-31-22-61" Oct 2 19:31:31.294820 kubelet[2744]: I1002 19:31:31.294180 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/96251bb458ea5ac5d7ba8a5a6d2e1b02-kubeconfig\") pod \"kube-scheduler-ip-172-31-22-61\" (UID: \"96251bb458ea5ac5d7ba8a5a6d2e1b02\") " pod="kube-system/kube-scheduler-ip-172-31-22-61" Oct 2 19:31:31.294820 kubelet[2744]: I1002 19:31:31.294199 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0f527690843331f05b7e6e60e2ef4b2e-ca-certs\") pod \"kube-apiserver-ip-172-31-22-61\" (UID: \"0f527690843331f05b7e6e60e2ef4b2e\") " pod="kube-system/kube-apiserver-ip-172-31-22-61" Oct 2 19:31:31.296047 kubelet[2744]: I1002 19:31:31.294833 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0f527690843331f05b7e6e60e2ef4b2e-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-22-61\" (UID: \"0f527690843331f05b7e6e60e2ef4b2e\") " pod="kube-system/kube-apiserver-ip-172-31-22-61" Oct 2 19:31:31.296047 kubelet[2744]: I1002 19:31:31.294883 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/9a3955c348c065bd917d934ab26d5a4b-ca-certs\") pod \"kube-controller-manager-ip-172-31-22-61\" (UID: \"9a3955c348c065bd917d934ab26d5a4b\") " pod="kube-system/kube-controller-manager-ip-172-31-22-61" Oct 2 19:31:31.296047 kubelet[2744]: I1002 19:31:31.294911 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/9a3955c348c065bd917d934ab26d5a4b-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-22-61\" (UID: \"9a3955c348c065bd917d934ab26d5a4b\") " pod="kube-system/kube-controller-manager-ip-172-31-22-61" Oct 2 19:31:31.296047 kubelet[2744]: I1002 19:31:31.294938 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0f527690843331f05b7e6e60e2ef4b2e-k8s-certs\") pod \"kube-apiserver-ip-172-31-22-61\" (UID: \"0f527690843331f05b7e6e60e2ef4b2e\") " pod="kube-system/kube-apiserver-ip-172-31-22-61" Oct 2 19:31:31.600033 sudo[2754]: pam_unix(sudo:session): session closed for user root Oct 2 19:31:31.604023 kernel: kauditd_printk_skb: 281 callbacks suppressed Oct 2 19:31:31.604154 kernel: audit: type=1106 audit(1696275091.599:976): pid=2754 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:31:31.599000 audit[2754]: USER_END pid=2754 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:31:31.599000 audit[2754]: CRED_DISP pid=2754 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:31:31.612777 kernel: audit: type=1104 audit(1696275091.599:977): pid=2754 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:31:31.705415 kubelet[2744]: I1002 19:31:31.705380 2744 apiserver.go:52] "Watching apiserver" Oct 2 19:31:31.784160 kubelet[2744]: I1002 19:31:31.784121 2744 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:31:31.807010 kubelet[2744]: I1002 19:31:31.806963 2744 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-22-61" podStartSLOduration=0.806870327 podCreationTimestamp="2023-10-02 19:31:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:31:31.803933107 +0000 UTC m=+1.346906395" watchObservedRunningTime="2023-10-02 19:31:31.806870327 +0000 UTC m=+1.349843610" Oct 2 19:31:31.831271 kubelet[2744]: I1002 19:31:31.831233 2744 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-22-61" podStartSLOduration=0.831183776 podCreationTimestamp="2023-10-02 19:31:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:31:31.830110723 +0000 UTC m=+1.373084008" watchObservedRunningTime="2023-10-02 19:31:31.831183776 +0000 UTC m=+1.374157066" Oct 2 19:31:31.831429 kubelet[2744]: I1002 19:31:31.831320 2744 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-22-61" podStartSLOduration=4.831300945 podCreationTimestamp="2023-10-02 19:31:27 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:31:31.818831013 +0000 UTC m=+1.361804304" watchObservedRunningTime="2023-10-02 19:31:31.831300945 +0000 UTC m=+1.374274237" Oct 2 19:31:31.937848 kubelet[2744]: E1002 19:31:31.937729 2744 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-22-61\" already exists" pod="kube-system/kube-apiserver-ip-172-31-22-61" Oct 2 19:31:32.979695 sudo[1900]: pam_unix(sudo:session): session closed for user root Oct 2 19:31:32.978000 audit[1900]: USER_END pid=1900 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:31:32.980000 audit[1900]: CRED_DISP pid=1900 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:31:32.991246 kernel: audit: type=1106 audit(1696275092.978:978): pid=1900 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:31:32.991385 kernel: audit: type=1104 audit(1696275092.980:979): pid=1900 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:31:33.009178 sshd[1897]: pam_unix(sshd:session): session closed for user core Oct 2 19:31:33.009000 audit[1897]: USER_END pid=1897 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:31:33.013501 systemd[1]: sshd@6-172.31.22.61:22-139.178.89.65:46686.service: Deactivated successfully. Oct 2 19:31:33.015733 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:31:33.015943 systemd[1]: session-7.scope: Consumed 3.729s CPU time. Oct 2 19:31:33.021145 kernel: audit: type=1106 audit(1696275093.009:980): pid=1897 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:31:33.010000 audit[1897]: CRED_DISP pid=1897 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:31:33.021585 systemd-logind[1632]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:31:33.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.22.61:22-139.178.89.65:46686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:33.030095 systemd-logind[1632]: Removed session 7. Oct 2 19:31:33.037842 kernel: audit: type=1104 audit(1696275093.010:981): pid=1897 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:31:33.038026 kernel: audit: type=1131 audit(1696275093.012:982): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.22.61:22-139.178.89.65:46686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:41.294000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521038 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:31:41.294000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00129fb40 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:31:41.325081 kernel: audit: type=1400 audit(1696275101.294:983): avc: denied { watch } for pid=2500 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521038 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:31:41.325892 kernel: audit: type=1300 audit(1696275101.294:983): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00129fb40 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:31:41.326129 kernel: audit: type=1327 audit(1696275101.294:983): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:31:41.294000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:31:41.638522 kubelet[2744]: I1002 19:31:41.638406 2744 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 19:31:41.638958 env[1641]: time="2023-10-02T19:31:41.638802336Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:31:41.639302 kubelet[2744]: I1002 19:31:41.639034 2744 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 19:31:42.085431 kubelet[2744]: I1002 19:31:42.085386 2744 topology_manager.go:215] "Topology Admit Handler" podUID="dc13b140-1797-413c-a6c1-40c0fa0463bb" podNamespace="kube-system" podName="kube-proxy-5lzdr" Oct 2 19:31:42.091618 systemd[1]: Created slice kubepods-besteffort-poddc13b140_1797_413c_a6c1_40c0fa0463bb.slice. Oct 2 19:31:42.099354 kubelet[2744]: I1002 19:31:42.099319 2744 topology_manager.go:215] "Topology Admit Handler" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" podNamespace="kube-system" podName="cilium-zjcpf" Oct 2 19:31:42.106134 systemd[1]: Created slice kubepods-burstable-pod676d69a2_1086_4c05_b8fc_deee645c74c0.slice. Oct 2 19:31:42.176127 kubelet[2744]: I1002 19:31:42.176093 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-cgroup\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-cilium-cgroup\") pod \"cilium-zjcpf\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " pod="kube-system/cilium-zjcpf" Oct 2 19:31:42.176302 kubelet[2744]: I1002 19:31:42.176142 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"hubble-tls\" (UniqueName: \"kubernetes.io/projected/676d69a2-1086-4c05-b8fc-deee645c74c0-hubble-tls\") pod \"cilium-zjcpf\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " pod="kube-system/cilium-zjcpf" Oct 2 19:31:42.176302 kubelet[2744]: I1002 19:31:42.176181 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kjx8c\" (UniqueName: \"kubernetes.io/projected/676d69a2-1086-4c05-b8fc-deee645c74c0-kube-api-access-kjx8c\") pod \"cilium-zjcpf\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " pod="kube-system/cilium-zjcpf" Oct 2 19:31:42.176302 kubelet[2744]: I1002 19:31:42.176207 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"host-proc-sys-net\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-host-proc-sys-net\") pod \"cilium-zjcpf\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " pod="kube-system/cilium-zjcpf" Oct 2 19:31:42.176302 kubelet[2744]: I1002 19:31:42.176238 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-lib-modules\") pod \"cilium-zjcpf\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " pod="kube-system/cilium-zjcpf" Oct 2 19:31:42.176302 kubelet[2744]: I1002 19:31:42.176265 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/676d69a2-1086-4c05-b8fc-deee645c74c0-cilium-config-path\") pod \"cilium-zjcpf\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " pod="kube-system/cilium-zjcpf" Oct 2 19:31:42.176564 kubelet[2744]: I1002 19:31:42.176294 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tkcwx\" (UniqueName: \"kubernetes.io/projected/dc13b140-1797-413c-a6c1-40c0fa0463bb-kube-api-access-tkcwx\") pod \"kube-proxy-5lzdr\" (UID: \"dc13b140-1797-413c-a6c1-40c0fa0463bb\") " pod="kube-system/kube-proxy-5lzdr" Oct 2 19:31:42.176564 kubelet[2744]: I1002 19:31:42.176323 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"hostproc\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-hostproc\") pod \"cilium-zjcpf\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " pod="kube-system/cilium-zjcpf" Oct 2 19:31:42.176564 kubelet[2744]: I1002 19:31:42.176350 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"host-proc-sys-kernel\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-host-proc-sys-kernel\") pod \"cilium-zjcpf\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " pod="kube-system/cilium-zjcpf" Oct 2 19:31:42.176564 kubelet[2744]: I1002 19:31:42.176381 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dc13b140-1797-413c-a6c1-40c0fa0463bb-lib-modules\") pod \"kube-proxy-5lzdr\" (UID: \"dc13b140-1797-413c-a6c1-40c0fa0463bb\") " pod="kube-system/kube-proxy-5lzdr" Oct 2 19:31:42.176564 kubelet[2744]: I1002 19:31:42.176415 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/dc13b140-1797-413c-a6c1-40c0fa0463bb-kube-proxy\") pod \"kube-proxy-5lzdr\" (UID: \"dc13b140-1797-413c-a6c1-40c0fa0463bb\") " pod="kube-system/kube-proxy-5lzdr" Oct 2 19:31:42.176564 kubelet[2744]: I1002 19:31:42.176447 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"bpf-maps\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-bpf-maps\") pod \"cilium-zjcpf\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " pod="kube-system/cilium-zjcpf" Oct 2 19:31:42.176819 kubelet[2744]: I1002 19:31:42.176478 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etc-cni-netd\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-etc-cni-netd\") pod \"cilium-zjcpf\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " pod="kube-system/cilium-zjcpf" Oct 2 19:31:42.176819 kubelet[2744]: I1002 19:31:42.176509 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-path\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-cni-path\") pod \"cilium-zjcpf\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " pod="kube-system/cilium-zjcpf" Oct 2 19:31:42.176819 kubelet[2744]: I1002 19:31:42.176542 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dc13b140-1797-413c-a6c1-40c0fa0463bb-xtables-lock\") pod \"kube-proxy-5lzdr\" (UID: \"dc13b140-1797-413c-a6c1-40c0fa0463bb\") " pod="kube-system/kube-proxy-5lzdr" Oct 2 19:31:42.176819 kubelet[2744]: I1002 19:31:42.176573 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-run\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-cilium-run\") pod \"cilium-zjcpf\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " pod="kube-system/cilium-zjcpf" Oct 2 19:31:42.176819 kubelet[2744]: I1002 19:31:42.176606 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-xtables-lock\") pod \"cilium-zjcpf\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " pod="kube-system/cilium-zjcpf" Oct 2 19:31:42.176819 kubelet[2744]: I1002 19:31:42.176648 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"clustermesh-secrets\" (UniqueName: \"kubernetes.io/secret/676d69a2-1086-4c05-b8fc-deee645c74c0-clustermesh-secrets\") pod \"cilium-zjcpf\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " pod="kube-system/cilium-zjcpf" Oct 2 19:31:42.330909 kubelet[2744]: E1002 19:31:42.329529 2744 projected.go:292] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Oct 2 19:31:42.332055 kubelet[2744]: E1002 19:31:42.332027 2744 projected.go:198] Error preparing data for projected volume kube-api-access-tkcwx for pod kube-system/kube-proxy-5lzdr: configmap "kube-root-ca.crt" not found Oct 2 19:31:42.332175 kubelet[2744]: E1002 19:31:42.332148 2744 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/dc13b140-1797-413c-a6c1-40c0fa0463bb-kube-api-access-tkcwx podName:dc13b140-1797-413c-a6c1-40c0fa0463bb nodeName:}" failed. No retries permitted until 2023-10-02 19:31:42.83211979 +0000 UTC m=+12.375093075 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-tkcwx" (UniqueName: "kubernetes.io/projected/dc13b140-1797-413c-a6c1-40c0fa0463bb-kube-api-access-tkcwx") pod "kube-proxy-5lzdr" (UID: "dc13b140-1797-413c-a6c1-40c0fa0463bb") : configmap "kube-root-ca.crt" not found Oct 2 19:31:42.414325 env[1641]: time="2023-10-02T19:31:42.414205106Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:cilium-zjcpf,Uid:676d69a2-1086-4c05-b8fc-deee645c74c0,Namespace:kube-system,Attempt:0,}" Oct 2 19:31:42.441604 env[1641]: time="2023-10-02T19:31:42.441529451Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:31:42.441828 env[1641]: time="2023-10-02T19:31:42.441579384Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:31:42.441828 env[1641]: time="2023-10-02T19:31:42.441595065Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:31:42.441986 env[1641]: time="2023-10-02T19:31:42.441855190Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e pid=2818 runtime=io.containerd.runc.v2 Oct 2 19:31:42.475648 systemd[1]: Started cri-containerd-cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e.scope. Oct 2 19:31:42.515360 kernel: audit: type=1400 audit(1696275102.507:984): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.525266 kernel: audit: type=1400 audit(1696275102.507:985): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.525552 kernel: audit: type=1400 audit(1696275102.507:986): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.532158 kernel: audit: type=1400 audit(1696275102.507:987): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.542238 kernel: audit: type=1400 audit(1696275102.507:988): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.542383 kernel: audit: type=1400 audit(1696275102.507:989): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.547751 kernel: audit: type=1400 audit(1696275102.507:990): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.508000 audit: BPF prog-id=112 op=LOAD Oct 2 19:31:42.514000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.514000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2818 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:42.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363373865643331323061353236643066303833613465396234636232 Oct 2 19:31:42.514000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.514000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2818 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:42.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363373865643331323061353236643066303833613465396234636232 Oct 2 19:31:42.514000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.514000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.514000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.514000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.514000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.514000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.514000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.514000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.514000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.514000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.514000 audit: BPF prog-id=113 op=LOAD Oct 2 19:31:42.514000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003a86f0 items=0 ppid=2818 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:42.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363373865643331323061353236643066303833613465396234636232 Oct 2 19:31:42.524000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.524000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.524000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.524000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.524000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.524000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.524000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.524000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.524000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.524000 audit: BPF prog-id=114 op=LOAD Oct 2 19:31:42.524000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003a8738 items=0 ppid=2818 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:42.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363373865643331323061353236643066303833613465396234636232 Oct 2 19:31:42.524000 audit: BPF prog-id=114 op=UNLOAD Oct 2 19:31:42.524000 audit: BPF prog-id=113 op=UNLOAD Oct 2 19:31:42.524000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.524000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.524000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.524000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.524000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.524000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.524000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.524000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.524000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.524000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:42.524000 audit: BPF prog-id=115 op=LOAD Oct 2 19:31:42.524000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003a8b48 items=0 ppid=2818 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:42.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363373865643331323061353236643066303833613465396234636232 Oct 2 19:31:42.578602 env[1641]: time="2023-10-02T19:31:42.578547910Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:cilium-zjcpf,Uid:676d69a2-1086-4c05-b8fc-deee645c74c0,Namespace:kube-system,Attempt:0,} returns sandbox id \"cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e\"" Oct 2 19:31:42.583964 env[1641]: time="2023-10-02T19:31:42.583920281Z" level=info msg="PullImage \"quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\"" Oct 2 19:31:42.614825 kubelet[2744]: I1002 19:31:42.614687 2744 topology_manager.go:215] "Topology Admit Handler" podUID="8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f" podNamespace="kube-system" podName="cilium-operator-6bc8ccdb58-tx6wx" Oct 2 19:31:42.627615 systemd[1]: Created slice kubepods-besteffort-pod8dbb76cb_d17f_4a4b_bbfd_a5a44fe6af8f.slice. Oct 2 19:31:42.681803 kubelet[2744]: I1002 19:31:42.681396 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2jgpb\" (UniqueName: \"kubernetes.io/projected/8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f-kube-api-access-2jgpb\") pod \"cilium-operator-6bc8ccdb58-tx6wx\" (UID: \"8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f\") " pod="kube-system/cilium-operator-6bc8ccdb58-tx6wx" Oct 2 19:31:42.681803 kubelet[2744]: I1002 19:31:42.681595 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f-cilium-config-path\") pod \"cilium-operator-6bc8ccdb58-tx6wx\" (UID: \"8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f\") " pod="kube-system/cilium-operator-6bc8ccdb58-tx6wx" Oct 2 19:31:42.933215 env[1641]: time="2023-10-02T19:31:42.932945767Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:cilium-operator-6bc8ccdb58-tx6wx,Uid:8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f,Namespace:kube-system,Attempt:0,}" Oct 2 19:31:42.970135 env[1641]: time="2023-10-02T19:31:42.970038794Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:31:42.970135 env[1641]: time="2023-10-02T19:31:42.970111527Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:31:42.970648 env[1641]: time="2023-10-02T19:31:42.970588283Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:31:42.970935 env[1641]: time="2023-10-02T19:31:42.970882787Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/87f72d17c19b32dd88af9cb708869facb4cba8654b42d5da05f90cb0024e472c pid=2864 runtime=io.containerd.runc.v2 Oct 2 19:31:42.992601 systemd[1]: Started cri-containerd-87f72d17c19b32dd88af9cb708869facb4cba8654b42d5da05f90cb0024e472c.scope. Oct 2 19:31:43.002154 env[1641]: time="2023-10-02T19:31:43.002104800Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-5lzdr,Uid:dc13b140-1797-413c-a6c1-40c0fa0463bb,Namespace:kube-system,Attempt:0,}" Oct 2 19:31:43.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.046000 audit: BPF prog-id=116 op=LOAD Oct 2 19:31:43.047000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.047000 audit[2874]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=2864 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837663732643137633139623332646438386166396362373038383639 Oct 2 19:31:43.047000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.047000 audit[2874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=c items=0 ppid=2864 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837663732643137633139623332646438386166396362373038383639 Oct 2 19:31:43.047000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.047000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.047000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.047000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.047000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.047000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.047000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.047000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.047000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.047000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.047000 audit: BPF prog-id=117 op=LOAD Oct 2 19:31:43.047000 audit[2874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c0001db4b0 items=0 ppid=2864 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837663732643137633139623332646438386166396362373038383639 Oct 2 19:31:43.047000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.047000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.047000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.047000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.047000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.047000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.047000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.047000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.047000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.047000 audit: BPF prog-id=118 op=LOAD Oct 2 19:31:43.047000 audit[2874]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c0001db4f8 items=0 ppid=2864 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837663732643137633139623332646438386166396362373038383639 Oct 2 19:31:43.048000 audit: BPF prog-id=118 op=UNLOAD Oct 2 19:31:43.048000 audit: BPF prog-id=117 op=UNLOAD Oct 2 19:31:43.048000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.048000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.048000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.048000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.048000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.048000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.048000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.048000 audit[2874]: AVC avc: denied { perfmon } for pid=2874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.048000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.048000 audit[2874]: AVC avc: denied { bpf } for pid=2874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.048000 audit: BPF prog-id=119 op=LOAD Oct 2 19:31:43.048000 audit[2874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c0001db908 items=0 ppid=2864 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837663732643137633139623332646438386166396362373038383639 Oct 2 19:31:43.075020 env[1641]: time="2023-10-02T19:31:43.066629528Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:31:43.075020 env[1641]: time="2023-10-02T19:31:43.066747028Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:31:43.075020 env[1641]: time="2023-10-02T19:31:43.066790598Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:31:43.075020 env[1641]: time="2023-10-02T19:31:43.066979767Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7d45f4c2961977211665cd759e3025b106308c119390e06afe5edda29739f53f pid=2899 runtime=io.containerd.runc.v2 Oct 2 19:31:43.129252 systemd[1]: Started cri-containerd-7d45f4c2961977211665cd759e3025b106308c119390e06afe5edda29739f53f.scope. Oct 2 19:31:43.137298 env[1641]: time="2023-10-02T19:31:43.137035084Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:cilium-operator-6bc8ccdb58-tx6wx,Uid:8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f,Namespace:kube-system,Attempt:0,} returns sandbox id \"87f72d17c19b32dd88af9cb708869facb4cba8654b42d5da05f90cb0024e472c\"" Oct 2 19:31:43.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.149000 audit: BPF prog-id=120 op=LOAD Oct 2 19:31:43.149000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.149000 audit[2909]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2899 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764343566346332393631393737323131363635636437353965333032 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2899 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764343566346332393631393737323131363635636437353965333032 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit: BPF prog-id=121 op=LOAD Oct 2 19:31:43.150000 audit[2909]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002b5c10 items=0 ppid=2899 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764343566346332393631393737323131363635636437353965333032 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit: BPF prog-id=122 op=LOAD Oct 2 19:31:43.150000 audit[2909]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002b5c58 items=0 ppid=2899 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764343566346332393631393737323131363635636437353965333032 Oct 2 19:31:43.150000 audit: BPF prog-id=122 op=UNLOAD Oct 2 19:31:43.150000 audit: BPF prog-id=121 op=UNLOAD Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.150000 audit: BPF prog-id=123 op=LOAD Oct 2 19:31:43.150000 audit[2909]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002ea068 items=0 ppid=2899 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764343566346332393631393737323131363635636437353965333032 Oct 2 19:31:43.171287 env[1641]: time="2023-10-02T19:31:43.171238347Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-5lzdr,Uid:dc13b140-1797-413c-a6c1-40c0fa0463bb,Namespace:kube-system,Attempt:0,} returns sandbox id \"7d45f4c2961977211665cd759e3025b106308c119390e06afe5edda29739f53f\"" Oct 2 19:31:43.176819 env[1641]: time="2023-10-02T19:31:43.176772329Z" level=info msg="CreateContainer within sandbox \"7d45f4c2961977211665cd759e3025b106308c119390e06afe5edda29739f53f\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:31:43.198851 env[1641]: time="2023-10-02T19:31:43.198786799Z" level=info msg="CreateContainer within sandbox \"7d45f4c2961977211665cd759e3025b106308c119390e06afe5edda29739f53f\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9b0b9b11faaa9f2118495af3837b98264a791f108d718f8b0b1e9fdf8abe3b1c\"" Oct 2 19:31:43.202749 env[1641]: time="2023-10-02T19:31:43.201198316Z" level=info msg="StartContainer for \"9b0b9b11faaa9f2118495af3837b98264a791f108d718f8b0b1e9fdf8abe3b1c\"" Oct 2 19:31:43.227072 systemd[1]: Started cri-containerd-9b0b9b11faaa9f2118495af3837b98264a791f108d718f8b0b1e9fdf8abe3b1c.scope. Oct 2 19:31:43.250000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.250000 audit[2948]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2899 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962306239623131666161613966323131383439356166333833376239 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit: BPF prog-id=124 op=LOAD Oct 2 19:31:43.251000 audit[2948]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00028a720 items=0 ppid=2899 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962306239623131666161613966323131383439356166333833376239 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit: BPF prog-id=125 op=LOAD Oct 2 19:31:43.251000 audit[2948]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00028a768 items=0 ppid=2899 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962306239623131666161613966323131383439356166333833376239 Oct 2 19:31:43.251000 audit: BPF prog-id=125 op=UNLOAD Oct 2 19:31:43.251000 audit: BPF prog-id=124 op=UNLOAD Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:43.251000 audit: BPF prog-id=126 op=LOAD Oct 2 19:31:43.251000 audit[2948]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00028a7f8 items=0 ppid=2899 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962306239623131666161613966323131383439356166333833376239 Oct 2 19:31:43.276575 env[1641]: time="2023-10-02T19:31:43.276520622Z" level=info msg="StartContainer for \"9b0b9b11faaa9f2118495af3837b98264a791f108d718f8b0b1e9fdf8abe3b1c\" returns successfully" Oct 2 19:31:43.542000 audit[2999]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2999 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.542000 audit[2999]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0ef71b90 a2=0 a3=7ffc0ef71b7c items=0 ppid=2958 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.542000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:31:43.546000 audit[3000]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=3000 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.546000 audit[3000]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff09c3090 a2=0 a3=7ffff09c307c items=0 ppid=2958 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:31:43.555000 audit[3001]: NETFILTER_CFG table=mangle:40 family=2 entries=1 op=nft_register_chain pid=3001 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.555000 audit[3001]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffded6b6b70 a2=0 a3=7ffded6b6b5c items=0 ppid=2958 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.555000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:31:43.557000 audit[3003]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=3003 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.557000 audit[3003]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd454d8760 a2=0 a3=7ffd454d874c items=0 ppid=2958 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.557000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:31:43.559000 audit[3002]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=3002 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.559000 audit[3004]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=3004 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.559000 audit[3004]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe75e8db80 a2=0 a3=7ffe75e8db6c items=0 ppid=2958 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.559000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:31:43.559000 audit[3002]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce0f264a0 a2=0 a3=7ffce0f2648c items=0 ppid=2958 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:31:43.648000 audit[3005]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3005 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.648000 audit[3005]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffefbb2adf0 a2=0 a3=7ffefbb2addc items=0 ppid=2958 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.648000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:31:43.652000 audit[3007]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3007 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.652000 audit[3007]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd458091c0 a2=0 a3=7ffd458091ac items=0 ppid=2958 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.652000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:31:43.656000 audit[3010]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3010 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.656000 audit[3010]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff40397960 a2=0 a3=7fff4039794c items=0 ppid=2958 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.656000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:31:43.658000 audit[3011]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3011 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.658000 audit[3011]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf00f7e70 a2=0 a3=7ffdf00f7e5c items=0 ppid=2958 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.658000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:31:43.661000 audit[3013]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3013 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.661000 audit[3013]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffec205dd70 a2=0 a3=7ffec205dd5c items=0 ppid=2958 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.661000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:31:43.662000 audit[3014]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3014 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.662000 audit[3014]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe813076c0 a2=0 a3=7ffe813076ac items=0 ppid=2958 pid=3014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.662000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:31:43.666000 audit[3016]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3016 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.666000 audit[3016]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe0f77cc90 a2=0 a3=7ffe0f77cc7c items=0 ppid=2958 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.666000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:31:43.670000 audit[3019]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3019 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.670000 audit[3019]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffefd0458b0 a2=0 a3=7ffefd04589c items=0 ppid=2958 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.670000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:31:43.671000 audit[3020]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3020 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.671000 audit[3020]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd19e5c70 a2=0 a3=7ffcd19e5c5c items=0 ppid=2958 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.671000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:31:43.674000 audit[3022]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3022 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.674000 audit[3022]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc3f9c7f60 a2=0 a3=7ffc3f9c7f4c items=0 ppid=2958 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.674000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:31:43.676000 audit[3023]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3023 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.676000 audit[3023]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd05d521b0 a2=0 a3=7ffd05d5219c items=0 ppid=2958 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.676000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:31:43.679000 audit[3025]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3025 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.679000 audit[3025]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffececf6140 a2=0 a3=7ffececf612c items=0 ppid=2958 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.679000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:31:43.684000 audit[3028]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3028 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.684000 audit[3028]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffec00d32b0 a2=0 a3=7ffec00d329c items=0 ppid=2958 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.684000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:31:43.689000 audit[3031]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3031 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.689000 