Oct 2 19:42:00.160395 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:42:00.160417 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:42:00.160426 kernel: BIOS-provided physical RAM map: Oct 2 19:42:00.160433 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 2 19:42:00.160439 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 2 19:42:00.160445 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 2 19:42:00.160455 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Oct 2 19:42:00.160461 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Oct 2 19:42:00.160467 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Oct 2 19:42:00.160473 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 2 19:42:00.160480 kernel: NX (Execute Disable) protection: active Oct 2 19:42:00.160486 kernel: SMBIOS 2.7 present. Oct 2 19:42:00.160492 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Oct 2 19:42:00.160499 kernel: Hypervisor detected: KVM Oct 2 19:42:00.160509 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 2 19:42:00.160516 kernel: kvm-clock: cpu 0, msr 2bf8a001, primary cpu clock Oct 2 19:42:00.160522 kernel: kvm-clock: using sched offset of 5753829221 cycles Oct 2 19:42:00.160530 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 2 19:42:00.160537 kernel: tsc: Detected 2499.996 MHz processor Oct 2 19:42:00.160544 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:42:00.160553 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:42:00.160560 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Oct 2 19:42:00.160567 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:42:00.160574 kernel: Using GB pages for direct mapping Oct 2 19:42:00.160581 kernel: ACPI: Early table checksum verification disabled Oct 2 19:42:00.160588 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Oct 2 19:42:00.166984 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Oct 2 19:42:00.166995 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Oct 2 19:42:00.167003 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Oct 2 19:42:00.167018 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Oct 2 19:42:00.167025 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Oct 2 19:42:00.167032 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Oct 2 19:42:00.167039 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Oct 2 19:42:00.167046 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Oct 2 19:42:00.167054 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Oct 2 19:42:00.167060 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Oct 2 19:42:00.167068 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Oct 2 19:42:00.167078 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Oct 2 19:42:00.167085 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Oct 2 19:42:00.167092 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Oct 2 19:42:00.167103 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Oct 2 19:42:00.167111 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Oct 2 19:42:00.167118 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Oct 2 19:42:00.167126 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Oct 2 19:42:00.167136 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Oct 2 19:42:00.167143 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Oct 2 19:42:00.167151 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Oct 2 19:42:00.167159 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 2 19:42:00.167166 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 2 19:42:00.167174 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Oct 2 19:42:00.167181 kernel: NUMA: Initialized distance table, cnt=1 Oct 2 19:42:00.167189 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Oct 2 19:42:00.167199 kernel: Zone ranges: Oct 2 19:42:00.167207 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:42:00.167265 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Oct 2 19:42:00.167273 kernel: Normal empty Oct 2 19:42:00.167281 kernel: Movable zone start for each node Oct 2 19:42:00.167288 kernel: Early memory node ranges Oct 2 19:42:00.167296 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 2 19:42:00.167303 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Oct 2 19:42:00.167311 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Oct 2 19:42:00.167321 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:42:00.167329 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 2 19:42:00.167337 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Oct 2 19:42:00.167344 kernel: ACPI: PM-Timer IO Port: 0xb008 Oct 2 19:42:00.167352 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 2 19:42:00.167360 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Oct 2 19:42:00.167367 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 2 19:42:00.167375 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:42:00.167382 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 2 19:42:00.167392 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 2 19:42:00.167400 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:42:00.167407 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Oct 2 19:42:00.167415 kernel: TSC deadline timer available Oct 2 19:42:00.167423 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Oct 2 19:42:00.167430 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Oct 2 19:42:00.167438 kernel: Booting paravirtualized kernel on KVM Oct 2 19:42:00.167446 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:42:00.167454 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Oct 2 19:42:00.167464 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Oct 2 19:42:00.167471 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Oct 2 19:42:00.167479 kernel: pcpu-alloc: [0] 0 1 Oct 2 19:42:00.167486 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Oct 2 19:42:00.167494 kernel: kvm-guest: PV spinlocks enabled Oct 2 19:42:00.167501 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 2 19:42:00.167509 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Oct 2 19:42:00.167516 kernel: Policy zone: DMA32 Oct 2 19:42:00.167525 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:42:00.167536 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:42:00.167544 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 19:42:00.167552 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 2 19:42:00.167560 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:42:00.167568 kernel: Memory: 1936476K/2057760K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 121024K reserved, 0K cma-reserved) Oct 2 19:42:00.167575 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 19:42:00.167583 kernel: Kernel/User page tables isolation: enabled Oct 2 19:42:00.167601 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:42:00.168667 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:42:00.168680 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:42:00.168690 kernel: rcu: RCU event tracing is enabled. Oct 2 19:42:00.168699 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 19:42:00.168708 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:42:00.168716 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:42:00.168724 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:42:00.168732 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 19:42:00.168740 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Oct 2 19:42:00.168752 kernel: random: crng init done Oct 2 19:42:00.168759 kernel: Console: colour VGA+ 80x25 Oct 2 19:42:00.168767 kernel: printk: console [ttyS0] enabled Oct 2 19:42:00.168775 kernel: ACPI: Core revision 20210730 Oct 2 19:42:00.168782 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Oct 2 19:42:00.168790 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:42:00.168798 kernel: x2apic enabled Oct 2 19:42:00.168805 kernel: Switched APIC routing to physical x2apic. Oct 2 19:42:00.168813 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Oct 2 19:42:00.168821 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499996) Oct 2 19:42:