audit[3031]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffec89a3260 a2=0 a3=7ffec89a324c items=0 ppid=2958 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.689000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:31:43.690000 audit[3032]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3032 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.690000 audit[3032]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeeb14e150 a2=0 a3=7ffeeb14e13c items=0 ppid=2958 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.690000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:31:43.694000 audit[3034]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3034 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.694000 audit[3034]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fffc6d7fbb0 a2=0 a3=7fffc6d7fb9c items=0 ppid=2958 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.694000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:31:43.698000 audit[3037]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3037 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.698000 audit[3037]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc4f7512f0 a2=0 a3=7ffc4f7512dc items=0 ppid=2958 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.698000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:31:43.700000 audit[3038]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3038 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.700000 audit[3038]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb2c80e80 a2=0 a3=7fffb2c80e6c items=0 ppid=2958 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.700000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:31:43.702000 audit[3040]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3040 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:31:43.702000 audit[3040]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe4a1a1300 a2=0 a3=7ffe4a1a12ec items=0 ppid=2958 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.702000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:31:43.745000 audit[3046]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3046 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:31:43.745000 audit[3046]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffdcf0d5b00 a2=0 a3=7ffdcf0d5aec items=0 ppid=2958 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.745000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:31:43.755000 audit[3046]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3046 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:31:43.755000 audit[3046]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffdcf0d5b00 a2=0 a3=7ffdcf0d5aec items=0 ppid=2958 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.755000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:31:43.757000 audit[3051]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3051 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.757000 audit[3051]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd4718de80 a2=0 a3=7ffd4718de6c items=0 ppid=2958 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.757000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:31:43.761000 audit[3053]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3053 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.761000 audit[3053]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe845d57b0 a2=0 a3=7ffe845d579c items=0 ppid=2958 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.761000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:31:43.773000 audit[3056]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3056 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.773000 audit[3056]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc07634820 a2=0 a3=7ffc0763480c items=0 ppid=2958 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.773000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:31:43.774000 audit[3057]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3057 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.774000 audit[3057]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe624ee6e0 a2=0 a3=7ffe624ee6cc items=0 ppid=2958 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.774000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:31:43.777000 audit[3059]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3059 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.777000 audit[3059]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe5da13ee0 a2=0 a3=7ffe5da13ecc items=0 ppid=2958 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.777000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:31:43.779000 audit[3060]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3060 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.779000 audit[3060]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd14daeea0 a2=0 a3=7ffd14daee8c items=0 ppid=2958 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.779000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:31:43.782000 audit[3062]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3062 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.782000 audit[3062]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe32c7a2c0 a2=0 a3=7ffe32c7a2ac items=0 ppid=2958 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.782000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:31:43.786000 audit[3065]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3065 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.786000 audit[3065]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffeeea48f50 a2=0 a3=7ffeeea48f3c items=0 ppid=2958 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.786000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:31:43.788000 audit[3066]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3066 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.788000 audit[3066]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce6c2e500 a2=0 a3=7ffce6c2e4ec items=0 ppid=2958 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.788000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:31:43.790000 audit[3068]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3068 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.790000 audit[3068]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdcb6078f0 a2=0 a3=7ffdcb6078dc items=0 ppid=2958 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.790000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:31:43.792000 audit[3069]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3069 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.792000 audit[3069]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec1f9bb60 a2=0 a3=7ffec1f9bb4c items=0 ppid=2958 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.792000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:31:43.795000 audit[3071]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3071 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.795000 audit[3071]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd9eb1100 a2=0 a3=7ffdd9eb10ec items=0 ppid=2958 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.795000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:31:43.802000 audit[3074]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3074 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.802000 audit[3074]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe4f4f9b20 a2=0 a3=7ffe4f4f9b0c items=0 ppid=2958 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.802000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:31:43.806000 audit[3077]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3077 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.806000 audit[3077]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd55ba8c40 a2=0 a3=7ffd55ba8c2c items=0 ppid=2958 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.806000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:31:43.807000 audit[3078]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3078 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.807000 audit[3078]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe5b8e7120 a2=0 a3=7ffe5b8e710c items=0 ppid=2958 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.807000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:31:43.810000 audit[3080]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3080 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.810000 audit[3080]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffcbac5780 a2=0 a3=7fffcbac576c items=0 ppid=2958 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.810000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:31:43.813000 audit[3083]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3083 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.813000 audit[3083]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffea51f02c0 a2=0 a3=7ffea51f02ac items=0 ppid=2958 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.813000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:31:43.814000 audit[3084]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3084 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.814000 audit[3084]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd88c05c0 a2=0 a3=7ffdd88c05ac items=0 ppid=2958 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.814000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:31:43.817000 audit[3086]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3086 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.817000 audit[3086]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe25f09640 a2=0 a3=7ffe25f0962c items=0 ppid=2958 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.817000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:31:43.819000 audit[3087]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3087 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.819000 audit[3087]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3b0337d0 a2=0 a3=7ffe3b0337bc items=0 ppid=2958 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.819000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:31:43.822000 audit[3089]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3089 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.822000 audit[3089]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcf140dd60 a2=0 a3=7ffcf140dd4c items=0 ppid=2958 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.822000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:31:43.826000 audit[3092]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3092 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:31:43.826000 audit[3092]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffe2349460 a2=0 a3=7fffe234944c items=0 ppid=2958 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.826000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:31:43.829000 audit[3094]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3094 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:31:43.829000 audit[3094]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe0edc7680 a2=0 a3=7ffe0edc766c items=0 ppid=2958 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.829000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:31:43.830000 audit[3094]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3094 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:31:43.830000 audit[3094]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffe0edc7680 a2=0 a3=7ffe0edc766c items=0 ppid=2958 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:43.830000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:31:50.899885 kubelet[2744]: I1002 19:31:50.899813 2744 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-5lzdr" podStartSLOduration=8.899752018000001 podCreationTimestamp="2023-10-02 19:31:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:31:43.975522947 +0000 UTC m=+13.518496238" watchObservedRunningTime="2023-10-02 19:31:50.899752018 +0000 UTC m=+20.442725309" Oct 2 19:31:52.944732 env[1641]: time="2023-10-02T19:31:52.944670581Z" level=info msg="trying next host - response was http.StatusNotFound" host=quay.io Oct 2 19:31:52.946190 env[1641]: time="2023-10-02T19:31:52.946121226Z" level=error msg="PullImage \"quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\" failed" error="failed to pull and unpack image \"quay.io/cilium/cilium@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\": failed to resolve reference \"quay.io/cilium/cilium@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\": pulling from host quay.io failed with status code [manifests sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5]: 504 Gateway Time-out" Oct 2 19:31:52.946606 kubelet[2744]: E1002 19:31:52.946578 2744 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"quay.io/cilium/cilium@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\": failed to resolve reference \"quay.io/cilium/cilium@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\": pulling from host quay.io failed with status code [manifests sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5]: 504 Gateway Time-out" image="quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5" Oct 2 19:31:52.947061 kubelet[2744]: E1002 19:31:52.946645 2744 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"quay.io/cilium/cilium@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\": failed to resolve reference \"quay.io/cilium/cilium@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\": pulling from host quay.io failed with status code [manifests sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5]: 504 Gateway Time-out" image="quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5" Oct 2 19:31:52.949040 kubelet[2744]: E1002 19:31:52.947722 2744 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:31:52.949040 kubelet[2744]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:31:52.949040 kubelet[2744]: rm /hostbin/cilium-mount Oct 2 19:31:52.949223 env[1641]: time="2023-10-02T19:31:52.948104898Z" level=info msg="PullImage \"quay.io/cilium/operator-generic:v1.12.5@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e\"" Oct 2 19:31:52.949274 kubelet[2744]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-kjx8c,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0): ErrImagePull: failed to pull and unpack image "quay.io/cilium/cilium@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5": failed to resolve reference "quay.io/cilium/cilium@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5": pulling from host quay.io failed with status code [manifests sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5]: 504 Gateway Time-out Oct 2 19:31:52.949274 kubelet[2744]: E1002 19:31:52.947812 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with ErrImagePull: \"failed to pull and unpack image \\\"quay.io/cilium/cilium@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\\\": failed to resolve reference \\\"quay.io/cilium/cilium@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\\\": pulling from host quay.io failed with status code [manifests sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5]: 504 Gateway Time-out\"" pod="kube-system/cilium-zjcpf" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" Oct 2 19:31:52.981253 kubelet[2744]: E1002 19:31:52.981227 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with ImagePullBackOff: \"Back-off pulling image \\\"quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\\\"\"" pod="kube-system/cilium-zjcpf" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" Oct 2 19:31:54.179377 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3702656181.mount: Deactivated successfully. Oct 2 19:32:03.899281 env[1641]: time="2023-10-02T19:32:03.899194945Z" level=error msg="PullImage \"quay.io/cilium/operator-generic:v1.12.5@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e\" failed" error="failed to pull and unpack image \"quay.io/cilium/operator-generic@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e\": failed to copy: httpReadSeeker: failed open: unexpected status code https://quay.io/v2/cilium/operator-generic/blobs/sha256:5343f114a05e7d91379d4474ae714939d44fd9adf12c8cf6f562934929d1d3f5: 504 Gateway Time-out" Oct 2 19:32:03.900365 kubelet[2744]: E1002 19:32:03.900330 2744 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"quay.io/cilium/operator-generic@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e\": failed to copy: httpReadSeeker: failed open: unexpected status code https://quay.io/v2/cilium/operator-generic/blobs/sha256:5343f114a05e7d91379d4474ae714939d44fd9adf12c8cf6f562934929d1d3f5: 504 Gateway Time-out" image="quay.io/cilium/operator-generic:v1.12.5@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e" Oct 2 19:32:03.900759 kubelet[2744]: E1002 19:32:03.900388 2744 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"quay.io/cilium/operator-generic@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e\": failed to copy: httpReadSeeker: failed open: unexpected status code https://quay.io/v2/cilium/operator-generic/blobs/sha256:5343f114a05e7d91379d4474ae714939d44fd9adf12c8cf6f562934929d1d3f5: 504 Gateway Time-out" image="quay.io/cilium/operator-generic:v1.12.5@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e" Oct 2 19:32:03.900759 kubelet[2744]: E1002 19:32:03.900565 2744 kuberuntime_manager.go:1209] container &Container{Name:cilium-operator,Image:quay.io/cilium/operator-generic:v1.12.5@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e,Command:[cilium-operator-generic],Args:[--config-dir=/tmp/cilium/config-map --debug=$(CILIUM_DEBUG)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:K8S_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},EnvVar{Name:CILIUM_K8S_NAMESPACE,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:metadata.namespace,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},EnvVar{Name:CILIUM_DEBUG,Value:,ValueFrom:&EnvVarSource{FieldRef:nil,ResourceFieldRef:nil,ConfigMapKeyRef:&ConfigMapKeySelector{LocalObjectReference:LocalObjectReference{Name:cilium-config,},Key:debug,Optional:*true,},SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:cilium-config-path,ReadOnly:true,MountPath:/tmp/cilium/config-map,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-2jgpb,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/healthz,Port:{0 9234 },Host:127.0.0.1,Scheme:HTTP,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:60,TimeoutSeconds:3,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:nil,Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-operator-6bc8ccdb58-tx6wx_kube-system(8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f): ErrImagePull: failed to pull and unpack image "quay.io/cilium/operator-generic@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e": failed to copy: httpReadSeeker: failed open: unexpected status code https://quay.io/v2/cilium/operator-generic/blobs/sha256:5343f114a05e7d91379d4474ae714939d44fd9adf12c8cf6f562934929d1d3f5: 504 Gateway Time-out Oct 2 19:32:03.900759 kubelet[2744]: E1002 19:32:03.900627 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"cilium-operator\" with ErrImagePull: \"failed to pull and unpack image \\\"quay.io/cilium/operator-generic@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e\\\": failed to copy: httpReadSeeker: failed open: unexpected status code https://quay.io/v2/cilium/operator-generic/blobs/sha256:5343f114a05e7d91379d4474ae714939d44fd9adf12c8cf6f562934929d1d3f5: 504 Gateway Time-out\"" pod="kube-system/cilium-operator-6bc8ccdb58-tx6wx" podUID="8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f" Oct 2 19:32:04.003854 kubelet[2744]: E1002 19:32:04.003828 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"cilium-operator\" with ImagePullBackOff: \"Back-off pulling image \\\"quay.io/cilium/operator-generic:v1.12.5@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e\\\"\"" pod="kube-system/cilium-operator-6bc8ccdb58-tx6wx" podUID="8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f" Oct 2 19:32:07.883015 env[1641]: time="2023-10-02T19:32:07.882332227Z" level=info msg="PullImage \"quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\"" Oct 2 19:32:15.089858 systemd[1]: Started sshd@7-172.31.22.61:22-139.178.89.65:56828.service. Oct 2 19:32:15.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.22.61:22-139.178.89.65:56828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:15.093156 kernel: kauditd_printk_skb: 360 callbacks suppressed Oct 2 19:32:15.094432 kernel: audit: type=1130 audit(1696275135.089:1095): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.22.61:22-139.178.89.65:56828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:15.289000 audit[3099]: USER_ACCT pid=3099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:15.290904 sshd[3099]: Accepted publickey for core from 139.178.89.65 port 56828 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:32:15.298026 kernel: audit: type=1101 audit(1696275135.289:1096): pid=3099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:15.297000 audit[3099]: CRED_ACQ pid=3099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:15.299235 sshd[3099]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:32:15.313283 systemd[1]: Started session-8.scope. Oct 2 19:32:15.314079 kernel: audit: type=1103 audit(1696275135.297:1097): pid=3099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:15.314232 kernel: audit: type=1006 audit(1696275135.297:1098): pid=3099 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Oct 2 19:32:15.297000 audit[3099]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda7a778b0 a2=3 a3=0 items=0 ppid=1 pid=3099 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:15.316122 systemd-logind[1632]: New session 8 of user core. Oct 2 19:32:15.321824 kernel: audit: type=1300 audit(1696275135.297:1098): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda7a778b0 a2=3 a3=0 items=0 ppid=1 pid=3099 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:15.297000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:32:15.327086 kernel: audit: type=1327 audit(1696275135.297:1098): proctitle=737368643A20636F7265205B707269765D Oct 2 19:32:15.326000 audit[3099]: USER_START pid=3099 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:15.331000 audit[3101]: CRED_ACQ pid=3101 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:15.341381 kernel: audit: type=1105 audit(1696275135.326:1099): pid=3099 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:15.341528 kernel: audit: type=1103 audit(1696275135.331:1100): pid=3101 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:15.553050 sshd[3099]: pam_unix(sshd:session): session closed for user core Oct 2 19:32:15.553000 audit[3099]: USER_END pid=3099 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:15.557845 systemd[1]: sshd@7-172.31.22.61:22-139.178.89.65:56828.service: Deactivated successfully. Oct 2 19:32:15.559137 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 19:32:15.561201 systemd-logind[1632]: Session 8 logged out. Waiting for processes to exit. Oct 2 19:32:15.562544 systemd-logind[1632]: Removed session 8. Oct 2 19:32:15.567024 kernel: audit: type=1106 audit(1696275135.553:1101): pid=3099 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:15.567128 kernel: audit: type=1104 audit(1696275135.553:1102): pid=3099 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:15.553000 audit[3099]: CRED_DISP pid=3099 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:15.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.22.61:22-139.178.89.65:56828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:18.544551 env[1641]: time="2023-10-02T19:32:18.544447671Z" level=error msg="PullImage \"quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\" failed" error="failed to pull and unpack image \"quay.io/cilium/cilium@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\": failed to copy: httpReadSeeker: failed open: unexpected status code https://quay.io/v2/cilium/cilium/manifests/sha256:160550a57046b6c32c00e48b67bc173d9c913683fea6b824c0aad7682792133e: 504 Gateway Time-out" Oct 2 19:32:18.545327 kubelet[2744]: E1002 19:32:18.544895 2744 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"quay.io/cilium/cilium@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\": failed to copy: httpReadSeeker: failed open: unexpected status code https://quay.io/v2/cilium/cilium/manifests/sha256:160550a57046b6c32c00e48b67bc173d9c913683fea6b824c0aad7682792133e: 504 Gateway Time-out" image="quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5" Oct 2 19:32:18.545327 kubelet[2744]: E1002 19:32:18.545090 2744 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"quay.io/cilium/cilium@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\": failed to copy: httpReadSeeker: failed open: unexpected status code https://quay.io/v2/cilium/cilium/manifests/sha256:160550a57046b6c32c00e48b67bc173d9c913683fea6b824c0aad7682792133e: 504 Gateway Time-out" image="quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5" Oct 2 19:32:18.545327 kubelet[2744]: E1002 19:32:18.545324 2744 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:32:18.545327 kubelet[2744]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:32:18.545327 kubelet[2744]: rm /hostbin/cilium-mount Oct 2 19:32:18.545327 kubelet[2744]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-kjx8c,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0): ErrImagePull: failed to pull and unpack image "quay.io/cilium/cilium@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5": failed to copy: httpReadSeeker: failed open: unexpected status code https://quay.io/v2/cilium/cilium/manifests/sha256:160550a57046b6c32c00e48b67bc173d9c913683fea6b824c0aad7682792133e: 504 Gateway Time-out Oct 2 19:32:18.545951 kubelet[2744]: E1002 19:32:18.545380 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with ErrImagePull: \"failed to pull and unpack image \\\"quay.io/cilium/cilium@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\\\": failed to copy: httpReadSeeker: failed open: unexpected status code https://quay.io/v2/cilium/cilium/manifests/sha256:160550a57046b6c32c00e48b67bc173d9c913683fea6b824c0aad7682792133e: 504 Gateway Time-out\"" pod="kube-system/cilium-zjcpf" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" Oct 2 19:32:18.546540 env[1641]: time="2023-10-02T19:32:18.546262468Z" level=info msg="PullImage \"quay.io/cilium/operator-generic:v1.12.5@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e\"" Oct 2 19:32:19.834676 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount724133555.mount: Deactivated successfully. Oct 2 19:32:24.919000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:32:24.922062 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:32:24.922120 kernel: audit: type=1400 audit(1696275144.919:1104): avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:32:24.919000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010c86e0 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:32:24.934303 kernel: audit: type=1300 audit(1696275144.919:1104): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010c86e0 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:32:24.934439 kernel: audit: type=1327 audit(1696275144.919:1104): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:32:24.919000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:32:24.940739 kernel: audit: type=1400 audit(1696275144.920:1105): avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:32:24.920000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:32:24.920000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c72db0 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:32:24.952878 kernel: audit: type=1300 audit(1696275144.920:1105): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c72db0 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:32:24.952966 kernel: audit: type=1327 audit(1696275144.920:1105): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:32:24.920000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:32:25.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.22.61:22-139.178.89.65:36588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:25.580853 systemd[1]: Started sshd@8-172.31.22.61:22-139.178.89.65:36588.service. Oct 2 19:32:25.590035 kernel: audit: type=1130 audit(1696275145.580:1106): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.22.61:22-139.178.89.65:36588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:25.757000 audit[3113]: USER_ACCT pid=3113 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:25.759276 sshd[3113]: Accepted publickey for core from 139.178.89.65 port 36588 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:32:25.767023 kernel: audit: type=1101 audit(1696275145.757:1107): pid=3113 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:25.768680 sshd[3113]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:32:25.766000 audit[3113]: CRED_ACQ pid=3113 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:25.778135 systemd[1]: Started session-9.scope. Oct 2 19:32:25.779864 kernel: audit: type=1103 audit(1696275145.766:1108): pid=3113 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:25.779967 kernel: audit: type=1006 audit(1696275145.766:1109): pid=3113 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Oct 2 19:32:25.766000 audit[3113]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1e376d80 a2=3 a3=0 items=0 ppid=1 pid=3113 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:25.766000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:32:25.779515 systemd-logind[1632]: New session 9 of user core. Oct 2 19:32:25.786000 audit[3113]: USER_START pid=3113 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:25.788000 audit[3115]: CRED_ACQ pid=3115 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:26.002274 sshd[3113]: pam_unix(sshd:session): session closed for user core Oct 2 19:32:26.003000 audit[3113]: USER_END pid=3113 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:26.004000 audit[3113]: CRED_DISP pid=3113 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:26.007416 systemd[1]: sshd@8-172.31.22.61:22-139.178.89.65:36588.service: Deactivated successfully. Oct 2 19:32:26.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.22.61:22-139.178.89.65:36588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:26.009254 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 19:32:26.010650 systemd-logind[1632]: Session 9 logged out. Waiting for processes to exit. Oct 2 19:32:26.011918 systemd-logind[1632]: Removed session 9. Oct 2 19:32:26.330000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:32:26.330000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c007c9eb70 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:32:26.330000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:32:26.331000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:32:26.331000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c007c9eba0 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:32:26.331000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:32:26.332000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:32:26.332000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c007cc0980 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:32:26.332000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:32:26.347000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:32:26.347000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c007c9ec30 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:32:26.347000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:32:26.358000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:32:26.358000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c007cc0a80 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:32:26.358000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:32:26.360000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:32:26.360000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c007d04450 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:32:26.360000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:32:28.681000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:32:28.681000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fed620 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:32:28.681000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:32:28.687000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:32:28.687000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:32:28.687000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010c8800 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:32:28.687000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:32:28.687000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000fed740 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:32:28.687000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:32:28.688000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:32:28.688000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010c8940 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:32:28.688000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:32:29.915584 env[1641]: time="2023-10-02T19:32:29.915333167Z" level=error msg="PullImage \"quay.io/cilium/operator-generic:v1.12.5@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e\" failed" error="failed to pull and unpack image \"quay.io/cilium/operator-generic@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e\": failed to copy: httpReadSeeker: failed open: unexpected status code https://quay.io/v2/cilium/operator-generic/blobs/sha256:95566828b7f1020652d3da63aeff6d5df73d7788bd567e0e8b8ce9fa9c5099e9: 504 Gateway Time-out" Oct 2 19:32:29.916078 kubelet[2744]: E1002 19:32:29.915723 2744 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"quay.io/cilium/operator-generic@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e\": failed to copy: httpReadSeeker: failed open: unexpected status code https://quay.io/v2/cilium/operator-generic/blobs/sha256:95566828b7f1020652d3da63aeff6d5df73d7788bd567e0e8b8ce9fa9c5099e9: 504 Gateway Time-out" image="quay.io/cilium/operator-generic:v1.12.5@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e" Oct 2 19:32:29.916078 kubelet[2744]: E1002 19:32:29.915770 2744 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"quay.io/cilium/operator-generic@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e\": failed to copy: httpReadSeeker: failed open: unexpected status code https://quay.io/v2/cilium/operator-generic/blobs/sha256:95566828b7f1020652d3da63aeff6d5df73d7788bd567e0e8b8ce9fa9c5099e9: 504 Gateway Time-out" image="quay.io/cilium/operator-generic:v1.12.5@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e" Oct 2 19:32:29.916078 kubelet[2744]: E1002 19:32:29.915894 2744 kuberuntime_manager.go:1209] container &Container{Name:cilium-operator,Image:quay.io/cilium/operator-generic:v1.12.5@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e,Command:[cilium-operator-generic],Args:[--config-dir=/tmp/cilium/config-map --debug=$(CILIUM_DEBUG)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:K8S_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},EnvVar{Name:CILIUM_K8S_NAMESPACE,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:metadata.namespace,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},EnvVar{Name:CILIUM_DEBUG,Value:,ValueFrom:&EnvVarSource{FieldRef:nil,ResourceFieldRef:nil,ConfigMapKeyRef:&ConfigMapKeySelector{LocalObjectReference:LocalObjectReference{Name:cilium-config,},Key:debug,Optional:*true,},SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:cilium-config-path,ReadOnly:true,MountPath:/tmp/cilium/config-map,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-2jgpb,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/healthz,Port:{0 9234 },Host:127.0.0.1,Scheme:HTTP,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:60,TimeoutSeconds:3,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:nil,Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-operator-6bc8ccdb58-tx6wx_kube-system(8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f): ErrImagePull: failed to pull and unpack image "quay.io/cilium/operator-generic@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e": failed to copy: httpReadSeeker: failed open: unexpected status code https://quay.io/v2/cilium/operator-generic/blobs/sha256:95566828b7f1020652d3da63aeff6d5df73d7788bd567e0e8b8ce9fa9c5099e9: 504 Gateway Time-out Oct 2 19:32:29.916078 kubelet[2744]: E1002 19:32:29.915944 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"cilium-operator\" with ErrImagePull: \"failed to pull and unpack image \\\"quay.io/cilium/operator-generic@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e\\\": failed to copy: httpReadSeeker: failed open: unexpected status code https://quay.io/v2/cilium/operator-generic/blobs/sha256:95566828b7f1020652d3da63aeff6d5df73d7788bd567e0e8b8ce9fa9c5099e9: 504 Gateway Time-out\"" pod="kube-system/cilium-operator-6bc8ccdb58-tx6wx" podUID="8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f" Oct 2 19:32:33.881287 kubelet[2744]: E1002 19:32:33.881258 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with ImagePullBackOff: \"Back-off pulling image \\\"quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\\\"\"" pod="kube-system/cilium-zjcpf" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" Oct 2 19:32:36.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.22.61:22-139.178.89.65:47960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:36.035478 kernel: kauditd_printk_skb: 37 callbacks suppressed Oct 2 19:32:36.035569 kernel: audit: type=1130 audit(1696275156.029:1125): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.22.61:22-139.178.89.65:47960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:36.030644 systemd[1]: Started sshd@9-172.31.22.61:22-139.178.89.65:47960.service. Oct 2 19:32:36.208000 audit[3130]: USER_ACCT pid=3130 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:36.209360 sshd[3130]: Accepted publickey for core from 139.178.89.65 port 47960 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:32:36.215024 kernel: audit: type=1101 audit(1696275156.208:1126): pid=3130 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:36.214000 audit[3130]: CRED_ACQ pid=3130 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:36.216315 sshd[3130]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:32:36.225720 systemd[1]: Started session-10.scope. Oct 2 19:32:36.227626 kernel: audit: type=1103 audit(1696275156.214:1127): pid=3130 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:36.227712 kernel: audit: type=1006 audit(1696275156.214:1128): pid=3130 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 2 19:32:36.214000 audit[3130]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf4dfe150 a2=3 a3=0 items=0 ppid=1 pid=3130 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:36.227868 systemd-logind[1632]: New session 10 of user core. Oct 2 19:32:36.234478 kernel: audit: type=1300 audit(1696275156.214:1128): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf4dfe150 a2=3 a3=0 items=0 ppid=1 pid=3130 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:36.235491 kernel: audit: type=1327 audit(1696275156.214:1128): proctitle=737368643A20636F7265205B707269765D Oct 2 19:32:36.214000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:32:36.235000 audit[3130]: USER_START pid=3130 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:36.244250 kernel: audit: type=1105 audit(1696275156.235:1129): pid=3130 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:36.244382 kernel: audit: type=1103 audit(1696275156.237:1130): pid=3132 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:36.237000 audit[3132]: CRED_ACQ pid=3132 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:36.430169 sshd[3130]: pam_unix(sshd:session): session closed for user core Oct 2 19:32:36.431000 audit[3130]: USER_END pid=3130 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:36.431000 audit[3130]: CRED_DISP pid=3130 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:36.443496 systemd[1]: sshd@9-172.31.22.61:22-139.178.89.65:47960.service: Deactivated successfully. Oct 2 19:32:36.444647 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 19:32:36.447321 systemd-logind[1632]: Session 10 logged out. Waiting for processes to exit. Oct 2 19:32:36.449024 kernel: audit: type=1106 audit(1696275156.431:1131): pid=3130 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:36.449111 kernel: audit: type=1104 audit(1696275156.431:1132): pid=3130 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:36.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.22.61:22-139.178.89.65:47960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:36.448850 systemd-logind[1632]: Removed session 10. Oct 2 19:32:42.881640 kubelet[2744]: E1002 19:32:42.881613 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"cilium-operator\" with ImagePullBackOff: \"Back-off pulling image \\\"quay.io/cilium/operator-generic:v1.12.5@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e\\\"\"" pod="kube-system/cilium-operator-6bc8ccdb58-tx6wx" podUID="8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f" Oct 2 19:32:45.882928 env[1641]: time="2023-10-02T19:32:45.882293419Z" level=info msg="PullImage \"quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\"" Oct 2 19:32:46.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.22.61:22-139.178.89.65:33234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:46.457722 systemd[1]: Started sshd@10-172.31.22.61:22-139.178.89.65:33234.service. Oct 2 19:32:46.459413 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:32:46.459497 kernel: audit: type=1130 audit(1696275166.457:1134): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.22.61:22-139.178.89.65:33234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:46.632000 audit[3145]: USER_ACCT pid=3145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:46.640165 kernel: audit: type=1101 audit(1696275166.632:1135): pid=3145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:46.640216 sshd[3145]: Accepted publickey for core from 139.178.89.65 port 33234 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:32:46.639000 audit[3145]: CRED_ACQ pid=3145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:46.641155 sshd[3145]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:32:46.653612 kernel: audit: type=1103 audit(1696275166.639:1136): pid=3145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:46.654568 systemd[1]: Started session-11.scope. Oct 2 19:32:46.655835 systemd-logind[1632]: New session 11 of user core. Oct 2 19:32:46.639000 audit[3145]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2486b0b0 a2=3 a3=0 items=0 ppid=1 pid=3145 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:46.668563 kernel: audit: type=1006 audit(1696275166.639:1137): pid=3145 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Oct 2 19:32:46.668683 kernel: audit: type=1300 audit(1696275166.639:1137): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2486b0b0 a2=3 a3=0 items=0 ppid=1 pid=3145 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:46.668723 kernel: audit: type=1327 audit(1696275166.639:1137): proctitle=737368643A20636F7265205B707269765D Oct 2 19:32:46.639000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:32:46.672524 kernel: audit: type=1105 audit(1696275166.663:1138): pid=3145 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:46.663000 audit[3145]: USER_START pid=3145 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:46.666000 audit[3147]: CRED_ACQ pid=3147 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:46.683305 kernel: audit: type=1103 audit(1696275166.666:1139): pid=3147 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:46.881086 sshd[3145]: pam_unix(sshd:session): session closed for user core Oct 2 19:32:46.883000 audit[3145]: USER_END pid=3145 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:46.884000 audit[3145]: CRED_DISP pid=3145 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:46.893583 systemd[1]: sshd@10-172.31.22.61:22-139.178.89.65:33234.service: Deactivated successfully. Oct 2 19:32:46.894599 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 19:32:46.896164 systemd-logind[1632]: Session 11 logged out. Waiting for processes to exit. Oct 2 19:32:46.897604 kernel: audit: type=1106 audit(1696275166.883:1140): pid=3145 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:46.897682 kernel: audit: type=1104 audit(1696275166.884:1141): pid=3145 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:46.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.22.61:22-139.178.89.65:33234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:46.897264 systemd-logind[1632]: Removed session 11. Oct 2 19:32:51.955740 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount298791812.mount: Deactivated successfully. Oct 2 19:32:56.021321 env[1641]: time="2023-10-02T19:32:56.021268274Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/cilium/cilium@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:56.024365 env[1641]: time="2023-10-02T19:32:56.024323759Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3e35b3e9f295e7748482d40ed499b0ff7961f1f128d479d8e6682b3245bba69b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:56.026939 env[1641]: time="2023-10-02T19:32:56.026894459Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/cilium/cilium@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:56.027743 env[1641]: time="2023-10-02T19:32:56.027701635Z" level=info msg="PullImage \"quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\" returns image reference \"sha256:3e35b3e9f295e7748482d40ed499b0ff7961f1f128d479d8e6682b3245bba69b\"" Oct 2 19:32:56.030961 env[1641]: time="2023-10-02T19:32:56.030919660Z" level=info msg="CreateContainer within sandbox \"cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:0,}" Oct 2 19:32:56.034187 env[1641]: time="2023-10-02T19:32:56.034144714Z" level=info msg="PullImage \"quay.io/cilium/operator-generic:v1.12.5@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e\"" Oct 2 19:32:56.067089 env[1641]: time="2023-10-02T19:32:56.067038895Z" level=info msg="CreateContainer within sandbox \"cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e\" for &ContainerMetadata{Name:mount-cgroup,Attempt:0,} returns container id \"e440781d3bbbccecc0993307905d6f6a8e71c685a983b3884a99add4a33ca372\"" Oct 2 19:32:56.068116 env[1641]: time="2023-10-02T19:32:56.068084550Z" level=info msg="StartContainer for \"e440781d3bbbccecc0993307905d6f6a8e71c685a983b3884a99add4a33ca372\"" Oct 2 19:32:56.100690 systemd[1]: Started cri-containerd-e440781d3bbbccecc0993307905d6f6a8e71c685a983b3884a99add4a33ca372.scope. Oct 2 19:32:56.177031 systemd[1]: cri-containerd-e440781d3bbbccecc0993307905d6f6a8e71c685a983b3884a99add4a33ca372.scope: Deactivated successfully. Oct 2 19:32:56.283394 env[1641]: time="2023-10-02T19:32:56.283260675Z" level=info msg="shim disconnected" id=e440781d3bbbccecc0993307905d6f6a8e71c685a983b3884a99add4a33ca372 Oct 2 19:32:56.283394 env[1641]: time="2023-10-02T19:32:56.283312995Z" level=warning msg="cleaning up after shim disconnected" id=e440781d3bbbccecc0993307905d6f6a8e71c685a983b3884a99add4a33ca372 namespace=k8s.io Oct 2 19:32:56.283394 env[1641]: time="2023-10-02T19:32:56.283325353Z" level=info msg="cleaning up dead shim" Oct 2 19:32:56.296117 env[1641]: time="2023-10-02T19:32:56.296039165Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:32:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3180 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:32:56Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/e440781d3bbbccecc0993307905d6f6a8e71c685a983b3884a99add4a33ca372/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:32:56.296676 env[1641]: time="2023-10-02T19:32:56.296458135Z" level=error msg="copy shim log" error="read /proc/self/fd/58: file already closed" Oct 2 19:32:56.297047 env[1641]: time="2023-10-02T19:32:56.296987261Z" level=error msg="Failed to pipe stdout of container \"e440781d3bbbccecc0993307905d6f6a8e71c685a983b3884a99add4a33ca372\"" error="reading from a closed fifo" Oct 2 19:32:56.301178 env[1641]: time="2023-10-02T19:32:56.301120248Z" level=error msg="Failed to pipe stderr of container \"e440781d3bbbccecc0993307905d6f6a8e71c685a983b3884a99add4a33ca372\"" error="reading from a closed fifo" Oct 2 19:32:56.303982 env[1641]: time="2023-10-02T19:32:56.303934685Z" level=error msg="StartContainer for \"e440781d3bbbccecc0993307905d6f6a8e71c685a983b3884a99add4a33ca372\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:32:56.305017 kubelet[2744]: E1002 19:32:56.304343 2744 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="e440781d3bbbccecc0993307905d6f6a8e71c685a983b3884a99add4a33ca372" Oct 2 19:32:56.305017 kubelet[2744]: E1002 19:32:56.304448 2744 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:32:56.305017 kubelet[2744]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:32:56.305017 kubelet[2744]: rm /hostbin/cilium-mount Oct 2 19:32:56.305017 kubelet[2744]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-kjx8c,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:32:56.305017 kubelet[2744]: E1002 19:32:56.304488 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-zjcpf" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" Oct 2 19:32:56.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.22.61:22-139.178.89.65:42340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:56.911951 systemd[1]: Started sshd@11-172.31.22.61:22-139.178.89.65:42340.service. Oct 2 19:32:56.915351 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:32:56.915455 kernel: audit: type=1130 audit(1696275176.911:1143): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.22.61:22-139.178.89.65:42340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:57.050458 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e440781d3bbbccecc0993307905d6f6a8e71c685a983b3884a99add4a33ca372-rootfs.mount: Deactivated successfully. Oct 2 19:32:57.109000 audit[3194]: USER_ACCT pid=3194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:57.116859 sshd[3194]: Accepted publickey for core from 139.178.89.65 port 42340 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:32:57.117382 kernel: audit: type=1101 audit(1696275177.109:1144): pid=3194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:57.116000 audit[3194]: CRED_ACQ pid=3194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:57.126467 kernel: audit: type=1103 audit(1696275177.116:1145): pid=3194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:57.124564 sshd[3194]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:32:57.133513 kernel: audit: type=1006 audit(1696275177.116:1146): pid=3194 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Oct 2 19:32:57.133621 kernel: audit: type=1300 audit(1696275177.116:1146): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf4019b70 a2=3 a3=0 items=0 ppid=1 pid=3194 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:57.116000 audit[3194]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf4019b70 a2=3 a3=0 items=0 ppid=1 pid=3194 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:57.135901 systemd[1]: Started session-12.scope. Oct 2 19:32:57.138758 systemd-logind[1632]: New session 12 of user core. Oct 2 19:32:57.116000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:32:57.143481 kernel: audit: type=1327 audit(1696275177.116:1146): proctitle=737368643A20636F7265205B707269765D Oct 2 19:32:57.148000 audit[3194]: USER_START pid=3194 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:57.164234 kernel: audit: type=1105 audit(1696275177.148:1147): pid=3194 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:57.165092 kernel: audit: type=1103 audit(1696275177.151:1148): pid=3196 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:57.151000 audit[3196]: CRED_ACQ pid=3196 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:57.169736 env[1641]: time="2023-10-02T19:32:57.167977441Z" level=info msg="CreateContainer within sandbox \"cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:1,}" Oct 2 19:32:57.226008 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount955866680.mount: Deactivated successfully. Oct 2 19:32:57.241702 env[1641]: time="2023-10-02T19:32:57.241254950Z" level=info msg="CreateContainer within sandbox \"cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e\" for &ContainerMetadata{Name:mount-cgroup,Attempt:1,} returns container id \"6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595\"" Oct 2 19:32:57.245312 env[1641]: time="2023-10-02T19:32:57.245265547Z" level=info msg="StartContainer for \"6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595\"" Oct 2 19:32:57.299678 systemd[1]: Started cri-containerd-6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595.scope. Oct 2 19:32:57.330820 systemd[1]: cri-containerd-6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595.scope: Deactivated successfully. Oct 2 19:32:57.433363 env[1641]: time="2023-10-02T19:32:57.433221523Z" level=info msg="shim disconnected" id=6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595 Oct 2 19:32:57.433363 env[1641]: time="2023-10-02T19:32:57.433295986Z" level=warning msg="cleaning up after shim disconnected" id=6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595 namespace=k8s.io Oct 2 19:32:57.433363 env[1641]: time="2023-10-02T19:32:57.433308995Z" level=info msg="cleaning up dead shim" Oct 2 19:32:57.455257 env[1641]: time="2023-10-02T19:32:57.453843221Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:32:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3229 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:32:57Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:32:57.455257 env[1641]: time="2023-10-02T19:32:57.454216246Z" level=error msg="copy shim log" error="read /proc/self/fd/95: file already closed" Oct 2 19:32:57.455257 env[1641]: time="2023-10-02T19:32:57.455193300Z" level=error msg="Failed to pipe stdout of container \"6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595\"" error="reading from a closed fifo" Oct 2 19:32:57.455568 env[1641]: time="2023-10-02T19:32:57.455269258Z" level=error msg="Failed to pipe stderr of container \"6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595\"" error="reading from a closed fifo" Oct 2 19:32:57.459035 env[1641]: time="2023-10-02T19:32:57.457640158Z" level=error msg="StartContainer for \"6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:32:57.459279 kubelet[2744]: E1002 19:32:57.457926 2744 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595" Oct 2 19:32:57.459279 kubelet[2744]: E1002 19:32:57.458132 2744 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:32:57.459279 kubelet[2744]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:32:57.459279 kubelet[2744]: rm /hostbin/cilium-mount Oct 2 19:32:57.459279 kubelet[2744]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-kjx8c,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:32:57.459279 kubelet[2744]: E1002 19:32:57.458190 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-zjcpf" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" Oct 2 19:32:57.532213 sshd[3194]: pam_unix(sshd:session): session closed for user core Oct 2 19:32:57.562315 kernel: audit: type=1106 audit(1696275177.540:1149): pid=3194 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:57.540000 audit[3194]: USER_END pid=3194 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:57.575935 kernel: audit: type=1104 audit(1696275177.562:1150): pid=3194 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:57.562000 audit[3194]: CRED_DISP pid=3194 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:32:57.578120 systemd[1]: sshd@11-172.31.22.61:22-139.178.89.65:42340.service: Deactivated successfully. Oct 2 19:32:57.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.22.61:22-139.178.89.65:42340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:32:57.582076 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 19:32:57.584175 systemd-logind[1632]: Session 12 logged out. Waiting for processes to exit. Oct 2 19:32:57.586315 systemd-logind[1632]: Removed session 12. Oct 2 19:32:58.160702 kubelet[2744]: I1002 19:32:58.160669 2744 scope.go:117] "RemoveContainer" containerID="e440781d3bbbccecc0993307905d6f6a8e71c685a983b3884a99add4a33ca372" Oct 2 19:32:58.163523 kubelet[2744]: I1002 19:32:58.163496 2744 scope.go:117] "RemoveContainer" containerID="e440781d3bbbccecc0993307905d6f6a8e71c685a983b3884a99add4a33ca372" Oct 2 19:32:58.183791 env[1641]: time="2023-10-02T19:32:58.183719944Z" level=info msg="RemoveContainer for \"e440781d3bbbccecc0993307905d6f6a8e71c685a983b3884a99add4a33ca372\"" Oct 2 19:32:58.190570 env[1641]: time="2023-10-02T19:32:58.190525372Z" level=info msg="RemoveContainer for \"e440781d3bbbccecc0993307905d6f6a8e71c685a983b3884a99add4a33ca372\" returns successfully" Oct 2 19:32:58.194580 env[1641]: time="2023-10-02T19:32:58.194373765Z" level=info msg="RemoveContainer for \"e440781d3bbbccecc0993307905d6f6a8e71c685a983b3884a99add4a33ca372\"" Oct 2 19:32:58.194730 env[1641]: time="2023-10-02T19:32:58.194585154Z" level=info msg="RemoveContainer for \"e440781d3bbbccecc0993307905d6f6a8e71c685a983b3884a99add4a33ca372\" returns successfully" Oct 2 19:32:58.195319 kubelet[2744]: E1002 19:32:58.195296 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 10s restarting failed container=mount-cgroup pod=cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0)\"" pod="kube-system/cilium-zjcpf" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" Oct 2 19:32:58.496202 env[1641]: time="2023-10-02T19:32:58.496125449Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/cilium/operator-generic@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:58.500817 env[1641]: time="2023-10-02T19:32:58.500759674Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed355de9f59fe391dbe53f3c7c7a60baab3c3a9b7549aa54d10b87fff7dacf7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:58.504203 env[1641]: time="2023-10-02T19:32:58.504139260Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/cilium/operator-generic@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:32:58.506646 env[1641]: time="2023-10-02T19:32:58.506592800Z" level=info msg="PullImage \"quay.io/cilium/operator-generic:v1.12.5@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e\" returns image reference \"sha256:ed355de9f59fe391dbe53f3c7c7a60baab3c3a9b7549aa54d10b87fff7dacf7c\"" Oct 2 19:32:58.515447 env[1641]: time="2023-10-02T19:32:58.515395262Z" level=info msg="CreateContainer within sandbox \"87f72d17c19b32dd88af9cb708869facb4cba8654b42d5da05f90cb0024e472c\" for container &ContainerMetadata{Name:cilium-operator,Attempt:0,}" Oct 2 19:32:58.533917 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3813996938.mount: Deactivated successfully. Oct 2 19:32:58.543350 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3975213161.mount: Deactivated successfully. Oct 2 19:32:58.552496 env[1641]: time="2023-10-02T19:32:58.552452274Z" level=info msg="CreateContainer within sandbox \"87f72d17c19b32dd88af9cb708869facb4cba8654b42d5da05f90cb0024e472c\" for &ContainerMetadata{Name:cilium-operator,Attempt:0,} returns container id \"f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b\"" Oct 2 19:32:58.555833 env[1641]: time="2023-10-02T19:32:58.553456349Z" level=info msg="StartContainer for \"f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b\"" Oct 2 19:32:58.582690 systemd[1]: Started cri-containerd-f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b.scope. Oct 2 19:32:58.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.609000 audit: BPF prog-id=127 op=LOAD Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2864 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:58.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637653931336532636631303431623137343534386663376539346161 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2864 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:58.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637653931336532636631303431623137343534386663376539346161 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit: BPF prog-id=128 op=LOAD Oct 2 19:32:58.611000 audit[3252]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c6d10 items=0 ppid=2864 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:58.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637653931336532636631303431623137343534386663376539346161 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit: BPF prog-id=129 op=LOAD Oct 2 19:32:58.611000 audit[3252]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003c6d58 items=0 ppid=2864 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:58.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637653931336532636631303431623137343534386663376539346161 Oct 2 19:32:58.611000 audit: BPF prog-id=129 op=UNLOAD Oct 2 19:32:58.611000 audit: BPF prog-id=128 op=UNLOAD Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:32:58.611000 audit: BPF prog-id=130 op=LOAD Oct 2 19:32:58.611000 audit[3252]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c7168 items=0 ppid=2864 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:32:58.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637653931336532636631303431623137343534386663376539346161 Oct 2 19:32:58.636345 env[1641]: time="2023-10-02T19:32:58.636082826Z" level=info msg="StartContainer for \"f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b\" returns successfully" Oct 2 19:32:58.673000 audit[3263]: AVC avc: denied { map_create } for pid=3263 comm="cilium-operator" scontext=system_u:system_r:svirt_lxc_net_t:s0:c515,c844 tcontext=system_u:system_r:svirt_lxc_net_t:s0:c515,c844 tclass=bpf permissive=0 Oct 2 19:32:58.673000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=no exit=-13 a0=0 a1=c0005a17d0 a2=48 a3=0 items=0 ppid=2864 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cilium-operator" exe="/usr/bin/cilium-operator-generic" subj=system_u:system_r:svirt_lxc_net_t:s0:c515,c844 key=(null) Oct 2 19:32:58.673000 audit: PROCTITLE proctitle=63696C69756D2D6F70657261746F722D67656E65726963002D2D636F6E6669672D6469723D2F746D702F63696C69756D2F636F6E6669672D6D6170002D2D64656275673D66616C7365 Oct 2 19:32:59.391048 kubelet[2744]: W1002 19:32:59.391006 2744 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod676d69a2_1086_4c05_b8fc_deee645c74c0.slice/cri-containerd-e440781d3bbbccecc0993307905d6f6a8e71c685a983b3884a99add4a33ca372.scope WatchSource:0}: container "e440781d3bbbccecc0993307905d6f6a8e71c685a983b3884a99add4a33ca372" in namespace "k8s.io": not found Oct 2 19:33:02.512449 kubelet[2744]: W1002 19:33:02.512384 2744 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod676d69a2_1086_4c05_b8fc_deee645c74c0.slice/cri-containerd-6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595.scope WatchSource:0}: task 6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595 not found: not found Oct 2 19:33:07.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.22.61:22-139.178.89.65:56086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:33:07.562562 systemd[1]: Started sshd@12-172.31.22.61:22-139.178.89.65:56086.service. Oct 2 19:33:07.565302 kernel: kauditd_printk_skb: 61 callbacks suppressed Oct 2 19:33:07.565375 kernel: audit: type=1130 audit(1696275187.561:1171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.22.61:22-139.178.89.65:56086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:33:07.772000 audit[3285]: USER_ACCT pid=3285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:07.773586 sshd[3285]: Accepted publickey for core from 139.178.89.65 port 56086 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:33:07.780000 audit[3285]: CRED_ACQ pid=3285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:07.782486 sshd[3285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:33:07.790116 kernel: audit: type=1101 audit(1696275187.772:1172): pid=3285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:07.790251 kernel: audit: type=1103 audit(1696275187.780:1173): pid=3285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:07.790294 kernel: audit: type=1006 audit(1696275187.780:1174): pid=3285 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Oct 2 19:33:07.792601 systemd[1]: Started session-13.scope. Oct 2 19:33:07.796166 kernel: audit: type=1300 audit(1696275187.780:1174): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdaea8d710 a2=3 a3=0 items=0 ppid=1 pid=3285 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:07.780000 audit[3285]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdaea8d710 a2=3 a3=0 items=0 ppid=1 pid=3285 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:07.797202 systemd-logind[1632]: New session 13 of user core. Oct 2 19:33:07.780000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:33:07.807150 kernel: audit: type=1327 audit(1696275187.780:1174): proctitle=737368643A20636F7265205B707269765D Oct 2 19:33:07.807000 audit[3285]: USER_START pid=3285 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:07.821610 kernel: audit: type=1105 audit(1696275187.807:1175): pid=3285 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:07.819000 audit[3287]: CRED_ACQ pid=3287 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:07.829106 kernel: audit: type=1103 audit(1696275187.819:1176): pid=3287 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:08.033274 sshd[3285]: pam_unix(sshd:session): session closed for user core Oct 2 19:33:08.037000 audit[3285]: USER_END pid=3285 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:08.041133 systemd-logind[1632]: Session 13 logged out. Waiting for processes to exit. Oct 2 19:33:08.047108 kernel: audit: type=1106 audit(1696275188.037:1177): pid=3285 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:08.047173 kernel: audit: type=1104 audit(1696275188.037:1178): pid=3285 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:08.037000 audit[3285]: CRED_DISP pid=3285 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:08.043143 systemd[1]: sshd@12-172.31.22.61:22-139.178.89.65:56086.service: Deactivated successfully. Oct 2 19:33:08.044073 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 19:33:08.045954 systemd-logind[1632]: Removed session 13. Oct 2 19:33:08.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.22.61:22-139.178.89.65:56086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:33:08.885692 env[1641]: time="2023-10-02T19:33:08.885639543Z" level=info msg="CreateContainer within sandbox \"cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:2,}" Oct 2 19:33:08.944915 env[1641]: time="2023-10-02T19:33:08.934470145Z" level=info msg="CreateContainer within sandbox \"cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e\" for &ContainerMetadata{Name:mount-cgroup,Attempt:2,} returns container id \"adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95\"" Oct 2 19:33:08.944915 env[1641]: time="2023-10-02T19:33:08.937112056Z" level=info msg="StartContainer for \"adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95\"" Oct 2 19:33:08.962578 kubelet[2744]: I1002 19:33:08.962545 2744 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/cilium-operator-6bc8ccdb58-tx6wx" podStartSLOduration=11.597772499 podCreationTimestamp="2023-10-02 19:31:42 +0000 UTC" firstStartedPulling="2023-10-02 19:31:43.143460847 +0000 UTC m=+12.686434119" lastFinishedPulling="2023-10-02 19:32:58.508165241 +0000 UTC m=+88.051138518" observedRunningTime="2023-10-02 19:32:59.23166254 +0000 UTC m=+88.774635833" watchObservedRunningTime="2023-10-02 19:33:08.962476898 +0000 UTC m=+98.505450624" Oct 2 19:33:08.970880 systemd[1]: Started cri-containerd-adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95.scope. Oct 2 19:33:08.994424 systemd[1]: cri-containerd-adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95.scope: Deactivated successfully. Oct 2 19:33:09.033749 env[1641]: time="2023-10-02T19:33:09.033688665Z" level=info msg="shim disconnected" id=adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95 Oct 2 19:33:09.034103 env[1641]: time="2023-10-02T19:33:09.034014469Z" level=warning msg="cleaning up after shim disconnected" id=adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95 namespace=k8s.io Oct 2 19:33:09.034221 env[1641]: time="2023-10-02T19:33:09.034194098Z" level=info msg="cleaning up dead shim" Oct 2 19:33:09.045264 env[1641]: time="2023-10-02T19:33:09.045202613Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:33:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3319 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:33:09Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:33:09.045737 env[1641]: time="2023-10-02T19:33:09.045643256Z" level=error msg="copy shim log" error="read /proc/self/fd/99: file already closed" Oct 2 19:33:09.049125 env[1641]: time="2023-10-02T19:33:09.049050697Z" level=error msg="Failed to pipe stdout of container \"adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95\"" error="reading from a closed fifo" Oct 2 19:33:09.049249 env[1641]: time="2023-10-02T19:33:09.049168470Z" level=error msg="Failed to pipe stderr of container \"adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95\"" error="reading from a closed fifo" Oct 2 19:33:09.051442 env[1641]: time="2023-10-02T19:33:09.051390467Z" level=error msg="StartContainer for \"adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:33:09.051688 kubelet[2744]: E1002 19:33:09.051664 2744 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95" Oct 2 19:33:09.051910 kubelet[2744]: E1002 19:33:09.051833 2744 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:33:09.051910 kubelet[2744]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:33:09.051910 kubelet[2744]: rm /hostbin/cilium-mount Oct 2 19:33:09.051910 kubelet[2744]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-kjx8c,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:33:09.051910 kubelet[2744]: E1002 19:33:09.051885 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-zjcpf" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" Oct 2 19:33:09.206893 kubelet[2744]: I1002 19:33:09.206851 2744 scope.go:117] "RemoveContainer" containerID="6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595" Oct 2 19:33:09.207427 kubelet[2744]: I1002 19:33:09.207404 2744 scope.go:117] "RemoveContainer" containerID="6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595" Oct 2 19:33:09.209370 env[1641]: time="2023-10-02T19:33:09.209291614Z" level=info msg="RemoveContainer for \"6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595\"" Oct 2 19:33:09.210320 env[1641]: time="2023-10-02T19:33:09.210264943Z" level=info msg="RemoveContainer for \"6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595\"" Oct 2 19:33:09.210631 env[1641]: time="2023-10-02T19:33:09.210554708Z" level=error msg="RemoveContainer for \"6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595\" failed" error="failed to set removing state for container \"6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595\": container is already in removing state" Oct 2 19:33:09.211363 kubelet[2744]: E1002 19:33:09.211342 2744 remote_runtime.go:385] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595\": container is already in removing state" containerID="6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595" Oct 2 19:33:09.211576 kubelet[2744]: E1002 19:33:09.211562 2744 kuberuntime_container.go:820] failed to remove pod init container "mount-cgroup": rpc error: code = Unknown desc = failed to set removing state for container "6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595": container is already in removing state; Skipping pod "cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0)" Oct 2 19:33:09.212484 kubelet[2744]: E1002 19:33:09.212460 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 20s restarting failed container=mount-cgroup pod=cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0)\"" pod="kube-system/cilium-zjcpf" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" Oct 2 19:33:09.224133 env[1641]: time="2023-10-02T19:33:09.224082698Z" level=info msg="RemoveContainer for \"6d87e6401da28c2550b1f4afd4e7b3b989075e88976894044a5f209f55026595\" returns successfully" Oct 2 19:33:09.914958 systemd[1]: run-containerd-runc-k8s.io-adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95-runc.2Qd3rT.mount: Deactivated successfully. Oct 2 19:33:09.915097 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95-rootfs.mount: Deactivated successfully. Oct 2 19:33:12.133858 kubelet[2744]: W1002 19:33:12.133774 2744 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod676d69a2_1086_4c05_b8fc_deee645c74c0.slice/cri-containerd-adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95.scope WatchSource:0}: task adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95 not found: not found Oct 2 19:33:18.060875 systemd[1]: Started sshd@13-172.31.22.61:22-139.178.89.65:50404.service. Oct 2 19:33:18.067294 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:33:18.067358 kernel: audit: type=1130 audit(1696275198.060:1180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.22.61:22-139.178.89.65:50404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:33:18.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.22.61:22-139.178.89.65:50404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:33:18.246000 audit[3336]: USER_ACCT pid=3336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:18.249151 sshd[3336]: Accepted publickey for core from 139.178.89.65 port 50404 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:33:18.252000 audit[3336]: CRED_ACQ pid=3336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:18.254547 sshd[3336]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:33:18.259390 kernel: audit: type=1101 audit(1696275198.246:1181): pid=3336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:18.259491 kernel: audit: type=1103 audit(1696275198.252:1182): pid=3336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:18.259530 kernel: audit: type=1006 audit(1696275198.252:1183): pid=3336 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Oct 2 19:33:18.264810 kernel: audit: type=1300 audit(1696275198.252:1183): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe55922d30 a2=3 a3=0 items=0 ppid=1 pid=3336 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:18.252000 audit[3336]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe55922d30 a2=3 a3=0 items=0 ppid=1 pid=3336 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:18.264377 systemd[1]: Started session-14.scope. Oct 2 19:33:18.267120 systemd-logind[1632]: New session 14 of user core. Oct 2 19:33:18.252000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:33:18.274009 kernel: audit: type=1327 audit(1696275198.252:1183): proctitle=737368643A20636F7265205B707269765D Oct 2 19:33:18.273000 audit[3336]: USER_START pid=3336 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:18.279000 audit[3338]: CRED_ACQ pid=3338 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:18.287773 kernel: audit: type=1105 audit(1696275198.273:1184): pid=3336 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:18.287929 kernel: audit: type=1103 audit(1696275198.279:1185): pid=3338 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:18.514080 sshd[3336]: pam_unix(sshd:session): session closed for user core Oct 2 19:33:18.514000 audit[3336]: USER_END pid=3336 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:18.514000 audit[3336]: CRED_DISP pid=3336 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:18.526007 systemd[1]: sshd@13-172.31.22.61:22-139.178.89.65:50404.service: Deactivated successfully. Oct 2 19:33:18.526958 systemd[1]: session-14.scope: Deactivated successfully. Oct 2 19:33:18.528799 systemd-logind[1632]: Session 14 logged out. Waiting for processes to exit. Oct 2 19:33:18.530097 kernel: audit: type=1106 audit(1696275198.514:1186): pid=3336 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:18.530186 kernel: audit: type=1104 audit(1696275198.514:1187): pid=3336 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:18.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.22.61:22-139.178.89.65:50404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:33:18.530469 systemd-logind[1632]: Removed session 14. Oct 2 19:33:22.880978 kubelet[2744]: E1002 19:33:22.880949 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 20s restarting failed container=mount-cgroup pod=cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0)\"" pod="kube-system/cilium-zjcpf" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" Oct 2 19:33:24.920000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:33:24.925417 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:33:24.925613 kernel: audit: type=1400 audit(1696275204.920:1190): avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:33:24.920000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:33:24.945310 kernel: audit: type=1400 audit(1696275204.920:1189): avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:33:24.945429 kernel: audit: type=1300 audit(1696275204.920:1189): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0005b03c0 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:33:24.920000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0005b03c0 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:33:24.920000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:33:24.975394 kernel: audit: type=1327 audit(1696275204.920:1189): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:33:24.975557 kernel: audit: type=1300 audit(1696275204.920:1190): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010b8240 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:33:24.920000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010b8240 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:33:24.920000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:33:24.998203 kernel: audit: type=1327 audit(1696275204.920:1190): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:33:26.331000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:33:26.331000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:33:26.346321 kernel: audit: type=1400 audit(1696275206.331:1192): avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:33:26.346552 kernel: audit: type=1400 audit(1696275206.331:1191): avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:33:26.346592 kernel: audit: type=1300 audit(1696275206.331:1191): arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c007f4baa0 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:33:26.331000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c007f4baa0 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:33:26.331000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:33:26.363086 kernel: audit: type=1327 audit(1696275206.331:1191): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:33:26.332000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:33:26.332000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c0079515e0 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:33:26.332000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:33:26.331000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c007d98360 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:33:26.331000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:33:26.347000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:33:26.347000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c007d98390 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:33:26.347000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:33:26.359000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:33:26.359000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c0079517a0 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:33:26.359000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:33:26.360000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:33:26.360000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c007d983c0 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:33:26.360000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:33:28.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.22.61:22-139.178.89.65:47698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:33:28.544509 systemd[1]: Started sshd@14-172.31.22.61:22-139.178.89.65:47698.service. Oct 2 19:33:28.681000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:33:28.681000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001564e20 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:33:28.681000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:33:28.688000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:33:28.688000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001564f40 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:33:28.688000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:33:28.688000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:33:28.688000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:33:28.688000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0005b0f00 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:33:28.688000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:33:28.688000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001564f60 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:33:28.688000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:33:28.720000 audit[3350]: USER_ACCT pid=3350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:28.721682 sshd[3350]: Accepted publickey for core from 139.178.89.65 port 47698 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:33:28.722000 audit[3350]: CRED_ACQ pid=3350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:28.723000 audit[3350]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff171b1f50 a2=3 a3=0 items=0 ppid=1 pid=3350 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:28.723000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:33:28.728681 sshd[3350]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:33:28.737768 systemd[1]: Started session-15.scope. Oct 2 19:33:28.738743 systemd-logind[1632]: New session 15 of user core. Oct 2 19:33:28.745000 audit[3350]: USER_START pid=3350 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:28.751000 audit[3352]: CRED_ACQ pid=3352 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:28.959173 sshd[3350]: pam_unix(sshd:session): session closed for user core Oct 2 19:33:28.960000 audit[3350]: USER_END pid=3350 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:28.960000 audit[3350]: CRED_DISP pid=3350 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:28.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.22.61:22-139.178.89.65:47698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:33:28.963822 systemd[1]: sshd@14-172.31.22.61:22-139.178.89.65:47698.service: Deactivated successfully. Oct 2 19:33:28.965347 systemd[1]: session-15.scope: Deactivated successfully. Oct 2 19:33:28.967500 systemd-logind[1632]: Session 15 logged out. Waiting for processes to exit. Oct 2 19:33:28.968594 systemd-logind[1632]: Removed session 15. Oct 2 19:33:30.863841 kubelet[2744]: E1002 19:33:30.863794 2744 kubelet_node_status.go:452] "Node not becoming ready in time after startup" Oct 2 19:33:31.069279 kubelet[2744]: E1002 19:33:31.069248 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:33:33.883251 env[1641]: time="2023-10-02T19:33:33.883191706Z" level=info msg="CreateContainer within sandbox \"cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:3,}" Oct 2 19:33:33.900822 env[1641]: time="2023-10-02T19:33:33.900769813Z" level=info msg="CreateContainer within sandbox \"cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e\" for &ContainerMetadata{Name:mount-cgroup,Attempt:3,} returns container id \"b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc\"" Oct 2 19:33:33.902536 env[1641]: time="2023-10-02T19:33:33.902489826Z" level=info msg="StartContainer for \"b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc\"" Oct 2 19:33:33.943586 systemd[1]: Started cri-containerd-b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc.scope. Oct 2 19:33:33.959545 systemd[1]: cri-containerd-b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc.scope: Deactivated successfully. Oct 2 19:33:33.987169 env[1641]: time="2023-10-02T19:33:33.987114687Z" level=info msg="shim disconnected" id=b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc Oct 2 19:33:33.987507 env[1641]: time="2023-10-02T19:33:33.987174301Z" level=warning msg="cleaning up after shim disconnected" id=b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc namespace=k8s.io Oct 2 19:33:33.987507 env[1641]: time="2023-10-02T19:33:33.987190973Z" level=info msg="cleaning up dead shim" Oct 2 19:33:33.999547 env[1641]: time="2023-10-02T19:33:33.999493954Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:33:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3387 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:33:33Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:33:33.999836 env[1641]: time="2023-10-02T19:33:33.999773159Z" level=error msg="copy shim log" error="read /proc/self/fd/54: file already closed" Oct 2 19:33:34.000354 env[1641]: time="2023-10-02T19:33:34.000098181Z" level=error msg="Failed to pipe stderr of container \"b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc\"" error="reading from a closed fifo" Oct 2 19:33:34.000557 env[1641]: time="2023-10-02T19:33:34.000450517Z" level=error msg="Failed to pipe stdout of container \"b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc\"" error="reading from a closed fifo" Oct 2 19:33:34.002935 env[1641]: time="2023-10-02T19:33:34.002544892Z" level=error msg="StartContainer for \"b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:33:34.003299 kubelet[2744]: E1002 19:33:34.003279 2744 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc" Oct 2 19:33:34.003976 kubelet[2744]: E1002 19:33:34.003410 2744 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:33:34.003976 kubelet[2744]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:33:34.003976 kubelet[2744]: rm /hostbin/cilium-mount Oct 2 19:33:34.003976 kubelet[2744]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-kjx8c,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:33:34.003976 kubelet[2744]: E1002 19:33:34.003465 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-zjcpf" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" Oct 2 19:33:34.277118 kubelet[2744]: I1002 19:33:34.276940 2744 scope.go:117] "RemoveContainer" containerID="adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95" Oct 2 19:33:34.277487 kubelet[2744]: I1002 19:33:34.277468 2744 scope.go:117] "RemoveContainer" containerID="adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95" Oct 2 19:33:34.284274 env[1641]: time="2023-10-02T19:33:34.284128252Z" level=info msg="RemoveContainer for \"adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95\"" Oct 2 19:33:34.287255 env[1641]: time="2023-10-02T19:33:34.287200563Z" level=info msg="RemoveContainer for \"adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95\"" Oct 2 19:33:34.287757 env[1641]: time="2023-10-02T19:33:34.287716463Z" level=error msg="RemoveContainer for \"adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95\" failed" error="failed to set removing state for container \"adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95\": container is already in removing state" Oct 2 19:33:34.288240 kubelet[2744]: E1002 19:33:34.288219 2744 remote_runtime.go:385] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95\": container is already in removing state" containerID="adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95" Oct 2 19:33:34.288651 kubelet[2744]: E1002 19:33:34.288611 2744 kuberuntime_container.go:820] failed to remove pod init container "mount-cgroup": rpc error: code = Unknown desc = failed to set removing state for container "adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95": container is already in removing state; Skipping pod "cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0)" Oct 2 19:33:34.289344 kubelet[2744]: E1002 19:33:34.289329 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 40s restarting failed container=mount-cgroup pod=cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0)\"" pod="kube-system/cilium-zjcpf" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" Oct 2 19:33:34.293400 env[1641]: time="2023-10-02T19:33:34.293349233Z" level=info msg="RemoveContainer for \"adbde9d5fc4091464fe5f6cce3796fb6f0094750fc988bd40164bd79bda13d95\" returns successfully" Oct 2 19:33:34.892021 systemd[1]: run-containerd-runc-k8s.io-b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc-runc.8aKsVZ.mount: Deactivated successfully. Oct 2 19:33:34.892162 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc-rootfs.mount: Deactivated successfully. Oct 2 19:33:36.071647 kubelet[2744]: E1002 19:33:36.071618 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:33:37.095224 kubelet[2744]: W1002 19:33:37.095184 2744 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod676d69a2_1086_4c05_b8fc_deee645c74c0.slice/cri-containerd-b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc.scope WatchSource:0}: task b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc not found: not found Oct 2 19:33:38.986863 systemd[1]: Started sshd@15-172.31.22.61:22-139.178.89.65:58338.service. Oct 2 19:33:38.994868 kernel: kauditd_printk_skb: 37 callbacks suppressed Oct 2 19:33:38.995174 kernel: audit: type=1130 audit(1696275218.986:1210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.22.61:22-139.178.89.65:58338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:33:38.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.22.61:22-139.178.89.65:58338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:33:39.173576 kernel: audit: type=1101 audit(1696275219.161:1211): pid=3401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:39.161000 audit[3401]: USER_ACCT pid=3401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:39.173861 sshd[3401]: Accepted publickey for core from 139.178.89.65 port 58338 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:33:39.172000 audit[3401]: CRED_ACQ pid=3401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:39.174603 sshd[3401]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:33:39.192662 kernel: audit: type=1103 audit(1696275219.172:1212): pid=3401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:39.192791 kernel: audit: type=1006 audit(1696275219.173:1213): pid=3401 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Oct 2 19:33:39.192825 kernel: audit: type=1300 audit(1696275219.173:1213): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1a7a36c0 a2=3 a3=0 items=0 ppid=1 pid=3401 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:39.173000 audit[3401]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1a7a36c0 a2=3 a3=0 items=0 ppid=1 pid=3401 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:39.191520 systemd[1]: Started session-16.scope. Oct 2 19:33:39.195060 systemd-logind[1632]: New session 16 of user core. Oct 2 19:33:39.173000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:33:39.205509 kernel: audit: type=1327 audit(1696275219.173:1213): proctitle=737368643A20636F7265205B707269765D Oct 2 19:33:39.207000 audit[3401]: USER_START pid=3401 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:39.216000 audit[3403]: CRED_ACQ pid=3403 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:39.225973 kernel: audit: type=1105 audit(1696275219.207:1214): pid=3401 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:39.226133 kernel: audit: type=1103 audit(1696275219.216:1215): pid=3403 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:39.408231 sshd[3401]: pam_unix(sshd:session): session closed for user core Oct 2 19:33:39.410000 audit[3401]: USER_END pid=3401 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:39.413974 systemd[1]: sshd@15-172.31.22.61:22-139.178.89.65:58338.service: Deactivated successfully. Oct 2 19:33:39.414979 systemd[1]: session-16.scope: Deactivated successfully. Oct 2 19:33:39.417301 systemd-logind[1632]: Session 16 logged out. Waiting for processes to exit. Oct 2 19:33:39.419824 kernel: audit: type=1106 audit(1696275219.410:1216): pid=3401 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:39.419952 kernel: audit: type=1104 audit(1696275219.410:1217): pid=3401 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:39.410000 audit[3401]: CRED_DISP pid=3401 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:39.420743 systemd-logind[1632]: Removed session 16. Oct 2 19:33:39.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.22.61:22-139.178.89.65:58338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:33:41.072259 kubelet[2744]: E1002 19:33:41.072221 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:33:45.880811 kubelet[2744]: E1002 19:33:45.880780 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 40s restarting failed container=mount-cgroup pod=cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0)\"" pod="kube-system/cilium-zjcpf" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" Oct 2 19:33:46.074347 kubelet[2744]: E1002 19:33:46.074314 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:33:49.439494 systemd[1]: Started sshd@16-172.31.22.61:22-139.178.89.65:35386.service. Oct 2 19:33:49.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.22.61:22-139.178.89.65:35386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:33:49.444012 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:33:49.444113 kernel: audit: type=1130 audit(1696275229.439:1219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.22.61:22-139.178.89.65:35386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:33:49.618000 audit[3416]: USER_ACCT pid=3416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:49.621209 sshd[3416]: Accepted publickey for core from 139.178.89.65 port 35386 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:33:49.629155 kernel: audit: type=1101 audit(1696275229.618:1220): pid=3416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:49.629000 audit[3416]: CRED_ACQ pid=3416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:49.630879 sshd[3416]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:33:49.638493 kernel: audit: type=1103 audit(1696275229.629:1221): pid=3416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:49.638925 kernel: audit: type=1006 audit(1696275229.629:1222): pid=3416 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Oct 2 19:33:49.645335 kernel: audit: type=1300 audit(1696275229.629:1222): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0ec98cf0 a2=3 a3=0 items=0 ppid=1 pid=3416 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:49.629000 audit[3416]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0ec98cf0 a2=3 a3=0 items=0 ppid=1 pid=3416 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:49.655560 systemd[1]: Started session-17.scope. Oct 2 19:33:49.656562 kernel: audit: type=1327 audit(1696275229.629:1222): proctitle=737368643A20636F7265205B707269765D Oct 2 19:33:49.629000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:33:49.660329 systemd-logind[1632]: New session 17 of user core. Oct 2 19:33:49.669000 audit[3416]: USER_START pid=3416 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:49.674000 audit[3418]: CRED_ACQ pid=3418 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:49.689056 kernel: audit: type=1105 audit(1696275229.669:1223): pid=3416 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:49.689530 kernel: audit: type=1103 audit(1696275229.674:1224): pid=3418 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:49.910603 sshd[3416]: pam_unix(sshd:session): session closed for user core Oct 2 19:33:49.911000 audit[3416]: USER_END pid=3416 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:49.915524 systemd[1]: sshd@16-172.31.22.61:22-139.178.89.65:35386.service: Deactivated successfully. Oct 2 19:33:49.916544 systemd[1]: session-17.scope: Deactivated successfully. Oct 2 19:33:49.918740 systemd-logind[1632]: Session 17 logged out. Waiting for processes to exit. Oct 2 19:33:49.921813 systemd-logind[1632]: Removed session 17. Oct 2 19:33:49.911000 audit[3416]: CRED_DISP pid=3416 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:49.927575 kernel: audit: type=1106 audit(1696275229.911:1225): pid=3416 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:49.927668 kernel: audit: type=1104 audit(1696275229.911:1226): pid=3416 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:49.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.22.61:22-139.178.89.65:35386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:33:49.937935 systemd[1]: Started sshd@17-172.31.22.61:22-139.178.89.65:35398.service. Oct 2 19:33:49.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.22.61:22-139.178.89.65:35398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:33:50.109000 audit[3429]: USER_ACCT pid=3429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:50.110934 sshd[3429]: Accepted publickey for core from 139.178.89.65 port 35398 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:33:50.111000 audit[3429]: CRED_ACQ pid=3429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:50.111000 audit[3429]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffce058600 a2=3 a3=0 items=0 ppid=1 pid=3429 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:50.111000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:33:50.113311 sshd[3429]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:33:50.124905 systemd[1]: Started session-18.scope. Oct 2 19:33:50.125419 systemd-logind[1632]: New session 18 of user core. Oct 2 19:33:50.129000 audit[3429]: USER_START pid=3429 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:50.131000 audit[3431]: CRED_ACQ pid=3431 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:51.076004 kubelet[2744]: E1002 19:33:51.075936 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:33:51.305131 sshd[3429]: pam_unix(sshd:session): session closed for user core Oct 2 19:33:51.305000 audit[3429]: USER_END pid=3429 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:51.305000 audit[3429]: CRED_DISP pid=3429 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:51.310770 systemd-logind[1632]: Session 18 logged out. Waiting for processes to exit. Oct 2 19:33:51.311890 systemd[1]: sshd@17-172.31.22.61:22-139.178.89.65:35398.service: Deactivated successfully. Oct 2 19:33:51.313103 systemd[1]: session-18.scope: Deactivated successfully. Oct 2 19:33:51.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.22.61:22-139.178.89.65:35398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:33:51.315771 systemd-logind[1632]: Removed session 18. Oct 2 19:33:51.336524 systemd[1]: Started sshd@18-172.31.22.61:22-139.178.89.65:35406.service. Oct 2 19:33:51.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.22.61:22-139.178.89.65:35406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:33:51.535000 audit[3439]: USER_ACCT pid=3439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:51.536525 sshd[3439]: Accepted publickey for core from 139.178.89.65 port 35406 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:33:51.536000 audit[3439]: CRED_ACQ pid=3439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:51.536000 audit[3439]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbd88cc50 a2=3 a3=0 items=0 ppid=1 pid=3439 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:33:51.536000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:33:51.538647 sshd[3439]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:33:51.558134 systemd-logind[1632]: New session 19 of user core. Oct 2 19:33:51.561755 systemd[1]: Started session-19.scope. Oct 2 19:33:51.588000 audit[3439]: USER_START pid=3439 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:51.598000 audit[3441]: CRED_ACQ pid=3441 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:51.797278 sshd[3439]: pam_unix(sshd:session): session closed for user core Oct 2 19:33:51.798000 audit[3439]: USER_END pid=3439 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:51.798000 audit[3439]: CRED_DISP pid=3439 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:33:51.801857 systemd-logind[1632]: Session 19 logged out. Waiting for processes to exit. Oct 2 19:33:51.802260 systemd[1]: sshd@18-172.31.22.61:22-139.178.89.65:35406.service: Deactivated successfully. Oct 2 19:33:51.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.22.61:22-139.178.89.65:35406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:33:51.803281 systemd[1]: session-19.scope: Deactivated successfully. Oct 2 19:33:51.804454 systemd-logind[1632]: Removed session 19. Oct 2 19:33:56.083841 kubelet[2744]: E1002 19:33:56.078043 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:33:59.881759 kubelet[2744]: E1002 19:33:59.881718 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 40s restarting failed container=mount-cgroup pod=cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0)\"" pod="kube-system/cilium-zjcpf" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" Oct 2 19:34:01.087602 kubelet[2744]: E1002 19:34:01.087570 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:34:01.837981 systemd[1]: Started sshd@19-172.31.22.61:22-139.178.89.65:36314.service. Oct 2 19:34:01.885132 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 19:34:01.885443 kernel: audit: type=1130 audit(1696275241.865:1246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.22.61:22-139.178.89.65:36314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:01.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.22.61:22-139.178.89.65:36314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:02.068000 audit[3452]: USER_ACCT pid=3452 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:02.084549 kernel: audit: type=1101 audit(1696275242.068:1247): pid=3452 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:02.098261 kernel: audit: type=1103 audit(1696275242.083:1248): pid=3452 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:02.083000 audit[3452]: CRED_ACQ pid=3452 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:02.101016 sshd[3452]: Accepted publickey for core from 139.178.89.65 port 36314 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:34:02.085989 sshd[3452]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:34:02.083000 audit[3452]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd62969a50 a2=3 a3=0 items=0 ppid=1 pid=3452 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:34:02.150236 kernel: audit: type=1006 audit(1696275242.083:1249): pid=3452 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Oct 2 19:34:02.151777 kernel: audit: type=1300 audit(1696275242.083:1249): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd62969a50 a2=3 a3=0 items=0 ppid=1 pid=3452 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:34:02.151850 kernel: audit: type=1327 audit(1696275242.083:1249): proctitle=737368643A20636F7265205B707269765D Oct 2 19:34:02.083000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:34:02.144372 systemd[1]: Started session-20.scope. Oct 2 19:34:02.161318 systemd-logind[1632]: New session 20 of user core. Oct 2 19:34:02.195000 audit[3452]: USER_START pid=3452 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:02.216160 kernel: audit: type=1105 audit(1696275242.195:1250): pid=3452 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:02.216307 kernel: audit: type=1103 audit(1696275242.214:1251): pid=3454 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:02.214000 audit[3454]: CRED_ACQ pid=3454 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:02.575229 sshd[3452]: pam_unix(sshd:session): session closed for user core Oct 2 19:34:02.579000 audit[3452]: USER_END pid=3452 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:02.583386 systemd-logind[1632]: Session 20 logged out. Waiting for processes to exit. Oct 2 19:34:02.585661 systemd[1]: sshd@19-172.31.22.61:22-139.178.89.65:36314.service: Deactivated successfully. Oct 2 19:34:02.587222 systemd[1]: session-20.scope: Deactivated successfully. Oct 2 19:34:02.589142 kernel: audit: type=1106 audit(1696275242.579:1252): pid=3452 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:02.579000 audit[3452]: CRED_DISP pid=3452 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:02.590331 systemd-logind[1632]: Removed session 20. Oct 2 19:34:02.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.22.61:22-139.178.89.65:36314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:02.595236 kernel: audit: type=1104 audit(1696275242.579:1253): pid=3452 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:06.089052 kubelet[2744]: E1002 19:34:06.089021 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:34:11.089802 kubelet[2744]: E1002 19:34:11.089737 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:34:12.602827 systemd[1]: Started sshd@20-172.31.22.61:22-139.178.89.65:50166.service. Oct 2 19:34:12.607020 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:34:12.607169 kernel: audit: type=1130 audit(1696275252.603:1255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.22.61:22-139.178.89.65:50166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:12.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.22.61:22-139.178.89.65:50166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:12.780028 kernel: audit: type=1101 audit(1696275252.772:1256): pid=3464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:12.772000 audit[3464]: USER_ACCT pid=3464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:12.780263 sshd[3464]: Accepted publickey for core from 139.178.89.65 port 50166 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:34:12.780761 sshd[3464]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:34:12.779000 audit[3464]: CRED_ACQ pid=3464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:12.791590 systemd[1]: Started session-21.scope. Oct 2 19:34:12.792637 kernel: audit: type=1103 audit(1696275252.779:1257): pid=3464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:12.792694 kernel: audit: type=1006 audit(1696275252.779:1258): pid=3464 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Oct 2 19:34:12.793763 kernel: audit: type=1300 audit(1696275252.779:1258): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea8f0e580 a2=3 a3=0 items=0 ppid=1 pid=3464 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:34:12.779000 audit[3464]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea8f0e580 a2=3 a3=0 items=0 ppid=1 pid=3464 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:34:12.792982 systemd-logind[1632]: New session 21 of user core. Oct 2 19:34:12.779000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:34:12.804017 kernel: audit: type=1327 audit(1696275252.779:1258): proctitle=737368643A20636F7265205B707269765D Oct 2 19:34:12.801000 audit[3464]: USER_START pid=3464 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:12.806000 audit[3466]: CRED_ACQ pid=3466 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:12.818422 kernel: audit: type=1105 audit(1696275252.801:1259): pid=3464 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:12.818546 kernel: audit: type=1103 audit(1696275252.806:1260): pid=3466 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:13.014580 sshd[3464]: pam_unix(sshd:session): session closed for user core Oct 2 19:34:13.015000 audit[3464]: USER_END pid=3464 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:13.022000 audit[3464]: CRED_DISP pid=3464 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:13.025788 systemd[1]: sshd@20-172.31.22.61:22-139.178.89.65:50166.service: Deactivated successfully. Oct 2 19:34:13.027753 systemd[1]: session-21.scope: Deactivated successfully. Oct 2 19:34:13.032452 kernel: audit: type=1106 audit(1696275253.015:1261): pid=3464 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:13.032558 kernel: audit: type=1104 audit(1696275253.022:1262): pid=3464 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:13.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.22.61:22-139.178.89.65:50166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.031858 systemd-logind[1632]: Session 21 logged out. Waiting for processes to exit. Oct 2 19:34:13.033533 systemd-logind[1632]: Removed session 21. Oct 2 19:34:13.882110 kubelet[2744]: E1002 19:34:13.882067 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 40s restarting failed container=mount-cgroup pod=cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0)\"" pod="kube-system/cilium-zjcpf" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" Oct 2 19:34:16.091089 kubelet[2744]: E1002 19:34:16.091058 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:34:21.092388 kubelet[2744]: E1002 19:34:21.092354 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:34:23.043087 systemd[1]: Started sshd@21-172.31.22.61:22-139.178.89.65:55976.service. Oct 2 19:34:23.058097 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:34:23.058235 kernel: audit: type=1130 audit(1696275263.043:1264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.22.61:22-139.178.89.65:55976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:23.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.22.61:22-139.178.89.65:55976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:23.227000 audit[3479]: USER_ACCT pid=3479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:23.239167 kernel: audit: type=1101 audit(1696275263.227:1265): pid=3479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:23.239291 sshd[3479]: Accepted publickey for core from 139.178.89.65 port 55976 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:34:23.238000 audit[3479]: CRED_ACQ pid=3479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:23.241180 sshd[3479]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:34:23.252786 kernel: audit: type=1103 audit(1696275263.238:1266): pid=3479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:23.252899 kernel: audit: type=1006 audit(1696275263.240:1267): pid=3479 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Oct 2 19:34:23.252942 kernel: audit: type=1300 audit(1696275263.240:1267): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd97bae50 a2=3 a3=0 items=0 ppid=1 pid=3479 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:34:23.240000 audit[3479]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd97bae50 a2=3 a3=0 items=0 ppid=1 pid=3479 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:34:23.240000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:34:23.276056 kernel: audit: type=1327 audit(1696275263.240:1267): proctitle=737368643A20636F7265205B707269765D Oct 2 19:34:23.277560 systemd-logind[1632]: New session 22 of user core. Oct 2 19:34:23.281327 systemd[1]: Started session-22.scope. Oct 2 19:34:23.288000 audit[3479]: USER_START pid=3479 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:23.296000 audit[3481]: CRED_ACQ pid=3481 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:23.307059 kernel: audit: type=1105 audit(1696275263.288:1268): pid=3479 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:23.307197 kernel: audit: type=1103 audit(1696275263.296:1269): pid=3481 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:23.510656 sshd[3479]: pam_unix(sshd:session): session closed for user core Oct 2 19:34:23.513000 audit[3479]: USER_END pid=3479 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:23.521046 kernel: audit: type=1106 audit(1696275263.513:1270): pid=3479 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:23.513000 audit[3479]: CRED_DISP pid=3479 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:23.522560 systemd[1]: sshd@21-172.31.22.61:22-139.178.89.65:55976.service: Deactivated successfully. Oct 2 19:34:23.524138 systemd[1]: session-22.scope: Deactivated successfully. Oct 2 19:34:23.527478 systemd-logind[1632]: Session 22 logged out. Waiting for processes to exit. Oct 2 19:34:23.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.22.61:22-139.178.89.65:55976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:23.529053 kernel: audit: type=1104 audit(1696275263.513:1271): pid=3479 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:23.529571 systemd-logind[1632]: Removed session 22. Oct 2 19:34:24.923000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:34:24.923000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0010c9e80 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:34:24.923000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:34:24.924000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:34:24.924000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013dbec0 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:34:24.924000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:34:25.883366 env[1641]: time="2023-10-02T19:34:25.883315089Z" level=info msg="CreateContainer within sandbox \"cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:4,}" Oct 2 19:34:25.911736 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2179266630.mount: Deactivated successfully. Oct 2 19:34:25.918227 env[1641]: time="2023-10-02T19:34:25.918176308Z" level=info msg="CreateContainer within sandbox \"cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e\" for &ContainerMetadata{Name:mount-cgroup,Attempt:4,} returns container id \"6e08e4ca7976f070c06022aca42cd8e48a414fa9eb7631fa20e41f5beddca47e\"" Oct 2 19:34:25.919170 env[1641]: time="2023-10-02T19:34:25.918975415Z" level=info msg="StartContainer for \"6e08e4ca7976f070c06022aca42cd8e48a414fa9eb7631fa20e41f5beddca47e\"" Oct 2 19:34:25.957079 systemd[1]: Started cri-containerd-6e08e4ca7976f070c06022aca42cd8e48a414fa9eb7631fa20e41f5beddca47e.scope. Oct 2 19:34:25.975689 systemd[1]: cri-containerd-6e08e4ca7976f070c06022aca42cd8e48a414fa9eb7631fa20e41f5beddca47e.scope: Deactivated successfully. Oct 2 19:34:26.008425 env[1641]: time="2023-10-02T19:34:26.008052727Z" level=info msg="shim disconnected" id=6e08e4ca7976f070c06022aca42cd8e48a414fa9eb7631fa20e41f5beddca47e Oct 2 19:34:26.008425 env[1641]: time="2023-10-02T19:34:26.008427101Z" level=warning msg="cleaning up after shim disconnected" id=6e08e4ca7976f070c06022aca42cd8e48a414fa9eb7631fa20e41f5beddca47e namespace=k8s.io Oct 2 19:34:26.008893 env[1641]: time="2023-10-02T19:34:26.008442970Z" level=info msg="cleaning up dead shim" Oct 2 19:34:26.037152 env[1641]: time="2023-10-02T19:34:26.037041070Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:34:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3515 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:34:26Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/6e08e4ca7976f070c06022aca42cd8e48a414fa9eb7631fa20e41f5beddca47e/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:34:26.037533 env[1641]: time="2023-10-02T19:34:26.037456131Z" level=error msg="copy shim log" error="read /proc/self/fd/54: file already closed" Oct 2 19:34:26.038115 env[1641]: time="2023-10-02T19:34:26.038062851Z" level=error msg="Failed to pipe stdout of container \"6e08e4ca7976f070c06022aca42cd8e48a414fa9eb7631fa20e41f5beddca47e\"" error="reading from a closed fifo" Oct 2 19:34:26.038713 env[1641]: time="2023-10-02T19:34:26.038668483Z" level=error msg="Failed to pipe stderr of container \"6e08e4ca7976f070c06022aca42cd8e48a414fa9eb7631fa20e41f5beddca47e\"" error="reading from a closed fifo" Oct 2 19:34:26.042094 env[1641]: time="2023-10-02T19:34:26.042039692Z" level=error msg="StartContainer for \"6e08e4ca7976f070c06022aca42cd8e48a414fa9eb7631fa20e41f5beddca47e\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:34:26.042355 kubelet[2744]: E1002 19:34:26.042331 2744 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="6e08e4ca7976f070c06022aca42cd8e48a414fa9eb7631fa20e41f5beddca47e" Oct 2 19:34:26.042733 kubelet[2744]: E1002 19:34:26.042463 2744 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:34:26.042733 kubelet[2744]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:34:26.042733 kubelet[2744]: rm /hostbin/cilium-mount Oct 2 19:34:26.042733 kubelet[2744]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-kjx8c,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:34:26.042733 kubelet[2744]: E1002 19:34:26.042518 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-zjcpf" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" Oct 2 19:34:26.094243 kubelet[2744]: E1002 19:34:26.094207 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:34:26.332000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:34:26.332000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:34:26.332000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c0056b1c20 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:34:26.332000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:34:26.332000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c00ef61a70 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:34:26.332000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:34:26.334000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:34:26.334000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c00ef61b00 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:34:26.334000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:34:26.349000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:34:26.349000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c00ef61b30 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:34:26.349000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:34:26.361000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:34:26.361000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:34:26.361000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c004822560 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:34:26.361000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:34:26.361000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c00dad65d0 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:34:26.361000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:34:26.406679 kubelet[2744]: I1002 19:34:26.405198 2744 scope.go:117] "RemoveContainer" containerID="b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc" Oct 2 19:34:26.406679 kubelet[2744]: I1002 19:34:26.406647 2744 scope.go:117] "RemoveContainer" containerID="b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc" Oct 2 19:34:26.408684 env[1641]: time="2023-10-02T19:34:26.408453918Z" level=info msg="RemoveContainer for \"b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc\"" Oct 2 19:34:26.413181 env[1641]: time="2023-10-02T19:34:26.409517326Z" level=info msg="RemoveContainer for \"b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc\"" Oct 2 19:34:26.413181 env[1641]: time="2023-10-02T19:34:26.409658419Z" level=error msg="RemoveContainer for \"b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc\" failed" error="failed to set removing state for container \"b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc\": container is already in removing state" Oct 2 19:34:26.421106 kubelet[2744]: E1002 19:34:26.421070 2744 remote_runtime.go:385] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc\": container is already in removing state" containerID="b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc" Oct 2 19:34:26.421270 kubelet[2744]: E1002 19:34:26.421143 2744 kuberuntime_container.go:820] failed to remove pod init container "mount-cgroup": rpc error: code = Unknown desc = failed to set removing state for container "b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc": container is already in removing state; Skipping pod "cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0)" Oct 2 19:34:26.421687 kubelet[2744]: E1002 19:34:26.421667 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 1m20s restarting failed container=mount-cgroup pod=cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0)\"" pod="kube-system/cilium-zjcpf" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" Oct 2 19:34:26.422534 env[1641]: time="2023-10-02T19:34:26.422483547Z" level=info msg="RemoveContainer for \"b7fd79dad46de3df77f6d2582597cf010e73de2b5867f8f1d863c83e001c44bc\" returns successfully" Oct 2 19:34:26.906180 systemd[1]: run-containerd-runc-k8s.io-6e08e4ca7976f070c06022aca42cd8e48a414fa9eb7631fa20e41f5beddca47e-runc.xaDVcW.mount: Deactivated successfully. Oct 2 19:34:26.906306 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6e08e4ca7976f070c06022aca42cd8e48a414fa9eb7631fa20e41f5beddca47e-rootfs.mount: Deactivated successfully. Oct 2 19:34:28.682000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:34:28.685844 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 2 19:34:28.685949 kernel: audit: type=1400 audit(1696275268.682:1281): avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:34:28.682000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001362a60 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:34:28.701000 kernel: audit: type=1300 audit(1696275268.682:1281): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001362a60 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:34:28.701185 kernel: audit: type=1327 audit(1696275268.682:1281): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:34:28.682000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:34:28.685000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:34:28.713438 kernel: audit: type=1400 audit(1696275268.685:1282): avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:34:28.713573 kernel: audit: type=1300 audit(1696275268.685:1282): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001403a40 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:34:28.685000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001403a40 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:34:28.685000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:34:28.728478 kernel: audit: type=1327 audit(1696275268.685:1282): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:34:28.728623 kernel: audit: type=1400 audit(1696275268.685:1283): avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:34:28.685000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:34:28.685000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001403ba0 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:34:28.743072 kernel: audit: type=1300 audit(1696275268.685:1283): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001403ba0 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:34:28.743264 kernel: audit: type=1327 audit(1696275268.685:1283): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:34:28.685000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:34:28.690000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:34:28.756162 kernel: audit: type=1400 audit(1696275268.690:1284): avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:34:28.690000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001362aa0 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:34:28.690000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:34:29.110312 kubelet[2744]: W1002 19:34:29.110268 2744 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod676d69a2_1086_4c05_b8fc_deee645c74c0.slice/cri-containerd-6e08e4ca7976f070c06022aca42cd8e48a414fa9eb7631fa20e41f5beddca47e.scope WatchSource:0}: task 6e08e4ca7976f070c06022aca42cd8e48a414fa9eb7631fa20e41f5beddca47e not found: not found Oct 2 19:34:31.095410 kubelet[2744]: E1002 19:34:31.095337 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:34:33.535537 systemd[1]: Started sshd@22-172.31.22.61:22-139.178.89.65:51730.service. Oct 2 19:34:33.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.22.61:22-139.178.89.65:51730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:33.706052 kernel: kauditd_printk_skb: 3 callbacks suppressed Oct 2 19:34:33.706313 kernel: audit: type=1101 audit(1696275273.701:1286): pid=3530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:33.701000 audit[3530]: USER_ACCT pid=3530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:33.704840 sshd[3530]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:34:33.706777 sshd[3530]: Accepted publickey for core from 139.178.89.65 port 51730 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:34:33.703000 audit[3530]: CRED_ACQ pid=3530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:33.716075 kernel: audit: type=1103 audit(1696275273.703:1287): pid=3530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:33.721536 kernel: audit: type=1006 audit(1696275273.703:1288): pid=3530 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Oct 2 19:34:33.721628 kernel: audit: type=1300 audit(1696275273.703:1288): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb2c25d20 a2=3 a3=0 items=0 ppid=1 pid=3530 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:34:33.703000 audit[3530]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb2c25d20 a2=3 a3=0 items=0 ppid=1 pid=3530 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:34:33.723323 systemd[1]: Started session-23.scope. Oct 2 19:34:33.724824 systemd-logind[1632]: New session 23 of user core. Oct 2 19:34:33.729167 kernel: audit: type=1327 audit(1696275273.703:1288): proctitle=737368643A20636F7265205B707269765D Oct 2 19:34:33.703000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:34:33.739000 audit[3530]: USER_START pid=3530 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:33.750473 kernel: audit: type=1105 audit(1696275273.739:1289): pid=3530 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:33.749000 audit[3532]: CRED_ACQ pid=3532 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:33.758029 kernel: audit: type=1103 audit(1696275273.749:1290): pid=3532 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:33.961311 sshd[3530]: pam_unix(sshd:session): session closed for user core Oct 2 19:34:33.962000 audit[3530]: USER_END pid=3530 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:33.966042 systemd[1]: sshd@22-172.31.22.61:22-139.178.89.65:51730.service: Deactivated successfully. Oct 2 19:34:33.967452 systemd[1]: session-23.scope: Deactivated successfully. Oct 2 19:34:33.962000 audit[3530]: CRED_DISP pid=3530 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:33.978288 kernel: audit: type=1106 audit(1696275273.962:1291): pid=3530 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:33.978385 kernel: audit: type=1104 audit(1696275273.962:1292): pid=3530 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:33.978362 systemd-logind[1632]: Session 23 logged out. Waiting for processes to exit. Oct 2 19:34:33.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.22.61:22-139.178.89.65:51730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:33.984240 kernel: audit: type=1131 audit(1696275273.965:1293): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.22.61:22-139.178.89.65:51730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:33.984859 systemd-logind[1632]: Removed session 23. Oct 2 19:34:36.096454 kubelet[2744]: E1002 19:34:36.096392 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:34:40.881065 kubelet[2744]: E1002 19:34:40.881033 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 1m20s restarting failed container=mount-cgroup pod=cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0)\"" pod="kube-system/cilium-zjcpf" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" Oct 2 19:34:41.096896 kubelet[2744]: E1002 19:34:41.096856 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:34:43.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.22.61:22-139.178.89.65:45204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:44.007041 kernel: audit: type=1130 audit(1696275283.992:1294): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.22.61:22-139.178.89.65:45204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.993319 systemd[1]: Started sshd@23-172.31.22.61:22-139.178.89.65:45204.service. Oct 2 19:34:44.183000 audit[3544]: USER_ACCT pid=3544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:44.184418 sshd[3544]: Accepted publickey for core from 139.178.89.65 port 45204 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:34:44.190000 audit[3544]: CRED_ACQ pid=3544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:44.192432 sshd[3544]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:34:44.199096 kernel: audit: type=1101 audit(1696275284.183:1295): pid=3544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:44.199213 kernel: audit: type=1103 audit(1696275284.190:1296): pid=3544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:44.199246 kernel: audit: type=1006 audit(1696275284.190:1297): pid=3544 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Oct 2 19:34:44.202512 systemd[1]: Started session-24.scope. Oct 2 19:34:44.190000 audit[3544]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff053aa400 a2=3 a3=0 items=0 ppid=1 pid=3544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:34:44.204424 systemd-logind[1632]: New session 24 of user core. Oct 2 19:34:44.229121 kernel: audit: type=1300 audit(1696275284.190:1297): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff053aa400 a2=3 a3=0 items=0 ppid=1 pid=3544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:34:44.229243 kernel: audit: type=1327 audit(1696275284.190:1297): proctitle=737368643A20636F7265205B707269765D Oct 2 19:34:44.229277 kernel: audit: type=1105 audit(1696275284.220:1298): pid=3544 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:44.190000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:34:44.220000 audit[3544]: USER_START pid=3544 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:44.240021 kernel: audit: type=1103 audit(1696275284.227:1299): pid=3546 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:44.227000 audit[3546]: CRED_ACQ pid=3546 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:44.421221 sshd[3544]: pam_unix(sshd:session): session closed for user core Oct 2 19:34:44.422000 audit[3544]: USER_END pid=3544 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:44.431029 kernel: audit: type=1106 audit(1696275284.422:1300): pid=3544 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:44.431095 systemd[1]: sshd@23-172.31.22.61:22-139.178.89.65:45204.service: Deactivated successfully. Oct 2 19:34:44.432309 systemd[1]: session-24.scope: Deactivated successfully. Oct 2 19:34:44.422000 audit[3544]: CRED_DISP pid=3544 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:44.434679 systemd-logind[1632]: Session 24 logged out. Waiting for processes to exit. Oct 2 19:34:44.436621 systemd-logind[1632]: Removed session 24. Oct 2 19:34:44.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.22.61:22-139.178.89.65:45204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:44.441081 kernel: audit: type=1104 audit(1696275284.422:1301): pid=3544 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:46.097627 kubelet[2744]: E1002 19:34:46.097587 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:34:51.098359 kubelet[2744]: E1002 19:34:51.098332 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:34:53.881030 kubelet[2744]: E1002 19:34:53.880977 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 1m20s restarting failed container=mount-cgroup pod=cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0)\"" pod="kube-system/cilium-zjcpf" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" Oct 2 19:34:54.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.22.61:22-139.178.89.65:50186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:54.453843 systemd[1]: Started sshd@24-172.31.22.61:22-139.178.89.65:50186.service. Oct 2 19:34:54.459283 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:34:54.459356 kernel: audit: type=1130 audit(1696275294.453:1303): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.22.61:22-139.178.89.65:50186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:54.639000 audit[3555]: USER_ACCT pid=3555 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:54.648187 sshd[3555]: Accepted publickey for core from 139.178.89.65 port 50186 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:34:54.650258 kernel: audit: type=1101 audit(1696275294.639:1304): pid=3555 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:54.649000 audit[3555]: CRED_ACQ pid=3555 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:54.652122 sshd[3555]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:34:54.672877 kernel: audit: type=1103 audit(1696275294.649:1305): pid=3555 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:54.673003 kernel: audit: type=1006 audit(1696275294.649:1306): pid=3555 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Oct 2 19:34:54.673034 kernel: audit: type=1300 audit(1696275294.649:1306): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcef170650 a2=3 a3=0 items=0 ppid=1 pid=3555 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:34:54.649000 audit[3555]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcef170650 a2=3 a3=0 items=0 ppid=1 pid=3555 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:34:54.672466 systemd[1]: Started session-25.scope. Oct 2 19:34:54.674717 systemd-logind[1632]: New session 25 of user core. Oct 2 19:34:54.649000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:34:54.687026 kernel: audit: type=1327 audit(1696275294.649:1306): proctitle=737368643A20636F7265205B707269765D Oct 2 19:34:54.689000 audit[3555]: USER_START pid=3555 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:54.694000 audit[3557]: CRED_ACQ pid=3557 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:54.704726 kernel: audit: type=1105 audit(1696275294.689:1307): pid=3555 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:54.705271 kernel: audit: type=1103 audit(1696275294.694:1308): pid=3557 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:54.993501 sshd[3555]: pam_unix(sshd:session): session closed for user core Oct 2 19:34:54.994000 audit[3555]: USER_END pid=3555 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:54.997967 systemd-logind[1632]: Session 25 logged out. Waiting for processes to exit. Oct 2 19:34:54.999721 systemd[1]: sshd@24-172.31.22.61:22-139.178.89.65:50186.service: Deactivated successfully. Oct 2 19:34:55.000783 systemd[1]: session-25.scope: Deactivated successfully. Oct 2 19:34:55.003578 systemd-logind[1632]: Removed session 25. Oct 2 19:34:54.995000 audit[3555]: CRED_DISP pid=3555 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:55.011037 kernel: audit: type=1106 audit(1696275294.994:1309): pid=3555 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:55.011244 kernel: audit: type=1104 audit(1696275294.995:1310): pid=3555 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:34:54.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.22.61:22-139.178.89.65:50186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:56.101788 kubelet[2744]: E1002 19:34:56.101757 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:35:01.103840 kubelet[2744]: E1002 19:35:01.102694 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:35:05.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.22.61:22-139.178.89.65:55846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:05.024634 systemd[1]: Started sshd@25-172.31.22.61:22-139.178.89.65:55846.service. Oct 2 19:35:05.029192 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:35:05.029275 kernel: audit: type=1130 audit(1696275305.023:1312): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.22.61:22-139.178.89.65:55846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:05.242000 audit[3568]: USER_ACCT pid=3568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:05.254422 sshd[3568]: Accepted publickey for core from 139.178.89.65 port 55846 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:35:05.258475 kernel: audit: type=1101 audit(1696275305.242:1313): pid=3568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:05.258522 kernel: audit: type=1103 audit(1696275305.253:1314): pid=3568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:05.253000 audit[3568]: CRED_ACQ pid=3568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:05.257259 sshd[3568]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:35:05.266881 systemd[1]: Started session-26.scope. Oct 2 19:35:05.268053 kernel: audit: type=1006 audit(1696275305.253:1315): pid=3568 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Oct 2 19:35:05.253000 audit[3568]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddd06b540 a2=3 a3=0 items=0 ppid=1 pid=3568 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:05.269118 systemd-logind[1632]: New session 26 of user core. Oct 2 19:35:05.274579 kernel: audit: type=1300 audit(1696275305.253:1315): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddd06b540 a2=3 a3=0 items=0 ppid=1 pid=3568 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:05.275803 kernel: audit: type=1327 audit(1696275305.253:1315): proctitle=737368643A20636F7265205B707269765D Oct 2 19:35:05.253000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:35:05.276000 audit[3568]: USER_START pid=3568 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:05.285516 kernel: audit: type=1105 audit(1696275305.276:1316): pid=3568 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:05.285653 kernel: audit: type=1103 audit(1696275305.280:1317): pid=3570 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:05.280000 audit[3570]: CRED_ACQ pid=3570 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:05.480116 sshd[3568]: pam_unix(sshd:session): session closed for user core Oct 2 19:35:05.481000 audit[3568]: USER_END pid=3568 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:05.485411 systemd[1]: sshd@25-172.31.22.61:22-139.178.89.65:55846.service: Deactivated successfully. Oct 2 19:35:05.486864 systemd[1]: session-26.scope: Deactivated successfully. Oct 2 19:35:05.494199 systemd-logind[1632]: Session 26 logged out. Waiting for processes to exit. Oct 2 19:35:05.498034 kernel: audit: type=1106 audit(1696275305.481:1318): pid=3568 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:05.481000 audit[3568]: CRED_DISP pid=3568 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:05.501336 systemd-logind[1632]: Removed session 26. Oct 2 19:35:05.507523 kernel: audit: type=1104 audit(1696275305.481:1319): pid=3568 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:05.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.22.61:22-139.178.89.65:55846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:05.881576 kubelet[2744]: E1002 19:35:05.881507 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 1m20s restarting failed container=mount-cgroup pod=cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0)\"" pod="kube-system/cilium-zjcpf" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" Oct 2 19:35:06.108276 kubelet[2744]: E1002 19:35:06.108239 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:35:11.110215 kubelet[2744]: E1002 19:35:11.110118 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:35:15.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.22.61:22-139.178.89.65:50930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:15.507747 systemd[1]: Started sshd@26-172.31.22.61:22-139.178.89.65:50930.service. Oct 2 19:35:15.513012 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:35:15.513119 kernel: audit: type=1130 audit(1696275315.507:1321): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.22.61:22-139.178.89.65:50930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:15.681000 audit[3582]: USER_ACCT pid=3582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:15.682935 sshd[3582]: Accepted publickey for core from 139.178.89.65 port 50930 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:35:15.689126 kernel: audit: type=1101 audit(1696275315.681:1322): pid=3582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:15.688000 audit[3582]: CRED_ACQ pid=3582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:15.690170 sshd[3582]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:35:15.696079 kernel: audit: type=1103 audit(1696275315.688:1323): pid=3582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:15.688000 audit[3582]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe88af7190 a2=3 a3=0 items=0 ppid=1 pid=3582 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:15.704796 systemd[1]: Started session-27.scope. Oct 2 19:35:15.705728 systemd-logind[1632]: New session 27 of user core. Oct 2 19:35:15.707319 kernel: audit: type=1006 audit(1696275315.688:1324): pid=3582 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Oct 2 19:35:15.707454 kernel: audit: type=1300 audit(1696275315.688:1324): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe88af7190 a2=3 a3=0 items=0 ppid=1 pid=3582 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:15.710072 kernel: audit: type=1327 audit(1696275315.688:1324): proctitle=737368643A20636F7265205B707269765D Oct 2 19:35:15.688000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:35:15.716000 audit[3582]: USER_START pid=3582 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:15.718000 audit[3584]: CRED_ACQ pid=3584 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:15.735108 kernel: audit: type=1105 audit(1696275315.716:1325): pid=3582 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:15.735420 kernel: audit: type=1103 audit(1696275315.718:1326): pid=3584 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:15.916470 sshd[3582]: pam_unix(sshd:session): session closed for user core Oct 2 19:35:15.918000 audit[3582]: USER_END pid=3582 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:15.918000 audit[3582]: CRED_DISP pid=3582 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:15.942246 kernel: audit: type=1106 audit(1696275315.918:1327): pid=3582 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:15.942345 kernel: audit: type=1104 audit(1696275315.918:1328): pid=3582 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:15.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.22.61:22-139.178.89.65:50930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:15.941687 systemd[1]: sshd@26-172.31.22.61:22-139.178.89.65:50930.service: Deactivated successfully. Oct 2 19:35:15.943122 systemd[1]: session-27.scope: Deactivated successfully. Oct 2 19:35:15.944216 systemd-logind[1632]: Session 27 logged out. Waiting for processes to exit. Oct 2 19:35:15.945318 systemd-logind[1632]: Removed session 27. Oct 2 19:35:16.111247 kubelet[2744]: E1002 19:35:16.111198 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:35:16.881833 kubelet[2744]: E1002 19:35:16.881794 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 1m20s restarting failed container=mount-cgroup pod=cilium-zjcpf_kube-system(676d69a2-1086-4c05-b8fc-deee645c74c0)\"" pod="kube-system/cilium-zjcpf" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" Oct 2 19:35:21.112419 kubelet[2744]: E1002 19:35:21.112385 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:35:24.923000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:35:24.926524 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:35:24.926623 kernel: audit: type=1400 audit(1696275324.923:1330): avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:35:24.923000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002503ec0 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:35:24.954816 kernel: audit: type=1300 audit(1696275324.923:1330): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002503ec0 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:35:24.954962 kernel: audit: type=1327 audit(1696275324.923:1330): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:35:24.923000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:35:24.925000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:35:24.968859 kernel: audit: type=1400 audit(1696275324.925:1331): avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:35:24.968977 kernel: audit: type=1300 audit(1696275324.925:1331): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e51e60 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:35:24.925000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e51e60 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:35:24.925000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:35:24.984263 kernel: audit: type=1327 audit(1696275324.925:1331): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:35:25.953375 systemd[1]: Started sshd@27-172.31.22.61:22-139.178.89.65:47350.service. Oct 2 19:35:25.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.22.61:22-139.178.89.65:47350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:25.963014 kernel: audit: type=1130 audit(1696275325.954:1332): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.22.61:22-139.178.89.65:47350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:26.113761 kubelet[2744]: E1002 19:35:26.113721 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:35:26.127000 audit[3595]: USER_ACCT pid=3595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:26.140796 sshd[3595]: Accepted publickey for core from 139.178.89.65 port 47350 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:35:26.141145 kernel: audit: type=1101 audit(1696275326.127:1333): pid=3595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:26.140000 audit[3595]: CRED_ACQ pid=3595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:26.145512 sshd[3595]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:35:26.158856 systemd[1]: Started session-28.scope. Oct 2 19:35:26.160077 kernel: audit: type=1103 audit(1696275326.140:1334): pid=3595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:26.160268 kernel: audit: type=1006 audit(1696275326.143:1335): pid=3595 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Oct 2 19:35:26.143000 audit[3595]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1b0e7830 a2=3 a3=0 items=0 ppid=1 pid=3595 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:26.143000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:35:26.161291 systemd-logind[1632]: New session 28 of user core. Oct 2 19:35:26.169000 audit[3595]: USER_START pid=3595 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:26.171000 audit[3597]: CRED_ACQ pid=3597 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:26.333000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:35:26.333000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c00c892b20 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:35:26.333000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:35:26.333000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:35:26.333000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c006228fc0 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:35:26.333000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:35:26.334000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:35:26.334000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c005e5f2c0 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:35:26.334000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:35:26.349000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:35:26.349000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c005e5f470 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:35:26.349000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:35:26.362000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:35:26.362000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:35:26.362000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c0062293b0 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:35:26.362000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c008bfe480 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:35:26.362000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:35:26.362000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:35:26.378412 sshd[3595]: pam_unix(sshd:session): session closed for user core Oct 2 19:35:26.379000 audit[3595]: USER_END pid=3595 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:26.379000 audit[3595]: CRED_DISP pid=3595 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:26.381815 systemd[1]: sshd@27-172.31.22.61:22-139.178.89.65:47350.service: Deactivated successfully. Oct 2 19:35:26.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.22.61:22-139.178.89.65:47350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:26.383083 systemd[1]: session-28.scope: Deactivated successfully. Oct 2 19:35:26.384160 systemd-logind[1632]: Session 28 logged out. Waiting for processes to exit. Oct 2 19:35:26.385546 systemd-logind[1632]: Removed session 28. Oct 2 19:35:26.405944 systemd[1]: Started sshd@28-172.31.22.61:22-139.178.89.65:47354.service. Oct 2 19:35:26.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.22.61:22-139.178.89.65:47354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:26.576000 audit[3608]: USER_ACCT pid=3608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:26.577441 sshd[3608]: Accepted publickey for core from 139.178.89.65 port 47354 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:35:26.577000 audit[3608]: CRED_ACQ pid=3608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:26.577000 audit[3608]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff41548270 a2=3 a3=0 items=0 ppid=1 pid=3608 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:26.577000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:35:26.579035 sshd[3608]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:35:26.586097 systemd-logind[1632]: New session 29 of user core. Oct 2 19:35:26.586672 systemd[1]: Started session-29.scope. Oct 2 19:35:26.594000 audit[3608]: USER_START pid=3608 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:26.597000 audit[3611]: CRED_ACQ pid=3611 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:28.216628 env[1641]: time="2023-10-02T19:35:28.215099383Z" level=info msg="StopPodSandbox for \"cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e\"" Oct 2 19:35:28.216628 env[1641]: time="2023-10-02T19:35:28.215281745Z" level=info msg="Container to stop \"6e08e4ca7976f070c06022aca42cd8e48a414fa9eb7631fa20e41f5beddca47e\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Oct 2 19:35:28.217973 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e-shm.mount: Deactivated successfully. Oct 2 19:35:28.243931 systemd[1]: cri-containerd-cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e.scope: Deactivated successfully. Oct 2 19:35:28.244000 audit: BPF prog-id=112 op=UNLOAD Oct 2 19:35:28.247000 audit: BPF prog-id=115 op=UNLOAD Oct 2 19:35:28.276149 env[1641]: time="2023-10-02T19:35:28.276109651Z" level=info msg="StopContainer for \"f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b\" with timeout 30 (s)" Oct 2 19:35:28.276865 env[1641]: time="2023-10-02T19:35:28.276833065Z" level=info msg="Stop container \"f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b\" with signal terminated" Oct 2 19:35:28.319171 systemd[1]: cri-containerd-f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b.scope: Deactivated successfully. Oct 2 19:35:28.318000 audit: BPF prog-id=127 op=UNLOAD Oct 2 19:35:28.323000 audit: BPF prog-id=130 op=UNLOAD Oct 2 19:35:28.332262 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e-rootfs.mount: Deactivated successfully. Oct 2 19:35:28.367724 env[1641]: time="2023-10-02T19:35:28.367533897Z" level=info msg="shim disconnected" id=cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e Oct 2 19:35:28.367724 env[1641]: time="2023-10-02T19:35:28.367592661Z" level=warning msg="cleaning up after shim disconnected" id=cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e namespace=k8s.io Oct 2 19:35:28.367724 env[1641]: time="2023-10-02T19:35:28.367620677Z" level=info msg="cleaning up dead shim" Oct 2 19:35:28.382022 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b-rootfs.mount: Deactivated successfully. Oct 2 19:35:28.388689 env[1641]: time="2023-10-02T19:35:28.388648155Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:35:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3654 runtime=io.containerd.runc.v2\n" Oct 2 19:35:28.389408 env[1641]: time="2023-10-02T19:35:28.389370103Z" level=info msg="TearDown network for sandbox \"cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e\" successfully" Oct 2 19:35:28.389408 env[1641]: time="2023-10-02T19:35:28.389405330Z" level=info msg="StopPodSandbox for \"cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e\" returns successfully" Oct 2 19:35:28.397062 env[1641]: time="2023-10-02T19:35:28.397005314Z" level=info msg="shim disconnected" id=f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b Oct 2 19:35:28.397062 env[1641]: time="2023-10-02T19:35:28.397060646Z" level=warning msg="cleaning up after shim disconnected" id=f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b namespace=k8s.io Oct 2 19:35:28.397062 env[1641]: time="2023-10-02T19:35:28.397076481Z" level=info msg="cleaning up dead shim" Oct 2 19:35:28.418230 env[1641]: time="2023-10-02T19:35:28.418182164Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:35:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3666 runtime=io.containerd.runc.v2\n" Oct 2 19:35:28.420594 env[1641]: time="2023-10-02T19:35:28.420556291Z" level=info msg="StopContainer for \"f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b\" returns successfully" Oct 2 19:35:28.421418 env[1641]: time="2023-10-02T19:35:28.421380950Z" level=info msg="StopPodSandbox for \"87f72d17c19b32dd88af9cb708869facb4cba8654b42d5da05f90cb0024e472c\"" Oct 2 19:35:28.424815 env[1641]: time="2023-10-02T19:35:28.421441123Z" level=info msg="Container to stop \"f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Oct 2 19:35:28.424590 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-87f72d17c19b32dd88af9cb708869facb4cba8654b42d5da05f90cb0024e472c-shm.mount: Deactivated successfully. Oct 2 19:35:28.434582 systemd[1]: cri-containerd-87f72d17c19b32dd88af9cb708869facb4cba8654b42d5da05f90cb0024e472c.scope: Deactivated successfully. Oct 2 19:35:28.433000 audit: BPF prog-id=116 op=UNLOAD Oct 2 19:35:28.437000 audit: BPF prog-id=119 op=UNLOAD Oct 2 19:35:28.467645 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-87f72d17c19b32dd88af9cb708869facb4cba8654b42d5da05f90cb0024e472c-rootfs.mount: Deactivated successfully. Oct 2 19:35:28.483765 env[1641]: time="2023-10-02T19:35:28.483712708Z" level=info msg="shim disconnected" id=87f72d17c19b32dd88af9cb708869facb4cba8654b42d5da05f90cb0024e472c Oct 2 19:35:28.483765 env[1641]: time="2023-10-02T19:35:28.483764818Z" level=warning msg="cleaning up after shim disconnected" id=87f72d17c19b32dd88af9cb708869facb4cba8654b42d5da05f90cb0024e472c namespace=k8s.io Oct 2 19:35:28.484203 env[1641]: time="2023-10-02T19:35:28.483777650Z" level=info msg="cleaning up dead shim" Oct 2 19:35:28.496745 env[1641]: time="2023-10-02T19:35:28.496699225Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:35:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3700 runtime=io.containerd.runc.v2\n" Oct 2 19:35:28.497351 env[1641]: time="2023-10-02T19:35:28.497317771Z" level=info msg="TearDown network for sandbox \"87f72d17c19b32dd88af9cb708869facb4cba8654b42d5da05f90cb0024e472c\" successfully" Oct 2 19:35:28.497493 env[1641]: time="2023-10-02T19:35:28.497473655Z" level=info msg="StopPodSandbox for \"87f72d17c19b32dd88af9cb708869facb4cba8654b42d5da05f90cb0024e472c\" returns successfully" Oct 2 19:35:28.511728 kubelet[2744]: I1002 19:35:28.510726 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"host-proc-sys-net\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-host-proc-sys-net\") pod \"676d69a2-1086-4c05-b8fc-deee645c74c0\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " Oct 2 19:35:28.511728 kubelet[2744]: I1002 19:35:28.510800 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/676d69a2-1086-4c05-b8fc-deee645c74c0-cilium-config-path\") pod \"676d69a2-1086-4c05-b8fc-deee645c74c0\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " Oct 2 19:35:28.511728 kubelet[2744]: I1002 19:35:28.510829 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"hostproc\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-hostproc\") pod \"676d69a2-1086-4c05-b8fc-deee645c74c0\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " Oct 2 19:35:28.511728 kubelet[2744]: I1002 19:35:28.510854 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"host-proc-sys-kernel\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-host-proc-sys-kernel\") pod \"676d69a2-1086-4c05-b8fc-deee645c74c0\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " Oct 2 19:35:28.511728 kubelet[2744]: I1002 19:35:28.510917 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"clustermesh-secrets\" (UniqueName: \"kubernetes.io/secret/676d69a2-1086-4c05-b8fc-deee645c74c0-clustermesh-secrets\") pod \"676d69a2-1086-4c05-b8fc-deee645c74c0\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " Oct 2 19:35:28.511728 kubelet[2744]: I1002 19:35:28.511066 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-path\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-cni-path\") pod \"676d69a2-1086-4c05-b8fc-deee645c74c0\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " Oct 2 19:35:28.511728 kubelet[2744]: I1002 19:35:28.511098 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-xtables-lock\") pod \"676d69a2-1086-4c05-b8fc-deee645c74c0\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " Oct 2 19:35:28.511728 kubelet[2744]: I1002 19:35:28.511147 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"bpf-maps\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-bpf-maps\") pod \"676d69a2-1086-4c05-b8fc-deee645c74c0\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " Oct 2 19:35:28.511728 kubelet[2744]: I1002 19:35:28.511250 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-cgroup\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-cilium-cgroup\") pod \"676d69a2-1086-4c05-b8fc-deee645c74c0\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " Oct 2 19:35:28.511728 kubelet[2744]: I1002 19:35:28.511258 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-host-proc-sys-kernel" (OuterVolumeSpecName: "host-proc-sys-kernel") pod "676d69a2-1086-4c05-b8fc-deee645c74c0" (UID: "676d69a2-1086-4c05-b8fc-deee645c74c0"). InnerVolumeSpecName "host-proc-sys-kernel". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:35:28.511728 kubelet[2744]: I1002 19:35:28.511284 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"hubble-tls\" (UniqueName: \"kubernetes.io/projected/676d69a2-1086-4c05-b8fc-deee645c74c0-hubble-tls\") pod \"676d69a2-1086-4c05-b8fc-deee645c74c0\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " Oct 2 19:35:28.511728 kubelet[2744]: I1002 19:35:28.511307 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-host-proc-sys-net" (OuterVolumeSpecName: "host-proc-sys-net") pod "676d69a2-1086-4c05-b8fc-deee645c74c0" (UID: "676d69a2-1086-4c05-b8fc-deee645c74c0"). InnerVolumeSpecName "host-proc-sys-net". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:35:28.511728 kubelet[2744]: I1002 19:35:28.511321 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-lib-modules\") pod \"676d69a2-1086-4c05-b8fc-deee645c74c0\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " Oct 2 19:35:28.511728 kubelet[2744]: I1002 19:35:28.511350 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"etc-cni-netd\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-etc-cni-netd\") pod \"676d69a2-1086-4c05-b8fc-deee645c74c0\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " Oct 2 19:35:28.511728 kubelet[2744]: I1002 19:35:28.511379 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-run\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-cilium-run\") pod \"676d69a2-1086-4c05-b8fc-deee645c74c0\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " Oct 2 19:35:28.511728 kubelet[2744]: I1002 19:35:28.511411 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-kjx8c\" (UniqueName: \"kubernetes.io/projected/676d69a2-1086-4c05-b8fc-deee645c74c0-kube-api-access-kjx8c\") pod \"676d69a2-1086-4c05-b8fc-deee645c74c0\" (UID: \"676d69a2-1086-4c05-b8fc-deee645c74c0\") " Oct 2 19:35:28.514134 kubelet[2744]: I1002 19:35:28.511459 2744 reconciler_common.go:300] "Volume detached for volume \"host-proc-sys-kernel\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-host-proc-sys-kernel\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:35:28.514864 kubelet[2744]: I1002 19:35:28.514372 2744 reconciler_common.go:300] "Volume detached for volume \"host-proc-sys-net\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-host-proc-sys-net\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:35:28.515467 kubelet[2744]: I1002 19:35:28.515438 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/676d69a2-1086-4c05-b8fc-deee645c74c0-cilium-config-path" (OuterVolumeSpecName: "cilium-config-path") pod "676d69a2-1086-4c05-b8fc-deee645c74c0" (UID: "676d69a2-1086-4c05-b8fc-deee645c74c0"). InnerVolumeSpecName "cilium-config-path". PluginName "kubernetes.io/configmap", VolumeGidValue "" Oct 2 19:35:28.515564 kubelet[2744]: I1002 19:35:28.515501 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-hostproc" (OuterVolumeSpecName: "hostproc") pod "676d69a2-1086-4c05-b8fc-deee645c74c0" (UID: "676d69a2-1086-4c05-b8fc-deee645c74c0"). InnerVolumeSpecName "hostproc". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:35:28.525647 kubelet[2744]: I1002 19:35:28.516910 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-cilium-cgroup" (OuterVolumeSpecName: "cilium-cgroup") pod "676d69a2-1086-4c05-b8fc-deee645c74c0" (UID: "676d69a2-1086-4c05-b8fc-deee645c74c0"). InnerVolumeSpecName "cilium-cgroup". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:35:28.525647 kubelet[2744]: I1002 19:35:28.517295 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-cni-path" (OuterVolumeSpecName: "cni-path") pod "676d69a2-1086-4c05-b8fc-deee645c74c0" (UID: "676d69a2-1086-4c05-b8fc-deee645c74c0"). InnerVolumeSpecName "cni-path". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:35:28.525647 kubelet[2744]: I1002 19:35:28.517332 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "676d69a2-1086-4c05-b8fc-deee645c74c0" (UID: "676d69a2-1086-4c05-b8fc-deee645c74c0"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:35:28.525647 kubelet[2744]: I1002 19:35:28.517357 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-bpf-maps" (OuterVolumeSpecName: "bpf-maps") pod "676d69a2-1086-4c05-b8fc-deee645c74c0" (UID: "676d69a2-1086-4c05-b8fc-deee645c74c0"). InnerVolumeSpecName "bpf-maps". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:35:28.525647 kubelet[2744]: I1002 19:35:28.517382 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "676d69a2-1086-4c05-b8fc-deee645c74c0" (UID: "676d69a2-1086-4c05-b8fc-deee645c74c0"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:35:28.525647 kubelet[2744]: I1002 19:35:28.518062 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-etc-cni-netd" (OuterVolumeSpecName: "etc-cni-netd") pod "676d69a2-1086-4c05-b8fc-deee645c74c0" (UID: "676d69a2-1086-4c05-b8fc-deee645c74c0"). InnerVolumeSpecName "etc-cni-netd". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:35:28.525647 kubelet[2744]: I1002 19:35:28.518099 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-cilium-run" (OuterVolumeSpecName: "cilium-run") pod "676d69a2-1086-4c05-b8fc-deee645c74c0" (UID: "676d69a2-1086-4c05-b8fc-deee645c74c0"). InnerVolumeSpecName "cilium-run". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:35:28.526860 kubelet[2744]: I1002 19:35:28.526820 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/676d69a2-1086-4c05-b8fc-deee645c74c0-kube-api-access-kjx8c" (OuterVolumeSpecName: "kube-api-access-kjx8c") pod "676d69a2-1086-4c05-b8fc-deee645c74c0" (UID: "676d69a2-1086-4c05-b8fc-deee645c74c0"). InnerVolumeSpecName "kube-api-access-kjx8c". PluginName "kubernetes.io/projected", VolumeGidValue "" Oct 2 19:35:28.539743 kubelet[2744]: I1002 19:35:28.539698 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/676d69a2-1086-4c05-b8fc-deee645c74c0-clustermesh-secrets" (OuterVolumeSpecName: "clustermesh-secrets") pod "676d69a2-1086-4c05-b8fc-deee645c74c0" (UID: "676d69a2-1086-4c05-b8fc-deee645c74c0"). InnerVolumeSpecName "clustermesh-secrets". PluginName "kubernetes.io/secret", VolumeGidValue "" Oct 2 19:35:28.542870 kubelet[2744]: I1002 19:35:28.542825 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/676d69a2-1086-4c05-b8fc-deee645c74c0-hubble-tls" (OuterVolumeSpecName: "hubble-tls") pod "676d69a2-1086-4c05-b8fc-deee645c74c0" (UID: "676d69a2-1086-4c05-b8fc-deee645c74c0"). InnerVolumeSpecName "hubble-tls". PluginName "kubernetes.io/projected", VolumeGidValue "" Oct 2 19:35:28.557498 kubelet[2744]: I1002 19:35:28.557439 2744 scope.go:117] "RemoveContainer" containerID="f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b" Oct 2 19:35:28.563324 env[1641]: time="2023-10-02T19:35:28.563280060Z" level=info msg="RemoveContainer for \"f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b\"" Oct 2 19:35:28.571808 env[1641]: time="2023-10-02T19:35:28.571650842Z" level=info msg="RemoveContainer for \"f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b\" returns successfully" Oct 2 19:35:28.574815 kubelet[2744]: I1002 19:35:28.574752 2744 scope.go:117] "RemoveContainer" containerID="f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b" Oct 2 19:35:28.575569 env[1641]: time="2023-10-02T19:35:28.575223179Z" level=error msg="ContainerStatus for \"f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b\": not found" Oct 2 19:35:28.576670 kubelet[2744]: E1002 19:35:28.576647 2744 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b\": not found" containerID="f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b" Oct 2 19:35:28.576749 systemd[1]: Removed slice kubepods-burstable-pod676d69a2_1086_4c05_b8fc_deee645c74c0.slice. Oct 2 19:35:28.577560 kubelet[2744]: I1002 19:35:28.577536 2744 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b"} err="failed to get container status \"f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b\": rpc error: code = NotFound desc = an error occurred when try to find container \"f7e913e2cf1041b174548fc7e94aa82d01e1ef8c2eb888b9799bbad74d4e7f1b\": not found" Oct 2 19:35:28.577672 kubelet[2744]: I1002 19:35:28.577565 2744 scope.go:117] "RemoveContainer" containerID="6e08e4ca7976f070c06022aca42cd8e48a414fa9eb7631fa20e41f5beddca47e" Oct 2 19:35:28.579649 env[1641]: time="2023-10-02T19:35:28.579595551Z" level=info msg="RemoveContainer for \"6e08e4ca7976f070c06022aca42cd8e48a414fa9eb7631fa20e41f5beddca47e\"" Oct 2 19:35:28.590354 env[1641]: time="2023-10-02T19:35:28.590299931Z" level=info msg="RemoveContainer for \"6e08e4ca7976f070c06022aca42cd8e48a414fa9eb7631fa20e41f5beddca47e\" returns successfully" Oct 2 19:35:28.615053 kubelet[2744]: I1002 19:35:28.615020 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-2jgpb\" (UniqueName: \"kubernetes.io/projected/8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f-kube-api-access-2jgpb\") pod \"8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f\" (UID: \"8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f\") " Oct 2 19:35:28.615336 kubelet[2744]: I1002 19:35:28.615316 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f-cilium-config-path\") pod \"8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f\" (UID: \"8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f\") " Oct 2 19:35:28.615497 kubelet[2744]: I1002 19:35:28.615485 2744 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-kjx8c\" (UniqueName: \"kubernetes.io/projected/676d69a2-1086-4c05-b8fc-deee645c74c0-kube-api-access-kjx8c\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:35:28.615661 kubelet[2744]: I1002 19:35:28.615649 2744 reconciler_common.go:300] "Volume detached for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/676d69a2-1086-4c05-b8fc-deee645c74c0-cilium-config-path\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:35:28.615841 kubelet[2744]: I1002 19:35:28.615823 2744 reconciler_common.go:300] "Volume detached for volume \"hostproc\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-hostproc\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:35:28.615985 kubelet[2744]: I1002 19:35:28.615974 2744 reconciler_common.go:300] "Volume detached for volume \"clustermesh-secrets\" (UniqueName: \"kubernetes.io/secret/676d69a2-1086-4c05-b8fc-deee645c74c0-clustermesh-secrets\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:35:28.616105 kubelet[2744]: I1002 19:35:28.616095 2744 reconciler_common.go:300] "Volume detached for volume \"cni-path\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-cni-path\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:35:28.616195 kubelet[2744]: I1002 19:35:28.616186 2744 reconciler_common.go:300] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-xtables-lock\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:35:28.616291 kubelet[2744]: I1002 19:35:28.616260 2744 reconciler_common.go:300] "Volume detached for volume \"bpf-maps\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-bpf-maps\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:35:28.616291 kubelet[2744]: I1002 19:35:28.616286 2744 reconciler_common.go:300] "Volume detached for volume \"cilium-cgroup\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-cilium-cgroup\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:35:28.616504 kubelet[2744]: I1002 19:35:28.616302 2744 reconciler_common.go:300] "Volume detached for volume \"hubble-tls\" (UniqueName: \"kubernetes.io/projected/676d69a2-1086-4c05-b8fc-deee645c74c0-hubble-tls\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:35:28.616504 kubelet[2744]: I1002 19:35:28.616429 2744 reconciler_common.go:300] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-lib-modules\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:35:28.616504 kubelet[2744]: I1002 19:35:28.616449 2744 reconciler_common.go:300] "Volume detached for volume \"etc-cni-netd\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-etc-cni-netd\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:35:28.616504 kubelet[2744]: I1002 19:35:28.616464 2744 reconciler_common.go:300] "Volume detached for volume \"cilium-run\" (UniqueName: \"kubernetes.io/host-path/676d69a2-1086-4c05-b8fc-deee645c74c0-cilium-run\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:35:28.619357 kubelet[2744]: I1002 19:35:28.619316 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f-cilium-config-path" (OuterVolumeSpecName: "cilium-config-path") pod "8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f" (UID: "8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f"). InnerVolumeSpecName "cilium-config-path". PluginName "kubernetes.io/configmap", VolumeGidValue "" Oct 2 19:35:28.626271 kubelet[2744]: I1002 19:35:28.626228 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f-kube-api-access-2jgpb" (OuterVolumeSpecName: "kube-api-access-2jgpb") pod "8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f" (UID: "8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f"). InnerVolumeSpecName "kube-api-access-2jgpb". PluginName "kubernetes.io/projected", VolumeGidValue "" Oct 2 19:35:28.687000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:35:28.687000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025ad9e0 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:35:28.687000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:35:28.689000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:35:28.689000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025adb00 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:35:28.689000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:35:28.690000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:35:28.690000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0020627a0 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:35:28.690000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:35:28.690000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:35:28.690000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0020627c0 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:35:28.690000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:35:28.716736 kubelet[2744]: I1002 19:35:28.716600 2744 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-2jgpb\" (UniqueName: \"kubernetes.io/projected/8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f-kube-api-access-2jgpb\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:35:28.716965 kubelet[2744]: I1002 19:35:28.716747 2744 reconciler_common.go:300] "Volume detached for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f-cilium-config-path\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:35:28.863894 systemd[1]: Removed slice kubepods-besteffort-pod8dbb76cb_d17f_4a4b_bbfd_a5a44fe6af8f.slice. Oct 2 19:35:28.884416 kubelet[2744]: I1002 19:35:28.884381 2744 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" path="/var/lib/kubelet/pods/676d69a2-1086-4c05-b8fc-deee645c74c0/volumes" Oct 2 19:35:29.217937 systemd[1]: var-lib-kubelet-pods-8dbb76cb\x2dd17f\x2d4a4b\x2dbbfd\x2da5a44fe6af8f-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d2jgpb.mount: Deactivated successfully. Oct 2 19:35:29.218647 systemd[1]: var-lib-kubelet-pods-676d69a2\x2d1086\x2d4c05\x2db8fc\x2ddeee645c74c0-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dkjx8c.mount: Deactivated successfully. Oct 2 19:35:29.218767 systemd[1]: var-lib-kubelet-pods-676d69a2\x2d1086\x2d4c05\x2db8fc\x2ddeee645c74c0-volumes-kubernetes.io\x7esecret-clustermesh\x2dsecrets.mount: Deactivated successfully. Oct 2 19:35:29.218867 systemd[1]: var-lib-kubelet-pods-676d69a2\x2d1086\x2d4c05\x2db8fc\x2ddeee645c74c0-volumes-kubernetes.io\x7eprojected-hubble\x2dtls.mount: Deactivated successfully. Oct 2 19:35:30.187034 sshd[3608]: pam_unix(sshd:session): session closed for user core Oct 2 19:35:30.195048 kernel: kauditd_printk_skb: 51 callbacks suppressed Oct 2 19:35:30.195252 kernel: audit: type=1106 audit(1696275330.188:1363): pid=3608 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:30.188000 audit[3608]: USER_END pid=3608 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:30.193340 systemd[1]: sshd@28-172.31.22.61:22-139.178.89.65:47354.service: Deactivated successfully. Oct 2 19:35:30.194381 systemd[1]: session-29.scope: Deactivated successfully. Oct 2 19:35:30.198239 systemd-logind[1632]: Session 29 logged out. Waiting for processes to exit. Oct 2 19:35:30.188000 audit[3608]: CRED_DISP pid=3608 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:30.201654 systemd-logind[1632]: Removed session 29. Oct 2 19:35:30.206038 kernel: audit: type=1104 audit(1696275330.188:1364): pid=3608 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:30.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.22.61:22-139.178.89.65:47354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:30.213056 kernel: audit: type=1131 audit(1696275330.192:1365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.22.61:22-139.178.89.65:47354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:30.218520 systemd[1]: Started sshd@29-172.31.22.61:22-139.178.89.65:47364.service. Oct 2 19:35:30.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.22.61:22-139.178.89.65:47364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:30.232065 kernel: audit: type=1130 audit(1696275330.217:1366): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.22.61:22-139.178.89.65:47364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:30.397000 audit[3718]: USER_ACCT pid=3718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:30.398722 sshd[3718]: Accepted publickey for core from 139.178.89.65 port 47364 ssh2: RSA SHA256:3SUoTCyUzcWgmGRSvO30phAsJbW/q0F+muoiwscTNp4 Oct 2 19:35:30.405107 kernel: audit: type=1101 audit(1696275330.397:1367): pid=3718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:30.405234 kernel: audit: type=1103 audit(1696275330.403:1368): pid=3718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:30.403000 audit[3718]: CRED_ACQ pid=3718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:30.405807 sshd[3718]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:35:30.413645 systemd[1]: Started session-30.scope. Oct 2 19:35:30.417769 kernel: audit: type=1006 audit(1696275330.404:1369): pid=3718 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Oct 2 19:35:30.417930 kernel: audit: type=1300 audit(1696275330.404:1369): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2fdb2ac0 a2=3 a3=0 items=0 ppid=1 pid=3718 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:30.404000 audit[3718]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2fdb2ac0 a2=3 a3=0 items=0 ppid=1 pid=3718 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:30.418147 systemd-logind[1632]: New session 30 of user core. Oct 2 19:35:30.426231 kernel: audit: type=1327 audit(1696275330.404:1369): proctitle=737368643A20636F7265205B707269765D Oct 2 19:35:30.404000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:35:30.425000 audit[3718]: USER_START pid=3718 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:30.435189 kernel: audit: type=1105 audit(1696275330.425:1370): pid=3718 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:30.429000 audit[3720]: CRED_ACQ pid=3720 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:35:30.770302 env[1641]: time="2023-10-02T19:35:30.770057223Z" level=info msg="StopPodSandbox for \"cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e\"" Oct 2 19:35:30.770302 env[1641]: time="2023-10-02T19:35:30.770189139Z" level=info msg="TearDown network for sandbox \"cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e\" successfully" Oct 2 19:35:30.770302 env[1641]: time="2023-10-02T19:35:30.770230975Z" level=info msg="StopPodSandbox for \"cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e\" returns successfully" Oct 2 19:35:30.771913 env[1641]: time="2023-10-02T19:35:30.771366932Z" level=info msg="RemovePodSandbox for \"cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e\"" Oct 2 19:35:30.771913 env[1641]: time="2023-10-02T19:35:30.771416081Z" level=info msg="Forcibly stopping sandbox \"cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e\"" Oct 2 19:35:30.771913 env[1641]: time="2023-10-02T19:35:30.771521476Z" level=info msg="TearDown network for sandbox \"cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e\" successfully" Oct 2 19:35:30.775763 env[1641]: time="2023-10-02T19:35:30.775701328Z" level=info msg="RemovePodSandbox \"cc78ed3120a526d0f083a4e9b4cb2ef89072dbea3ed16e5fe7a91472260e529e\" returns successfully" Oct 2 19:35:30.776696 env[1641]: time="2023-10-02T19:35:30.776669761Z" level=info msg="StopPodSandbox for \"87f72d17c19b32dd88af9cb708869facb4cba8654b42d5da05f90cb0024e472c\"" Oct 2 19:35:30.777272 env[1641]: time="2023-10-02T19:35:30.777169989Z" level=info msg="TearDown network for sandbox \"87f72d17c19b32dd88af9cb708869facb4cba8654b42d5da05f90cb0024e472c\" successfully" Oct 2 19:35:30.777540 env[1641]: time="2023-10-02T19:35:30.777517255Z" level=info msg="StopPodSandbox for \"87f72d17c19b32dd88af9cb708869facb4cba8654b42d5da05f90cb0024e472c\" returns successfully" Oct 2 19:35:30.778415 env[1641]: time="2023-10-02T19:35:30.778332959Z" level=info msg="RemovePodSandbox for \"87f72d17c19b32dd88af9cb708869facb4cba8654b42d5da05f90cb0024e472c\"" Oct 2 19:35:30.778700 env[1641]: time="2023-10-02T19:35:30.778581569Z" level=info msg="Forcibly stopping sandbox \"87f72d17c19b32dd88af9cb708869facb4cba8654b42d5da05f90cb0024e472c\"" Oct 2 19:35:30.779100 env[1641]: time="2023-10-02T19:35:30.779075179Z" level=info msg="TearDown network for sandbox \"87f72d17c19b32dd88af9cb708869facb4cba8654b42d5da05f90cb0024e472c\" successfully" Oct 2 19:35:30.784460 env[1641]: time="2023-10-02T19:35:30.784414481Z" level=info msg="RemovePodSandbox \"87f72d17c19b32dd88af9cb708869facb4cba8654b42d5da05f90cb0024e472c\" returns successfully" Oct 2 19:35:30.884890 kubelet[2744]: I1002 19:35:30.884857 2744 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f" path="/var/lib/kubelet/pods/8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f/volumes" Oct 2 19:35:31.115229 kubelet[2744]: E1002 19:35:31.115140 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:35:31.209576 kubelet[2744]: I1002 19:35:31.209539 2744 topology_manager.go:215] "Topology Admit Handler" podUID="c6a8154e-1e3e-4209-8ac4-e979c412eb94" podNamespace="kube-system" podName="cilium-ldfh7" Oct 2 19:35:31.209860 kubelet[2744]: E1002 19:35:31.209843 2744 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" containerName="mount-cgroup" Oct 2 19:35:31.210015 kubelet[2744]: E1002 19:35:31.210004 2744 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" containerName="mount-cgroup" Oct 2 19:35:31.210105 kubelet[2744]: E1002 19:35:31.210095 2744 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" containerName="mount-cgroup" Oct 2 19:35:31.210354 kubelet[2744]: E1002 19:35:31.210341 2744 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f" containerName="cilium-operator" Oct 2 19:35:31.210499 kubelet[2744]: I1002 19:35:31.210487 2744 memory_manager.go:346] "RemoveStaleState removing state" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" containerName="mount-cgroup" Oct 2 19:35:31.210603 kubelet[2744]: I1002 19:35:31.210593 2744 memory_manager.go:346] "RemoveStaleState removing state" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" containerName="mount-cgroup" Oct 2 19:35:31.210691 kubelet[2744]: I1002 19:35:31.210682 2744 memory_manager.go:346] "RemoveStaleState removing state" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" containerName="mount-cgroup" Oct 2 19:35:31.210785 kubelet[2744]: I1002 19:35:31.210776 2744 memory_manager.go:346] "RemoveStaleState removing state" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" containerName="mount-cgroup" Oct 2 19:35:31.210873 kubelet[2744]: I1002 19:35:31.210864 2744 memory_manager.go:346] "RemoveStaleState removing state" podUID="8dbb76cb-d17f-4a4b-bbfd-a5a44fe6af8f" containerName="cilium-operator" Oct 2 19:35:31.211014 kubelet[2744]: E1002 19:35:31.211002 2744 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" containerName="mount-cgroup" Oct 2 19:35:31.211133 kubelet[2744]: E1002 19:35:31.211123 2744 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" containerName="mount-cgroup" Oct 2 19:35:31.211243 kubelet[2744]: I1002 19:35:31.211233 2744 memory_manager.go:346] "RemoveStaleState removing state" podUID="676d69a2-1086-4c05-b8fc-deee645c74c0" containerName="mount-cgroup" Oct 2 19:35:31.222650 systemd[1]: Created slice kubepods-burstable-podc6a8154e_1e3e_4209_8ac4_e979c412eb94.slice. Oct 2 19:35:31.342840 kubelet[2744]: I1002 19:35:31.342805 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-run\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-cilium-run\") pod \"cilium-ldfh7\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " pod="kube-system/cilium-ldfh7" Oct 2 19:35:31.342840 kubelet[2744]: I1002 19:35:31.342857 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"clustermesh-secrets\" (UniqueName: \"kubernetes.io/secret/c6a8154e-1e3e-4209-8ac4-e979c412eb94-clustermesh-secrets\") pod \"cilium-ldfh7\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " pod="kube-system/cilium-ldfh7" Oct 2 19:35:31.343237 kubelet[2744]: I1002 19:35:31.342891 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"hostproc\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-hostproc\") pod \"cilium-ldfh7\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " pod="kube-system/cilium-ldfh7" Oct 2 19:35:31.343237 kubelet[2744]: I1002 19:35:31.342990 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-cgroup\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-cilium-cgroup\") pod \"cilium-ldfh7\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " pod="kube-system/cilium-ldfh7" Oct 2 19:35:31.343237 kubelet[2744]: I1002 19:35:31.343034 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-path\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-cni-path\") pod \"cilium-ldfh7\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " pod="kube-system/cilium-ldfh7" Oct 2 19:35:31.343237 kubelet[2744]: I1002 19:35:31.343060 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-lib-modules\") pod \"cilium-ldfh7\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " pod="kube-system/cilium-ldfh7" Oct 2 19:35:31.343237 kubelet[2744]: I1002 19:35:31.343091 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f6hkv\" (UniqueName: \"kubernetes.io/projected/c6a8154e-1e3e-4209-8ac4-e979c412eb94-kube-api-access-f6hkv\") pod \"cilium-ldfh7\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " pod="kube-system/cilium-ldfh7" Oct 2 19:35:31.343237 kubelet[2744]: I1002 19:35:31.343121 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"host-proc-sys-kernel\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-host-proc-sys-kernel\") pod \"cilium-ldfh7\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " pod="kube-system/cilium-ldfh7" Oct 2 19:35:31.343237 kubelet[2744]: I1002 19:35:31.343149 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etc-cni-netd\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-etc-cni-netd\") pod \"cilium-ldfh7\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " pod="kube-system/cilium-ldfh7" Oct 2 19:35:31.343237 kubelet[2744]: I1002 19:35:31.343178 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/c6a8154e-1e3e-4209-8ac4-e979c412eb94-cilium-config-path\") pod \"cilium-ldfh7\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " pod="kube-system/cilium-ldfh7" Oct 2 19:35:31.343237 kubelet[2744]: I1002 19:35:31.343242 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"bpf-maps\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-bpf-maps\") pod \"cilium-ldfh7\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " pod="kube-system/cilium-ldfh7" Oct 2 19:35:31.343635 kubelet[2744]: I1002 19:35:31.343271 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-ipsec-secrets\" (UniqueName: \"kubernetes.io/secret/c6a8154e-1e3e-4209-8ac4-e979c412eb94-cilium-ipsec-secrets\") pod \"cilium-ldfh7\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " pod="kube-system/cilium-ldfh7" Oct 2 19:35:31.343635 kubelet[2744]: I1002 19:35:31.343306 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-xtables-lock\") pod \"cilium-ldfh7\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " pod="kube-system/cilium-ldfh7" Oct 2 19:35:31.343635 kubelet[2744]: I1002 19:35:31.343336 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"host-proc-sys-net\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-host-proc-sys-net\") pod \"cilium-ldfh7\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " pod="kube-system/cilium-ldfh7" Oct 2 19:35:31.343635 kubelet[2744]: I1002 19:35:31.343368 2744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"hubble-tls\" (UniqueName: \"kubernetes.io/projected/c6a8154e-1e3e-4209-8ac4-e979c412eb94-hubble-tls\") pod \"cilium-ldfh7\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " pod="kube-system/cilium-ldfh7" Oct 2 19:35:31.529893 env[1641]: time="2023-10-02T19:35:31.529840520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:cilium-ldfh7,Uid:c6a8154e-1e3e-4209-8ac4-e979c412eb94,Namespace:kube-system,Attempt:0,}" Oct 2 19:35:31.556533 env[1641]: time="2023-10-02T19:35:31.556270603Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:35:31.557706 env[1641]: time="2023-10-02T19:35:31.557652105Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:35:31.557841 env[1641]: time="2023-10-02T19:35:31.557813219Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:35:31.559815 env[1641]: time="2023-10-02T19:35:31.558414775Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/17b8604b6d1e189b2edcc637db6a4df582db82a8ba2993bf617eb616366c7b47 pid=3739 runtime=io.containerd.runc.v2 Oct 2 19:35:31.587721 systemd[1]: Started cri-containerd-17b8604b6d1e189b2edcc637db6a4df582db82a8ba2993bf617eb616366c7b47.scope. Oct 2 19:35:31.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.606000 audit: BPF prog-id=131 op=LOAD Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3739 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:31.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137623836303462366431653138396232656463633633376462366134 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3739 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:31.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137623836303462366431653138396232656463633633376462366134 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit: BPF prog-id=132 op=LOAD Oct 2 19:35:31.607000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00018de90 items=0 ppid=3739 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:31.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137623836303462366431653138396232656463633633376462366134 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit: BPF prog-id=133 op=LOAD Oct 2 19:35:31.607000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00018ded8 items=0 ppid=3739 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:31.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137623836303462366431653138396232656463633633376462366134 Oct 2 19:35:31.607000 audit: BPF prog-id=133 op=UNLOAD Oct 2 19:35:31.607000 audit: BPF prog-id=132 op=UNLOAD Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:31.607000 audit: BPF prog-id=134 op=LOAD Oct 2 19:35:31.607000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001ca2e8 items=0 ppid=3739 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:31.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137623836303462366431653138396232656463633633376462366134 Oct 2 19:35:31.627459 env[1641]: time="2023-10-02T19:35:31.627409722Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:cilium-ldfh7,Uid:c6a8154e-1e3e-4209-8ac4-e979c412eb94,Namespace:kube-system,Attempt:0,} returns sandbox id \"17b8604b6d1e189b2edcc637db6a4df582db82a8ba2993bf617eb616366c7b47\"" Oct 2 19:35:31.632063 env[1641]: time="2023-10-02T19:35:31.631492153Z" level=info msg="CreateContainer within sandbox \"17b8604b6d1e189b2edcc637db6a4df582db82a8ba2993bf617eb616366c7b47\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:0,}" Oct 2 19:35:31.650476 env[1641]: time="2023-10-02T19:35:31.650418696Z" level=info msg="CreateContainer within sandbox \"17b8604b6d1e189b2edcc637db6a4df582db82a8ba2993bf617eb616366c7b47\" for &ContainerMetadata{Name:mount-cgroup,Attempt:0,} returns container id \"b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e\"" Oct 2 19:35:31.654226 env[1641]: time="2023-10-02T19:35:31.651235865Z" level=info msg="StartContainer for \"b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e\"" Oct 2 19:35:31.680430 systemd[1]: Started cri-containerd-b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e.scope. Oct 2 19:35:31.706718 systemd[1]: cri-containerd-b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e.scope: Deactivated successfully. Oct 2 19:35:31.744089 env[1641]: time="2023-10-02T19:35:31.744035580Z" level=info msg="shim disconnected" id=b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e Oct 2 19:35:31.744089 env[1641]: time="2023-10-02T19:35:31.744088043Z" level=warning msg="cleaning up after shim disconnected" id=b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e namespace=k8s.io Oct 2 19:35:31.744089 env[1641]: time="2023-10-02T19:35:31.744100105Z" level=info msg="cleaning up dead shim" Oct 2 19:35:31.756750 env[1641]: time="2023-10-02T19:35:31.756699619Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:35:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3798 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:35:31Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:35:31.757134 env[1641]: time="2023-10-02T19:35:31.757067873Z" level=error msg="copy shim log" error="read /proc/self/fd/36: file already closed" Oct 2 19:35:31.757638 env[1641]: time="2023-10-02T19:35:31.757585992Z" level=error msg="Failed to pipe stdout of container \"b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e\"" error="reading from a closed fifo" Oct 2 19:35:31.757735 env[1641]: time="2023-10-02T19:35:31.757698329Z" level=error msg="Failed to pipe stderr of container \"b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e\"" error="reading from a closed fifo" Oct 2 19:35:31.760112 env[1641]: time="2023-10-02T19:35:31.760068815Z" level=error msg="StartContainer for \"b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:35:31.760434 kubelet[2744]: E1002 19:35:31.760408 2744 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e" Oct 2 19:35:31.760678 kubelet[2744]: E1002 19:35:31.760539 2744 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:35:31.760678 kubelet[2744]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:35:31.760678 kubelet[2744]: rm /hostbin/cilium-mount Oct 2 19:35:31.760678 kubelet[2744]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-f6hkv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-ldfh7_kube-system(c6a8154e-1e3e-4209-8ac4-e979c412eb94): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:35:31.760678 kubelet[2744]: E1002 19:35:31.760586 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-ldfh7" podUID="c6a8154e-1e3e-4209-8ac4-e979c412eb94" Oct 2 19:35:32.577984 env[1641]: time="2023-10-02T19:35:32.577918843Z" level=info msg="CreateContainer within sandbox \"17b8604b6d1e189b2edcc637db6a4df582db82a8ba2993bf617eb616366c7b47\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:1,}" Oct 2 19:35:32.611625 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount888752063.mount: Deactivated successfully. Oct 2 19:35:32.618251 env[1641]: time="2023-10-02T19:35:32.618135265Z" level=info msg="CreateContainer within sandbox \"17b8604b6d1e189b2edcc637db6a4df582db82a8ba2993bf617eb616366c7b47\" for &ContainerMetadata{Name:mount-cgroup,Attempt:1,} returns container id \"83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e\"" Oct 2 19:35:32.619693 env[1641]: time="2023-10-02T19:35:32.619656747Z" level=info msg="StartContainer for \"83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e\"" Oct 2 19:35:32.680014 systemd[1]: Started cri-containerd-83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e.scope. Oct 2 19:35:32.701203 systemd[1]: cri-containerd-83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e.scope: Deactivated successfully. Oct 2 19:35:32.720644 env[1641]: time="2023-10-02T19:35:32.720582664Z" level=info msg="shim disconnected" id=83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e Oct 2 19:35:32.720644 env[1641]: time="2023-10-02T19:35:32.720642623Z" level=warning msg="cleaning up after shim disconnected" id=83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e namespace=k8s.io Oct 2 19:35:32.721090 env[1641]: time="2023-10-02T19:35:32.720655672Z" level=info msg="cleaning up dead shim" Oct 2 19:35:32.732455 env[1641]: time="2023-10-02T19:35:32.732329012Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:35:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3834 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:35:32Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:35:32.732739 env[1641]: time="2023-10-02T19:35:32.732683524Z" level=error msg="copy shim log" error="read /proc/self/fd/36: file already closed" Oct 2 19:35:32.732956 env[1641]: time="2023-10-02T19:35:32.732922400Z" level=error msg="Failed to pipe stdout of container \"83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e\"" error="reading from a closed fifo" Oct 2 19:35:32.733300 env[1641]: time="2023-10-02T19:35:32.733254011Z" level=error msg="Failed to pipe stderr of container \"83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e\"" error="reading from a closed fifo" Oct 2 19:35:32.735885 env[1641]: time="2023-10-02T19:35:32.735836961Z" level=error msg="StartContainer for \"83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:35:32.736167 kubelet[2744]: E1002 19:35:32.736142 2744 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e" Oct 2 19:35:32.736677 kubelet[2744]: E1002 19:35:32.736322 2744 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:35:32.736677 kubelet[2744]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:35:32.736677 kubelet[2744]: rm /hostbin/cilium-mount Oct 2 19:35:32.736677 kubelet[2744]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-f6hkv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-ldfh7_kube-system(c6a8154e-1e3e-4209-8ac4-e979c412eb94): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:35:32.736677 kubelet[2744]: E1002 19:35:32.736376 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-ldfh7" podUID="c6a8154e-1e3e-4209-8ac4-e979c412eb94" Oct 2 19:35:33.460050 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e-rootfs.mount: Deactivated successfully. Oct 2 19:35:33.577216 kubelet[2744]: I1002 19:35:33.577189 2744 scope.go:117] "RemoveContainer" containerID="b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e" Oct 2 19:35:33.577653 kubelet[2744]: I1002 19:35:33.577629 2744 scope.go:117] "RemoveContainer" containerID="b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e" Oct 2 19:35:33.580059 env[1641]: time="2023-10-02T19:35:33.579707338Z" level=info msg="RemoveContainer for \"b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e\"" Oct 2 19:35:33.580701 env[1641]: time="2023-10-02T19:35:33.580672360Z" level=info msg="RemoveContainer for \"b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e\"" Oct 2 19:35:33.580901 env[1641]: time="2023-10-02T19:35:33.580861080Z" level=error msg="RemoveContainer for \"b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e\" failed" error="failed to set removing state for container \"b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e\": container is already in removing state" Oct 2 19:35:33.581323 kubelet[2744]: E1002 19:35:33.581301 2744 remote_runtime.go:385] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e\": container is already in removing state" containerID="b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e" Oct 2 19:35:33.581463 kubelet[2744]: E1002 19:35:33.581342 2744 kuberuntime_container.go:820] failed to remove pod init container "mount-cgroup": rpc error: code = Unknown desc = failed to set removing state for container "b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e": container is already in removing state; Skipping pod "cilium-ldfh7_kube-system(c6a8154e-1e3e-4209-8ac4-e979c412eb94)" Oct 2 19:35:33.581704 kubelet[2744]: E1002 19:35:33.581687 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 10s restarting failed container=mount-cgroup pod=cilium-ldfh7_kube-system(c6a8154e-1e3e-4209-8ac4-e979c412eb94)\"" pod="kube-system/cilium-ldfh7" podUID="c6a8154e-1e3e-4209-8ac4-e979c412eb94" Oct 2 19:35:33.587299 env[1641]: time="2023-10-02T19:35:33.587245624Z" level=info msg="RemoveContainer for \"b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e\" returns successfully" Oct 2 19:35:34.849591 kubelet[2744]: W1002 19:35:34.849551 2744 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-podc6a8154e_1e3e_4209_8ac4_e979c412eb94.slice/cri-containerd-b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e.scope WatchSource:0}: container "b5b90be57c444ab60e7babf02bd3d8acba07a23f5b89dc60775adf426267a58e" in namespace "k8s.io": not found Oct 2 19:35:36.117245 kubelet[2744]: E1002 19:35:36.117214 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:35:37.957576 kubelet[2744]: W1002 19:35:37.957534 2744 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-podc6a8154e_1e3e_4209_8ac4_e979c412eb94.slice/cri-containerd-83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e.scope WatchSource:0}: task 83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e not found: not found Oct 2 19:35:41.118246 kubelet[2744]: E1002 19:35:41.118179 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:35:43.922688 amazon-ssm-agent[1618]: 2023-10-02 19:35:43 INFO Backing off health check to every 600 seconds for 1800 seconds. Oct 2 19:35:44.023200 amazon-ssm-agent[1618]: 2023-10-02 19:35:43 ERROR Health ping failed with error - AccessDeniedException: User: arn:aws:sts::075585003325:assumed-role/jenkins-test/i-0fdabe0a2e35a3734 is not authorized to perform: ssm:UpdateInstanceInformation on resource: arn:aws:ec2:us-west-2:075585003325:instance/i-0fdabe0a2e35a3734 because no identity-based policy allows the ssm:UpdateInstanceInformation action Oct 2 19:35:44.023200 amazon-ssm-agent[1618]: status code: 400, request id: a2b026e1-fa8f-4b8f-bb47-0697177e1f25 Oct 2 19:35:44.146341 update_engine[1633]: I1002 19:35:44.146090 1633 prefs.cc:51] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Oct 2 19:35:44.146757 update_engine[1633]: I1002 19:35:44.146356 1633 prefs.cc:51] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Oct 2 19:35:44.148205 update_engine[1633]: I1002 19:35:44.148175 1633 prefs.cc:51] aleph-version not present in /var/lib/update_engine/prefs Oct 2 19:35:44.148714 update_engine[1633]: I1002 19:35:44.148689 1633 omaha_request_params.cc:62] Current group set to lts Oct 2 19:35:44.151668 update_engine[1633]: I1002 19:35:44.151389 1633 update_attempter.cc:495] Already updated boot flags. Skipping. Oct 2 19:35:44.151668 update_engine[1633]: I1002 19:35:44.151408 1633 update_attempter.cc:638] Scheduling an action processor start. Oct 2 19:35:44.151668 update_engine[1633]: I1002 19:35:44.151430 1633 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Oct 2 19:35:44.151668 update_engine[1633]: I1002 19:35:44.151470 1633 prefs.cc:51] previous-version not present in /var/lib/update_engine/prefs Oct 2 19:35:44.151668 update_engine[1633]: I1002 19:35:44.151556 1633 omaha_request_action.cc:268] Posting an Omaha request to https://public.update.flatcar-linux.net/v1/update/ Oct 2 19:35:44.151668 update_engine[1633]: I1002 19:35:44.151561 1633 omaha_request_action.cc:269] Request: Oct 2 19:35:44.151668 update_engine[1633]: Oct 2 19:35:44.151668 update_engine[1633]: Oct 2 19:35:44.151668 update_engine[1633]: Oct 2 19:35:44.151668 update_engine[1633]: Oct 2 19:35:44.151668 update_engine[1633]: Oct 2 19:35:44.151668 update_engine[1633]: Oct 2 19:35:44.151668 update_engine[1633]: Oct 2 19:35:44.151668 update_engine[1633]: Oct 2 19:35:44.151668 update_engine[1633]: I1002 19:35:44.151568 1633 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Oct 2 19:35:44.164466 update_engine[1633]: I1002 19:35:44.164429 1633 libcurl_http_fetcher.cc:174] Setting up curl options for HTTPS Oct 2 19:35:44.164671 update_engine[1633]: I1002 19:35:44.164650 1633 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Oct 2 19:35:44.172226 locksmithd[1696]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Oct 2 19:35:45.376501 update_engine[1633]: I1002 19:35:45.376451 1633 prefs.cc:51] update-server-cert-0-2 not present in /var/lib/update_engine/prefs Oct 2 19:35:45.376958 update_engine[1633]: I1002 19:35:45.376719 1633 prefs.cc:51] update-server-cert-0-1 not present in /var/lib/update_engine/prefs Oct 2 19:35:45.376958 update_engine[1633]: I1002 19:35:45.376883 1633 prefs.cc:51] update-server-cert-0-0 not present in /var/lib/update_engine/prefs Oct 2 19:35:45.695110 update_engine[1633]: I1002 19:35:45.695072 1633 libcurl_http_fetcher.cc:263] HTTP response code: 200 Oct 2 19:35:45.696629 update_engine[1633]: I1002 19:35:45.696588 1633 libcurl_http_fetcher.cc:320] Transfer completed (200), 314 bytes downloaded Oct 2 19:35:45.696629 update_engine[1633]: I1002 19:35:45.696615 1633 omaha_request_action.cc:619] Omaha request response: Oct 2 19:35:45.696629 update_engine[1633]: Oct 2 19:35:45.708647 update_engine[1633]: I1002 19:35:45.708607 1633 omaha_request_action.cc:409] No update. Oct 2 19:35:45.708647 update_engine[1633]: I1002 19:35:45.708644 1633 action_processor.cc:82] ActionProcessor::ActionComplete: finished OmahaRequestAction, starting OmahaResponseHandlerAction Oct 2 19:35:45.708647 update_engine[1633]: I1002 19:35:45.708650 1633 omaha_response_handler_action.cc:36] There are no updates. Aborting. Oct 2 19:35:45.708647 update_engine[1633]: I1002 19:35:45.708655 1633 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaResponseHandlerAction action failed. Aborting processing. Oct 2 19:35:45.708647 update_engine[1633]: I1002 19:35:45.708659 1633 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaResponseHandlerAction Oct 2 19:35:45.708647 update_engine[1633]: I1002 19:35:45.708664 1633 update_attempter.cc:302] Processing Done. Oct 2 19:35:45.708959 update_engine[1633]: I1002 19:35:45.708683 1633 update_attempter.cc:338] No update. Oct 2 19:35:45.708959 update_engine[1633]: I1002 19:35:45.708698 1633 update_check_scheduler.cc:74] Next update check in 47m38s Oct 2 19:35:45.710011 locksmithd[1696]: LastCheckedTime=1696275345 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Oct 2 19:35:45.893312 env[1641]: time="2023-10-02T19:35:45.889063479Z" level=info msg="CreateContainer within sandbox \"17b8604b6d1e189b2edcc637db6a4df582db82a8ba2993bf617eb616366c7b47\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:2,}" Oct 2 19:35:45.915471 env[1641]: time="2023-10-02T19:35:45.915423967Z" level=info msg="CreateContainer within sandbox \"17b8604b6d1e189b2edcc637db6a4df582db82a8ba2993bf617eb616366c7b47\" for &ContainerMetadata{Name:mount-cgroup,Attempt:2,} returns container id \"28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22\"" Oct 2 19:35:45.917377 env[1641]: time="2023-10-02T19:35:45.917311924Z" level=info msg="StartContainer for \"28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22\"" Oct 2 19:35:45.997432 systemd[1]: Started cri-containerd-28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22.scope. Oct 2 19:35:46.012489 systemd[1]: cri-containerd-28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22.scope: Deactivated successfully. Oct 2 19:35:46.023114 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22-rootfs.mount: Deactivated successfully. Oct 2 19:35:46.041646 env[1641]: time="2023-10-02T19:35:46.041028474Z" level=info msg="shim disconnected" id=28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22 Oct 2 19:35:46.041646 env[1641]: time="2023-10-02T19:35:46.041075333Z" level=warning msg="cleaning up after shim disconnected" id=28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22 namespace=k8s.io Oct 2 19:35:46.041646 env[1641]: time="2023-10-02T19:35:46.041084581Z" level=info msg="cleaning up dead shim" Oct 2 19:35:46.057211 env[1641]: time="2023-10-02T19:35:46.057144819Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:35:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3876 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:35:46Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:35:46.057761 env[1641]: time="2023-10-02T19:35:46.057638975Z" level=error msg="copy shim log" error="read /proc/self/fd/36: file already closed" Oct 2 19:35:46.058121 env[1641]: time="2023-10-02T19:35:46.058072515Z" level=error msg="Failed to pipe stdout of container \"28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22\"" error="reading from a closed fifo" Oct 2 19:35:46.059110 env[1641]: time="2023-10-02T19:35:46.059064426Z" level=error msg="Failed to pipe stderr of container \"28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22\"" error="reading from a closed fifo" Oct 2 19:35:46.061272 env[1641]: time="2023-10-02T19:35:46.061227736Z" level=error msg="StartContainer for \"28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:35:46.061578 kubelet[2744]: E1002 19:35:46.061551 2744 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22" Oct 2 19:35:46.062273 kubelet[2744]: E1002 19:35:46.061750 2744 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:35:46.062273 kubelet[2744]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:35:46.062273 kubelet[2744]: rm /hostbin/cilium-mount Oct 2 19:35:46.062273 kubelet[2744]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-f6hkv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-ldfh7_kube-system(c6a8154e-1e3e-4209-8ac4-e979c412eb94): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:35:46.062273 kubelet[2744]: E1002 19:35:46.061809 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-ldfh7" podUID="c6a8154e-1e3e-4209-8ac4-e979c412eb94" Oct 2 19:35:46.119636 kubelet[2744]: E1002 19:35:46.119595 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:35:46.611185 kubelet[2744]: I1002 19:35:46.611154 2744 scope.go:117] "RemoveContainer" containerID="83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e" Oct 2 19:35:46.611704 kubelet[2744]: I1002 19:35:46.611682 2744 scope.go:117] "RemoveContainer" containerID="83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e" Oct 2 19:35:46.614009 env[1641]: time="2023-10-02T19:35:46.613950166Z" level=info msg="RemoveContainer for \"83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e\"" Oct 2 19:35:46.614457 env[1641]: time="2023-10-02T19:35:46.614426436Z" level=info msg="RemoveContainer for \"83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e\"" Oct 2 19:35:46.615059 env[1641]: time="2023-10-02T19:35:46.614645809Z" level=error msg="RemoveContainer for \"83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e\" failed" error="failed to set removing state for container \"83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e\": container is already in removing state" Oct 2 19:35:46.615152 kubelet[2744]: E1002 19:35:46.614824 2744 remote_runtime.go:385] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e\": container is already in removing state" containerID="83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e" Oct 2 19:35:46.615152 kubelet[2744]: E1002 19:35:46.614858 2744 kuberuntime_container.go:820] failed to remove pod init container "mount-cgroup": rpc error: code = Unknown desc = failed to set removing state for container "83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e": container is already in removing state; Skipping pod "cilium-ldfh7_kube-system(c6a8154e-1e3e-4209-8ac4-e979c412eb94)" Oct 2 19:35:46.615330 kubelet[2744]: E1002 19:35:46.615303 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 20s restarting failed container=mount-cgroup pod=cilium-ldfh7_kube-system(c6a8154e-1e3e-4209-8ac4-e979c412eb94)\"" pod="kube-system/cilium-ldfh7" podUID="c6a8154e-1e3e-4209-8ac4-e979c412eb94" Oct 2 19:35:46.624616 env[1641]: time="2023-10-02T19:35:46.624564976Z" level=info msg="RemoveContainer for \"83ad7ed9feb429a64aae97dd09afad5ee4ce95d0b234f2959811f36286f13b7e\" returns successfully" Oct 2 19:35:49.149171 kubelet[2744]: W1002 19:35:49.149130 2744 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-podc6a8154e_1e3e_4209_8ac4_e979c412eb94.slice/cri-containerd-28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22.scope WatchSource:0}: task 28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22 not found: not found Oct 2 19:35:51.121069 kubelet[2744]: E1002 19:35:51.121043 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:35:56.122652 kubelet[2744]: E1002 19:35:56.122621 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:35:58.881232 kubelet[2744]: E1002 19:35:58.881195 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 20s restarting failed container=mount-cgroup pod=cilium-ldfh7_kube-system(c6a8154e-1e3e-4209-8ac4-e979c412eb94)\"" pod="kube-system/cilium-ldfh7" podUID="c6a8154e-1e3e-4209-8ac4-e979c412eb94" Oct 2 19:36:01.124459 kubelet[2744]: E1002 19:36:01.124424 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:36:06.125703 kubelet[2744]: E1002 19:36:06.125642 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:36:09.882613 env[1641]: time="2023-10-02T19:36:09.882568930Z" level=info msg="CreateContainer within sandbox \"17b8604b6d1e189b2edcc637db6a4df582db82a8ba2993bf617eb616366c7b47\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:3,}" Oct 2 19:36:09.902621 env[1641]: time="2023-10-02T19:36:09.902562311Z" level=info msg="CreateContainer within sandbox \"17b8604b6d1e189b2edcc637db6a4df582db82a8ba2993bf617eb616366c7b47\" for &ContainerMetadata{Name:mount-cgroup,Attempt:3,} returns container id \"2d3c7e0cf7770db1168cec4463d3032792d9f44d42facf2ba1e743fb9ab8c849\"" Oct 2 19:36:09.903661 env[1641]: time="2023-10-02T19:36:09.903625706Z" level=info msg="StartContainer for \"2d3c7e0cf7770db1168cec4463d3032792d9f44d42facf2ba1e743fb9ab8c849\"" Oct 2 19:36:09.935199 systemd[1]: Started cri-containerd-2d3c7e0cf7770db1168cec4463d3032792d9f44d42facf2ba1e743fb9ab8c849.scope. Oct 2 19:36:09.956080 systemd[1]: cri-containerd-2d3c7e0cf7770db1168cec4463d3032792d9f44d42facf2ba1e743fb9ab8c849.scope: Deactivated successfully. Oct 2 19:36:09.962773 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2d3c7e0cf7770db1168cec4463d3032792d9f44d42facf2ba1e743fb9ab8c849-rootfs.mount: Deactivated successfully. Oct 2 19:36:09.978374 env[1641]: time="2023-10-02T19:36:09.978309469Z" level=info msg="shim disconnected" id=2d3c7e0cf7770db1168cec4463d3032792d9f44d42facf2ba1e743fb9ab8c849 Oct 2 19:36:09.978374 env[1641]: time="2023-10-02T19:36:09.978371251Z" level=warning msg="cleaning up after shim disconnected" id=2d3c7e0cf7770db1168cec4463d3032792d9f44d42facf2ba1e743fb9ab8c849 namespace=k8s.io Oct 2 19:36:09.978374 env[1641]: time="2023-10-02T19:36:09.978383040Z" level=info msg="cleaning up dead shim" Oct 2 19:36:09.990743 env[1641]: time="2023-10-02T19:36:09.990677711Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:36:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3911 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:36:09Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/2d3c7e0cf7770db1168cec4463d3032792d9f44d42facf2ba1e743fb9ab8c849/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:36:09.991136 env[1641]: time="2023-10-02T19:36:09.991070909Z" level=error msg="copy shim log" error="read /proc/self/fd/36: file already closed" Oct 2 19:36:09.992115 env[1641]: time="2023-10-02T19:36:09.992061572Z" level=error msg="Failed to pipe stderr of container \"2d3c7e0cf7770db1168cec4463d3032792d9f44d42facf2ba1e743fb9ab8c849\"" error="reading from a closed fifo" Oct 2 19:36:09.993149 env[1641]: time="2023-10-02T19:36:09.993102766Z" level=error msg="Failed to pipe stdout of container \"2d3c7e0cf7770db1168cec4463d3032792d9f44d42facf2ba1e743fb9ab8c849\"" error="reading from a closed fifo" Oct 2 19:36:09.995356 env[1641]: time="2023-10-02T19:36:09.995200777Z" level=error msg="StartContainer for \"2d3c7e0cf7770db1168cec4463d3032792d9f44d42facf2ba1e743fb9ab8c849\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:36:09.995744 kubelet[2744]: E1002 19:36:09.995703 2744 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="2d3c7e0cf7770db1168cec4463d3032792d9f44d42facf2ba1e743fb9ab8c849" Oct 2 19:36:09.996195 kubelet[2744]: E1002 19:36:09.995889 2744 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:36:09.996195 kubelet[2744]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:36:09.996195 kubelet[2744]: rm /hostbin/cilium-mount Oct 2 19:36:09.996195 kubelet[2744]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-f6hkv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-ldfh7_kube-system(c6a8154e-1e3e-4209-8ac4-e979c412eb94): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:36:09.996195 kubelet[2744]: E1002 19:36:09.995960 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-ldfh7" podUID="c6a8154e-1e3e-4209-8ac4-e979c412eb94" Oct 2 19:36:10.677781 kubelet[2744]: I1002 19:36:10.676794 2744 scope.go:117] "RemoveContainer" containerID="28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22" Oct 2 19:36:10.677781 kubelet[2744]: I1002 19:36:10.677502 2744 scope.go:117] "RemoveContainer" containerID="28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22" Oct 2 19:36:10.678437 env[1641]: time="2023-10-02T19:36:10.678392099Z" level=info msg="RemoveContainer for \"28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22\"" Oct 2 19:36:10.679221 env[1641]: time="2023-10-02T19:36:10.679194789Z" level=info msg="RemoveContainer for \"28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22\"" Oct 2 19:36:10.679324 env[1641]: time="2023-10-02T19:36:10.679289330Z" level=error msg="RemoveContainer for \"28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22\" failed" error="failed to set removing state for container \"28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22\": container is already in removing state" Oct 2 19:36:10.679561 kubelet[2744]: E1002 19:36:10.679541 2744 remote_runtime.go:385] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22\": container is already in removing state" containerID="28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22" Oct 2 19:36:10.679654 kubelet[2744]: E1002 19:36:10.679581 2744 kuberuntime_container.go:820] failed to remove pod init container "mount-cgroup": rpc error: code = Unknown desc = failed to set removing state for container "28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22": container is already in removing state; Skipping pod "cilium-ldfh7_kube-system(c6a8154e-1e3e-4209-8ac4-e979c412eb94)" Oct 2 19:36:10.679961 kubelet[2744]: E1002 19:36:10.679946 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 40s restarting failed container=mount-cgroup pod=cilium-ldfh7_kube-system(c6a8154e-1e3e-4209-8ac4-e979c412eb94)\"" pod="kube-system/cilium-ldfh7" podUID="c6a8154e-1e3e-4209-8ac4-e979c412eb94" Oct 2 19:36:10.686870 env[1641]: time="2023-10-02T19:36:10.686822495Z" level=info msg="RemoveContainer for \"28ca02830e1eac6cff5a3d3a61ea06f74c78103b9d6983e393c22ec2f14fda22\" returns successfully" Oct 2 19:36:11.126703 kubelet[2744]: E1002 19:36:11.126673 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:36:13.090705 kubelet[2744]: W1002 19:36:13.090653 2744 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-podc6a8154e_1e3e_4209_8ac4_e979c412eb94.slice/cri-containerd-2d3c7e0cf7770db1168cec4463d3032792d9f44d42facf2ba1e743fb9ab8c849.scope WatchSource:0}: task 2d3c7e0cf7770db1168cec4463d3032792d9f44d42facf2ba1e743fb9ab8c849 not found: not found Oct 2 19:36:16.128240 kubelet[2744]: E1002 19:36:16.128205 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:36:21.129347 kubelet[2744]: E1002 19:36:21.129313 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:36:23.881331 kubelet[2744]: E1002 19:36:23.881297 2744 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 40s restarting failed container=mount-cgroup pod=cilium-ldfh7_kube-system(c6a8154e-1e3e-4209-8ac4-e979c412eb94)\"" pod="kube-system/cilium-ldfh7" podUID="c6a8154e-1e3e-4209-8ac4-e979c412eb94" Oct 2 19:36:24.924000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:24.926632 kernel: kauditd_printk_skb: 58 callbacks suppressed Oct 2 19:36:24.926744 kernel: audit: type=1400 audit(1696275384.924:1390): avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:24.924000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025ac460 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:36:24.954166 kernel: audit: type=1300 audit(1696275384.924:1390): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025ac460 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:36:24.954318 kernel: audit: type=1327 audit(1696275384.924:1390): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:36:24.924000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:36:24.926000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:24.970334 kernel: audit: type=1400 audit(1696275384.926:1391): avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:24.970488 kernel: audit: type=1300 audit(1696275384.926:1391): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e50c90 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:36:24.926000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e50c90 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:36:24.926000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:36:24.986636 kernel: audit: type=1327 audit(1696275384.926:1391): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:36:26.130779 kubelet[2744]: E1002 19:36:26.130745 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:36:26.333000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:26.333000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:26.346861 kernel: audit: type=1400 audit(1696275386.333:1392): avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:26.347067 kernel: audit: type=1400 audit(1696275386.333:1393): avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:26.347115 kernel: audit: type=1300 audit(1696275386.333:1393): arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c00b085500 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:36:26.333000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c00b085500 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:36:26.333000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:36:26.372129 kernel: audit: type=1327 audit(1696275386.333:1393): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:36:26.333000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c00337bc50 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:36:26.333000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:36:26.333000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:26.333000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c0084e4c90 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:36:26.333000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:36:26.351000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:26.351000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c005f503c0 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:36:26.351000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:36:26.364000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:26.364000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c0084e4d50 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:36:26.364000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:36:26.364000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:26.364000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c00b085540 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:36:26.364000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:36:28.687000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:28.687000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025acf40 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:36:28.687000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:36:28.689000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:28.689000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002813640 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:36:28.689000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:36:28.691000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:28.691000 audit[2500]: AVC avc: denied { watch } for pid=2500 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:28.691000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0025ad160 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:36:28.691000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:36:28.691000 audit[2500]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002813660 a2=fc6 a3=0 items=0 ppid=2343 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:36:28.691000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:36:31.133256 kubelet[2744]: E1002 19:36:31.133211 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:36:32.876505 env[1641]: time="2023-10-02T19:36:32.876438176Z" level=info msg="StopPodSandbox for \"17b8604b6d1e189b2edcc637db6a4df582db82a8ba2993bf617eb616366c7b47\"" Oct 2 19:36:32.877038 env[1641]: time="2023-10-02T19:36:32.876555360Z" level=info msg="Container to stop \"2d3c7e0cf7770db1168cec4463d3032792d9f44d42facf2ba1e743fb9ab8c849\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Oct 2 19:36:32.879006 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-17b8604b6d1e189b2edcc637db6a4df582db82a8ba2993bf617eb616366c7b47-shm.mount: Deactivated successfully. Oct 2 19:36:32.910945 systemd[1]: cri-containerd-17b8604b6d1e189b2edcc637db6a4df582db82a8ba2993bf617eb616366c7b47.scope: Deactivated successfully. Oct 2 19:36:32.910000 audit: BPF prog-id=131 op=UNLOAD Oct 2 19:36:32.914278 kernel: kauditd_printk_skb: 26 callbacks suppressed Oct 2 19:36:32.914461 kernel: audit: type=1334 audit(1696275392.910:1402): prog-id=131 op=UNLOAD Oct 2 19:36:32.918000 audit: BPF prog-id=134 op=UNLOAD Oct 2 19:36:32.922073 kernel: audit: type=1334 audit(1696275392.918:1403): prog-id=134 op=UNLOAD Oct 2 19:36:32.979362 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-17b8604b6d1e189b2edcc637db6a4df582db82a8ba2993bf617eb616366c7b47-rootfs.mount: Deactivated successfully. Oct 2 19:36:33.012931 env[1641]: time="2023-10-02T19:36:33.012881320Z" level=info msg="shim disconnected" id=17b8604b6d1e189b2edcc637db6a4df582db82a8ba2993bf617eb616366c7b47 Oct 2 19:36:33.013417 env[1641]: time="2023-10-02T19:36:33.013358775Z" level=warning msg="cleaning up after shim disconnected" id=17b8604b6d1e189b2edcc637db6a4df582db82a8ba2993bf617eb616366c7b47 namespace=k8s.io Oct 2 19:36:33.013627 env[1641]: time="2023-10-02T19:36:33.013381107Z" level=info msg="cleaning up dead shim" Oct 2 19:36:33.021216 sshd[3718]: pam_unix(sshd:session): session closed for user core Oct 2 19:36:33.022000 audit[3718]: USER_END pid=3718 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:36:33.040159 kernel: audit: type=1106 audit(1696275393.022:1404): pid=3718 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:36:33.040298 kernel: audit: type=1104 audit(1696275393.028:1405): pid=3718 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:36:33.028000 audit[3718]: CRED_DISP pid=3718 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:36:33.033087 systemd[1]: sshd@29-172.31.22.61:22-139.178.89.65:47364.service: Deactivated successfully. Oct 2 19:36:33.035401 systemd[1]: session-30.scope: Deactivated successfully. Oct 2 19:36:33.037904 systemd-logind[1632]: Session 30 logged out. Waiting for processes to exit. Oct 2 19:36:33.041655 kernel: audit: type=1131 audit(1696275393.032:1406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.22.61:22-139.178.89.65:47364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:33.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.22.61:22-139.178.89.65:47364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:33.039462 systemd-logind[1632]: Removed session 30. Oct 2 19:36:33.048089 env[1641]: time="2023-10-02T19:36:33.048021668Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:36:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3946 runtime=io.containerd.runc.v2\n" Oct 2 19:36:33.048629 env[1641]: time="2023-10-02T19:36:33.048561697Z" level=info msg="TearDown network for sandbox \"17b8604b6d1e189b2edcc637db6a4df582db82a8ba2993bf617eb616366c7b47\" successfully" Oct 2 19:36:33.048629 env[1641]: time="2023-10-02T19:36:33.048607099Z" level=info msg="StopPodSandbox for \"17b8604b6d1e189b2edcc637db6a4df582db82a8ba2993bf617eb616366c7b47\" returns successfully" Oct 2 19:36:33.142715 kubelet[2744]: I1002 19:36:33.142583 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-lib-modules\") pod \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " Oct 2 19:36:33.142715 kubelet[2744]: I1002 19:36:33.142633 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-xtables-lock\") pod \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " Oct 2 19:36:33.142715 kubelet[2744]: I1002 19:36:33.142658 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"bpf-maps\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-bpf-maps\") pod \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " Oct 2 19:36:33.142715 kubelet[2744]: I1002 19:36:33.142683 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"host-proc-sys-net\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-host-proc-sys-net\") pod \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " Oct 2 19:36:33.143941 kubelet[2744]: I1002 19:36:33.143805 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "c6a8154e-1e3e-4209-8ac4-e979c412eb94" (UID: "c6a8154e-1e3e-4209-8ac4-e979c412eb94"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:36:33.143941 kubelet[2744]: I1002 19:36:33.143882 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "c6a8154e-1e3e-4209-8ac4-e979c412eb94" (UID: "c6a8154e-1e3e-4209-8ac4-e979c412eb94"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:36:33.143941 kubelet[2744]: I1002 19:36:33.143922 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-bpf-maps" (OuterVolumeSpecName: "bpf-maps") pod "c6a8154e-1e3e-4209-8ac4-e979c412eb94" (UID: "c6a8154e-1e3e-4209-8ac4-e979c412eb94"). InnerVolumeSpecName "bpf-maps". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:36:33.144314 kubelet[2744]: I1002 19:36:33.144272 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-host-proc-sys-net" (OuterVolumeSpecName: "host-proc-sys-net") pod "c6a8154e-1e3e-4209-8ac4-e979c412eb94" (UID: "c6a8154e-1e3e-4209-8ac4-e979c412eb94"). InnerVolumeSpecName "host-proc-sys-net". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:36:33.144398 kubelet[2744]: I1002 19:36:33.144382 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"hubble-tls\" (UniqueName: \"kubernetes.io/projected/c6a8154e-1e3e-4209-8ac4-e979c412eb94-hubble-tls\") pod \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " Oct 2 19:36:33.146579 kubelet[2744]: I1002 19:36:33.145056 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-cgroup\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-cilium-cgroup\") pod \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " Oct 2 19:36:33.146579 kubelet[2744]: I1002 19:36:33.145129 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"etc-cni-netd\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-etc-cni-netd\") pod \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " Oct 2 19:36:33.146579 kubelet[2744]: I1002 19:36:33.145498 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"clustermesh-secrets\" (UniqueName: \"kubernetes.io/secret/c6a8154e-1e3e-4209-8ac4-e979c412eb94-clustermesh-secrets\") pod \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " Oct 2 19:36:33.146579 kubelet[2744]: I1002 19:36:33.145532 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-path\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-cni-path\") pod \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " Oct 2 19:36:33.146579 kubelet[2744]: I1002 19:36:33.145570 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-ipsec-secrets\" (UniqueName: \"kubernetes.io/secret/c6a8154e-1e3e-4209-8ac4-e979c412eb94-cilium-ipsec-secrets\") pod \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " Oct 2 19:36:33.146579 kubelet[2744]: I1002 19:36:33.145599 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-run\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-cilium-run\") pod \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " Oct 2 19:36:33.146579 kubelet[2744]: I1002 19:36:33.145629 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/c6a8154e-1e3e-4209-8ac4-e979c412eb94-cilium-config-path\") pod \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " Oct 2 19:36:33.146579 kubelet[2744]: I1002 19:36:33.145657 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"hostproc\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-hostproc\") pod \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " Oct 2 19:36:33.146579 kubelet[2744]: I1002 19:36:33.145687 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-f6hkv\" (UniqueName: \"kubernetes.io/projected/c6a8154e-1e3e-4209-8ac4-e979c412eb94-kube-api-access-f6hkv\") pod \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " Oct 2 19:36:33.146579 kubelet[2744]: I1002 19:36:33.145713 2744 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"host-proc-sys-kernel\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-host-proc-sys-kernel\") pod \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\" (UID: \"c6a8154e-1e3e-4209-8ac4-e979c412eb94\") " Oct 2 19:36:33.146579 kubelet[2744]: I1002 19:36:33.145760 2744 reconciler_common.go:300] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-lib-modules\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:36:33.146579 kubelet[2744]: I1002 19:36:33.145777 2744 reconciler_common.go:300] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-xtables-lock\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:36:33.146579 kubelet[2744]: I1002 19:36:33.145793 2744 reconciler_common.go:300] "Volume detached for volume \"bpf-maps\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-bpf-maps\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:36:33.146579 kubelet[2744]: I1002 19:36:33.145810 2744 reconciler_common.go:300] "Volume detached for volume \"host-proc-sys-net\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-host-proc-sys-net\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:36:33.146579 kubelet[2744]: I1002 19:36:33.145839 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-host-proc-sys-kernel" (OuterVolumeSpecName: "host-proc-sys-kernel") pod "c6a8154e-1e3e-4209-8ac4-e979c412eb94" (UID: "c6a8154e-1e3e-4209-8ac4-e979c412eb94"). InnerVolumeSpecName "host-proc-sys-kernel". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:36:33.146579 kubelet[2744]: I1002 19:36:33.145872 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-cilium-cgroup" (OuterVolumeSpecName: "cilium-cgroup") pod "c6a8154e-1e3e-4209-8ac4-e979c412eb94" (UID: "c6a8154e-1e3e-4209-8ac4-e979c412eb94"). InnerVolumeSpecName "cilium-cgroup". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:36:33.146579 kubelet[2744]: I1002 19:36:33.145897 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-etc-cni-netd" (OuterVolumeSpecName: "etc-cni-netd") pod "c6a8154e-1e3e-4209-8ac4-e979c412eb94" (UID: "c6a8154e-1e3e-4209-8ac4-e979c412eb94"). InnerVolumeSpecName "etc-cni-netd". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:36:33.148012 kubelet[2744]: I1002 19:36:33.146454 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-cni-path" (OuterVolumeSpecName: "cni-path") pod "c6a8154e-1e3e-4209-8ac4-e979c412eb94" (UID: "c6a8154e-1e3e-4209-8ac4-e979c412eb94"). InnerVolumeSpecName "cni-path". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:36:33.149013 kubelet[2744]: I1002 19:36:33.148968 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-cilium-run" (OuterVolumeSpecName: "cilium-run") pod "c6a8154e-1e3e-4209-8ac4-e979c412eb94" (UID: "c6a8154e-1e3e-4209-8ac4-e979c412eb94"). InnerVolumeSpecName "cilium-run". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:36:33.155503 systemd[1]: var-lib-kubelet-pods-c6a8154e\x2d1e3e\x2d4209\x2d8ac4\x2de979c412eb94-volumes-kubernetes.io\x7eprojected-hubble\x2dtls.mount: Deactivated successfully. Oct 2 19:36:33.159854 kubelet[2744]: I1002 19:36:33.158570 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/c6a8154e-1e3e-4209-8ac4-e979c412eb94-hubble-tls" (OuterVolumeSpecName: "hubble-tls") pod "c6a8154e-1e3e-4209-8ac4-e979c412eb94" (UID: "c6a8154e-1e3e-4209-8ac4-e979c412eb94"). InnerVolumeSpecName "hubble-tls". PluginName "kubernetes.io/projected", VolumeGidValue "" Oct 2 19:36:33.159854 kubelet[2744]: I1002 19:36:33.158631 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-hostproc" (OuterVolumeSpecName: "hostproc") pod "c6a8154e-1e3e-4209-8ac4-e979c412eb94" (UID: "c6a8154e-1e3e-4209-8ac4-e979c412eb94"). InnerVolumeSpecName "hostproc". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:36:33.161127 kubelet[2744]: I1002 19:36:33.161090 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/c6a8154e-1e3e-4209-8ac4-e979c412eb94-cilium-config-path" (OuterVolumeSpecName: "cilium-config-path") pod "c6a8154e-1e3e-4209-8ac4-e979c412eb94" (UID: "c6a8154e-1e3e-4209-8ac4-e979c412eb94"). InnerVolumeSpecName "cilium-config-path". PluginName "kubernetes.io/configmap", VolumeGidValue "" Oct 2 19:36:33.164106 systemd[1]: var-lib-kubelet-pods-c6a8154e\x2d1e3e\x2d4209\x2d8ac4\x2de979c412eb94-volumes-kubernetes.io\x7esecret-cilium\x2dipsec\x2dsecrets.mount: Deactivated successfully. Oct 2 19:36:33.170369 kubelet[2744]: I1002 19:36:33.168433 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/c6a8154e-1e3e-4209-8ac4-e979c412eb94-clustermesh-secrets" (OuterVolumeSpecName: "clustermesh-secrets") pod "c6a8154e-1e3e-4209-8ac4-e979c412eb94" (UID: "c6a8154e-1e3e-4209-8ac4-e979c412eb94"). InnerVolumeSpecName "clustermesh-secrets". PluginName "kubernetes.io/secret", VolumeGidValue "" Oct 2 19:36:33.170659 kubelet[2744]: I1002 19:36:33.170621 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/c6a8154e-1e3e-4209-8ac4-e979c412eb94-cilium-ipsec-secrets" (OuterVolumeSpecName: "cilium-ipsec-secrets") pod "c6a8154e-1e3e-4209-8ac4-e979c412eb94" (UID: "c6a8154e-1e3e-4209-8ac4-e979c412eb94"). InnerVolumeSpecName "cilium-ipsec-secrets". PluginName "kubernetes.io/secret", VolumeGidValue "" Oct 2 19:36:33.172923 systemd[1]: var-lib-kubelet-pods-c6a8154e\x2d1e3e\x2d4209\x2d8ac4\x2de979c412eb94-volumes-kubernetes.io\x7esecret-clustermesh\x2dsecrets.mount: Deactivated successfully. Oct 2 19:36:33.176642 kubelet[2744]: I1002 19:36:33.176604 2744 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/c6a8154e-1e3e-4209-8ac4-e979c412eb94-kube-api-access-f6hkv" (OuterVolumeSpecName: "kube-api-access-f6hkv") pod "c6a8154e-1e3e-4209-8ac4-e979c412eb94" (UID: "c6a8154e-1e3e-4209-8ac4-e979c412eb94"). InnerVolumeSpecName "kube-api-access-f6hkv". PluginName "kubernetes.io/projected", VolumeGidValue "" Oct 2 19:36:33.246381 kubelet[2744]: I1002 19:36:33.246322 2744 reconciler_common.go:300] "Volume detached for volume \"hostproc\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-hostproc\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:36:33.246571 kubelet[2744]: I1002 19:36:33.246411 2744 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-f6hkv\" (UniqueName: \"kubernetes.io/projected/c6a8154e-1e3e-4209-8ac4-e979c412eb94-kube-api-access-f6hkv\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:36:33.246571 kubelet[2744]: I1002 19:36:33.246429 2744 reconciler_common.go:300] "Volume detached for volume \"host-proc-sys-kernel\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-host-proc-sys-kernel\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:36:33.246571 kubelet[2744]: I1002 19:36:33.246452 2744 reconciler_common.go:300] "Volume detached for volume \"cilium-cgroup\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-cilium-cgroup\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:36:33.246571 kubelet[2744]: I1002 19:36:33.246468 2744 reconciler_common.go:300] "Volume detached for volume \"etc-cni-netd\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-etc-cni-netd\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:36:33.246571 kubelet[2744]: I1002 19:36:33.246481 2744 reconciler_common.go:300] "Volume detached for volume \"hubble-tls\" (UniqueName: \"kubernetes.io/projected/c6a8154e-1e3e-4209-8ac4-e979c412eb94-hubble-tls\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:36:33.246571 kubelet[2744]: I1002 19:36:33.246493 2744 reconciler_common.go:300] "Volume detached for volume \"clustermesh-secrets\" (UniqueName: \"kubernetes.io/secret/c6a8154e-1e3e-4209-8ac4-e979c412eb94-clustermesh-secrets\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:36:33.246571 kubelet[2744]: I1002 19:36:33.246510 2744 reconciler_common.go:300] "Volume detached for volume \"cni-path\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-cni-path\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:36:33.246571 kubelet[2744]: I1002 19:36:33.246525 2744 reconciler_common.go:300] "Volume detached for volume \"cilium-ipsec-secrets\" (UniqueName: \"kubernetes.io/secret/c6a8154e-1e3e-4209-8ac4-e979c412eb94-cilium-ipsec-secrets\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:36:33.246571 kubelet[2744]: I1002 19:36:33.246538 2744 reconciler_common.go:300] "Volume detached for volume \"cilium-run\" (UniqueName: \"kubernetes.io/host-path/c6a8154e-1e3e-4209-8ac4-e979c412eb94-cilium-run\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:36:33.246571 kubelet[2744]: I1002 19:36:33.246551 2744 reconciler_common.go:300] "Volume detached for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/c6a8154e-1e3e-4209-8ac4-e979c412eb94-cilium-config-path\") on node \"ip-172-31-22-61\" DevicePath \"\"" Oct 2 19:36:33.728109 kubelet[2744]: I1002 19:36:33.728084 2744 scope.go:117] "RemoveContainer" containerID="2d3c7e0cf7770db1168cec4463d3032792d9f44d42facf2ba1e743fb9ab8c849" Oct 2 19:36:33.730103 env[1641]: time="2023-10-02T19:36:33.730064254Z" level=info msg="RemoveContainer for \"2d3c7e0cf7770db1168cec4463d3032792d9f44d42facf2ba1e743fb9ab8c849\"" Oct 2 19:36:33.735342 systemd[1]: Removed slice kubepods-burstable-podc6a8154e_1e3e_4209_8ac4_e979c412eb94.slice. Oct 2 19:36:33.737928 env[1641]: time="2023-10-02T19:36:33.737886898Z" level=info msg="RemoveContainer for \"2d3c7e0cf7770db1168cec4463d3032792d9f44d42facf2ba1e743fb9ab8c849\" returns successfully" Oct 2 19:36:33.878729 systemd[1]: var-lib-kubelet-pods-c6a8154e\x2d1e3e\x2d4209\x2d8ac4\x2de979c412eb94-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2df6hkv.mount: Deactivated successfully. Oct 2 19:36:34.883224 kubelet[2744]: I1002 19:36:34.883148 2744 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="c6a8154e-1e3e-4209-8ac4-e979c412eb94" path="/var/lib/kubelet/pods/c6a8154e-1e3e-4209-8ac4-e979c412eb94/volumes" Oct 2 19:36:36.134346 kubelet[2744]: E1002 19:36:36.134308 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:36:41.136285 kubelet[2744]: E1002 19:36:41.136184 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:36:46.137126 kubelet[2744]: E1002 19:36:46.137075 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:36:51.138374 kubelet[2744]: E1002 19:36:51.138335 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:36:56.139612 kubelet[2744]: E1002 19:36:56.139578 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:37:01.141772 kubelet[2744]: E1002 19:37:01.141736 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:37:06.143362 kubelet[2744]: E1002 19:37:06.143326 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:37:11.145015 kubelet[2744]: E1002 19:37:11.144970 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:37:16.146562 kubelet[2744]: E1002 19:37:16.146530 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:37:18.324808 systemd[1]: cri-containerd-c5d420aeb2b7935827ed6645d0bd47617a7817ba47adcb6910c648a3983966f6.scope: Deactivated successfully. Oct 2 19:37:18.325487 systemd[1]: cri-containerd-c5d420aeb2b7935827ed6645d0bd47617a7817ba47adcb6910c648a3983966f6.scope: Consumed 4.836s CPU time. Oct 2 19:37:18.345783 kernel: audit: type=1334 audit(1696275438.341:1407): prog-id=82 op=UNLOAD Oct 2 19:37:18.345933 kernel: audit: type=1334 audit(1696275438.341:1408): prog-id=101 op=UNLOAD Oct 2 19:37:18.341000 audit: BPF prog-id=82 op=UNLOAD Oct 2 19:37:18.341000 audit: BPF prog-id=101 op=UNLOAD Oct 2 19:37:18.363469 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c5d420aeb2b7935827ed6645d0bd47617a7817ba47adcb6910c648a3983966f6-rootfs.mount: Deactivated successfully. Oct 2 19:37:18.378523 env[1641]: time="2023-10-02T19:37:18.378463061Z" level=info msg="shim disconnected" id=c5d420aeb2b7935827ed6645d0bd47617a7817ba47adcb6910c648a3983966f6 Oct 2 19:37:18.378523 env[1641]: time="2023-10-02T19:37:18.378511429Z" level=warning msg="cleaning up after shim disconnected" id=c5d420aeb2b7935827ed6645d0bd47617a7817ba47adcb6910c648a3983966f6 namespace=k8s.io Oct 2 19:37:18.379300 env[1641]: time="2023-10-02T19:37:18.378644406Z" level=info msg="cleaning up dead shim" Oct 2 19:37:18.389333 env[1641]: time="2023-10-02T19:37:18.389283813Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:37:18Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3985 runtime=io.containerd.runc.v2\n" Oct 2 19:37:18.831039 kubelet[2744]: I1002 19:37:18.830697 2744 scope.go:117] "RemoveContainer" containerID="c5d420aeb2b7935827ed6645d0bd47617a7817ba47adcb6910c648a3983966f6" Oct 2 19:37:18.835022 env[1641]: time="2023-10-02T19:37:18.834955313Z" level=info msg="CreateContainer within sandbox \"3f04cac4af2626eb7845f25215fa278844797c45aa095aa3a08a80397a65a2dc\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Oct 2 19:37:18.852559 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount889499386.mount: Deactivated successfully. Oct 2 19:37:18.861466 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2829247027.mount: Deactivated successfully. Oct 2 19:37:18.865157 env[1641]: time="2023-10-02T19:37:18.865109638Z" level=info msg="CreateContainer within sandbox \"3f04cac4af2626eb7845f25215fa278844797c45aa095aa3a08a80397a65a2dc\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"8dd490e6914667ec231c2bf508046a440fb16b26ecc00c514a70889b9913c583\"" Oct 2 19:37:18.865710 env[1641]: time="2023-10-02T19:37:18.865679888Z" level=info msg="StartContainer for \"8dd490e6914667ec231c2bf508046a440fb16b26ecc00c514a70889b9913c583\"" Oct 2 19:37:18.891677 systemd[1]: Started cri-containerd-8dd490e6914667ec231c2bf508046a440fb16b26ecc00c514a70889b9913c583.scope. Oct 2 19:37:18.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.929102 kernel: audit: type=1400 audit(1696275438.917:1409): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.929515 kernel: audit: type=1400 audit(1696275438.917:1410): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.934408 kernel: audit: type=1400 audit(1696275438.917:1411): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.939472 kernel: audit: type=1400 audit(1696275438.917:1412): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.944863 kernel: audit: type=1400 audit(1696275438.917:1413): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.944984 kernel: audit: type=1400 audit(1696275438.917:1414): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.954625 kernel: audit: type=1400 audit(1696275438.917:1415): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.959851 kernel: audit: type=1400 audit(1696275438.917:1416): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.922000 audit: BPF prog-id=135 op=LOAD Oct 2 19:37:18.928000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.928000 audit[4004]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2343 pid=4004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:18.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864643439306536393134363637656332333163326266353038303436 Oct 2 19:37:18.928000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.928000 audit[4004]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2343 pid=4004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:18.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864643439306536393134363637656332333163326266353038303436 Oct 2 19:37:18.928000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.928000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.928000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.928000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.928000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.928000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.928000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.928000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.928000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.928000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.928000 audit: BPF prog-id=136 op=LOAD Oct 2 19:37:18.928000 audit[4004]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000247960 items=0 ppid=2343 pid=4004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:18.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864643439306536393134363637656332333163326266353038303436 Oct 2 19:37:18.933000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.933000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.933000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.933000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.933000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.933000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.933000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.933000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.933000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.933000 audit: BPF prog-id=137 op=LOAD Oct 2 19:37:18.933000 audit[4004]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002479a8 items=0 ppid=2343 pid=4004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:18.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864643439306536393134363637656332333163326266353038303436 Oct 2 19:37:18.933000 audit: BPF prog-id=137 op=UNLOAD Oct 2 19:37:18.933000 audit: BPF prog-id=136 op=UNLOAD Oct 2 19:37:18.933000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.933000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.933000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.933000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.933000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.933000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.933000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.933000 audit[4004]: AVC avc: denied { perfmon } for pid=4004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.933000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.933000 audit[4004]: AVC avc: denied { bpf } for pid=4004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:18.933000 audit: BPF prog-id=138 op=LOAD Oct 2 19:37:18.933000 audit[4004]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000247db8 items=0 ppid=2343 pid=4004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:18.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864643439306536393134363637656332333163326266353038303436 Oct 2 19:37:19.011750 env[1641]: time="2023-10-02T19:37:19.011694547Z" level=info msg="StartContainer for \"8dd490e6914667ec231c2bf508046a440fb16b26ecc00c514a70889b9913c583\" returns successfully" Oct 2 19:37:20.973000 audit[4014]: AVC avc: denied { watch } for pid=4014 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:20.973000 audit[4014]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000333ad0 a2=fc6 a3=0 items=0 ppid=2343 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:37:20.973000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:37:20.976000 audit[4014]: AVC avc: denied { watch } for pid=4014 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:20.976000 audit[4014]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001168100 a2=fc6 a3=0 items=0 ppid=2343 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c997 key=(null) Oct 2 19:37:20.976000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:37:21.147393 kubelet[2744]: E1002 19:37:21.147354 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:37:23.766392 systemd[1]: cri-containerd-5f4de091ed54263a195aa5e6d14c5afd00a9fa703026fee8c52edc57deeba479.scope: Deactivated successfully. Oct 2 19:37:23.766799 systemd[1]: cri-containerd-5f4de091ed54263a195aa5e6d14c5afd00a9fa703026fee8c52edc57deeba479.scope: Consumed 2.025s CPU time. Oct 2 19:37:23.771922 kernel: kauditd_printk_skb: 55 callbacks suppressed Oct 2 19:37:23.772143 kernel: audit: type=1334 audit(1696275443.769:1429): prog-id=86 op=UNLOAD Oct 2 19:37:23.769000 audit: BPF prog-id=86 op=UNLOAD Oct 2 19:37:23.769000 audit: BPF prog-id=95 op=UNLOAD Oct 2 19:37:23.775639 kernel: audit: type=1334 audit(1696275443.769:1430): prog-id=95 op=UNLOAD Oct 2 19:37:23.798278 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5f4de091ed54263a195aa5e6d14c5afd00a9fa703026fee8c52edc57deeba479-rootfs.mount: Deactivated successfully. Oct 2 19:37:23.827914 env[1641]: time="2023-10-02T19:37:23.827798981Z" level=info msg="shim disconnected" id=5f4de091ed54263a195aa5e6d14c5afd00a9fa703026fee8c52edc57deeba479 Oct 2 19:37:23.827914 env[1641]: time="2023-10-02T19:37:23.827844781Z" level=warning msg="cleaning up after shim disconnected" id=5f4de091ed54263a195aa5e6d14c5afd00a9fa703026fee8c52edc57deeba479 namespace=k8s.io Oct 2 19:37:23.827914 env[1641]: time="2023-10-02T19:37:23.827911408Z" level=info msg="cleaning up dead shim" Oct 2 19:37:23.841269 env[1641]: time="2023-10-02T19:37:23.841120156Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:37:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4044 runtime=io.containerd.runc.v2\n" Oct 2 19:37:23.847017 kubelet[2744]: I1002 19:37:23.846970 2744 scope.go:117] "RemoveContainer" containerID="5f4de091ed54263a195aa5e6d14c5afd00a9fa703026fee8c52edc57deeba479" Oct 2 19:37:23.849635 env[1641]: time="2023-10-02T19:37:23.849597230Z" level=info msg="CreateContainer within sandbox \"0017a25b74309a129fa514e136fe68b61555b7909c501f923b037052fc7edd88\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Oct 2 19:37:23.868920 env[1641]: time="2023-10-02T19:37:23.867522526Z" level=info msg="CreateContainer within sandbox \"0017a25b74309a129fa514e136fe68b61555b7909c501f923b037052fc7edd88\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"d05e7c3ae51d60ed7b77aa64a062ebe397f512950ea3eee33e55dfcfdb21c105\"" Oct 2 19:37:23.868920 env[1641]: time="2023-10-02T19:37:23.868163925Z" level=info msg="StartContainer for \"d05e7c3ae51d60ed7b77aa64a062ebe397f512950ea3eee33e55dfcfdb21c105\"" Oct 2 19:37:23.908029 systemd[1]: Started cri-containerd-d05e7c3ae51d60ed7b77aa64a062ebe397f512950ea3eee33e55dfcfdb21c105.scope. Oct 2 19:37:23.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.941816 kernel: audit: type=1400 audit(1696275443.931:1431): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.941966 kernel: audit: type=1400 audit(1696275443.931:1432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.942044 kernel: audit: type=1400 audit(1696275443.931:1433): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.957554 kernel: audit: type=1400 audit(1696275443.931:1434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.957696 kernel: audit: type=1400 audit(1696275443.931:1435): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.957737 kernel: audit: type=1400 audit(1696275443.931:1436): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.970057 kernel: audit: type=1400 audit(1696275443.931:1437): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.979015 kernel: audit: type=1400 audit(1696275443.931:1438): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.936000 audit: BPF prog-id=139 op=LOAD Oct 2 19:37:23.937000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.937000 audit[4064]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2360 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:23.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430356537633361653531643630656437623737616136346130363265 Oct 2 19:37:23.937000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.937000 audit[4064]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2360 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:23.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430356537633361653531643630656437623737616136346130363265 Oct 2 19:37:23.937000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.937000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.937000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.937000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.937000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.937000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.937000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.937000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.937000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.937000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.937000 audit: BPF prog-id=140 op=LOAD Oct 2 19:37:23.937000 audit[4064]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000340530 items=0 ppid=2360 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:23.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430356537633361653531643630656437623737616136346130363265 Oct 2 19:37:23.947000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.947000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.947000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.947000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.947000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.947000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.947000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.947000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.947000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.947000 audit: BPF prog-id=141 op=LOAD Oct 2 19:37:23.947000 audit[4064]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000340578 items=0 ppid=2360 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:23.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430356537633361653531643630656437623737616136346130363265 Oct 2 19:37:23.963000 audit: BPF prog-id=141 op=UNLOAD Oct 2 19:37:23.963000 audit: BPF prog-id=140 op=UNLOAD Oct 2 19:37:23.963000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.963000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.963000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.963000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.963000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.963000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.963000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.963000 audit[4064]: AVC avc: denied { perfmon } for pid=4064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.963000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.963000 audit[4064]: AVC avc: denied { bpf } for pid=4064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.963000 audit: BPF prog-id=142 op=LOAD Oct 2 19:37:23.963000 audit[4064]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000340988 items=0 ppid=2360 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:23.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430356537633361653531643630656437623737616136346130363265 Oct 2 19:37:24.022762 env[1641]: time="2023-10-02T19:37:24.022320014Z" level=info msg="StartContainer for \"d05e7c3ae51d60ed7b77aa64a062ebe397f512950ea3eee33e55dfcfdb21c105\" returns successfully" Oct 2 19:37:24.800745 systemd[1]: run-containerd-runc-k8s.io-d05e7c3ae51d60ed7b77aa64a062ebe397f512950ea3eee33e55dfcfdb21c105-runc.Ih1yUe.mount: Deactivated successfully. Oct 2 19:37:26.148629 kubelet[2744]: E1002 19:37:26.148595 2744 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:37:26.334000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:26.334000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:26.334000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c00e43aa20 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:37:26.334000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:37:26.334000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00df6aea0 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:37:26.334000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:37:26.336000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:26.336000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00df6af30 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:37:26.336000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:37:26.352000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:26.352000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00e17ea80 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:37:26.352000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:37:26.365000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:26.365000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00df6b080 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:37:26.365000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:37:26.367000 audit[2527]: AVC avc: denied { watch } for pid=2527 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:26.367000 audit[2527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00e1f0660 a2=fc6 a3=0 items=0 ppid=2375 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c725 key=(null) Oct 2 19:37:26.367000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32322E3631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:37:28.096611 kubelet[2744]: E1002 19:37:28.096576 2744 controller.go:193] "Failed to update lease" err="the server was unable to return a response in the time allotted, but may still be processing the request (put leases.coordination.k8s.io ip-172-31-22-61)"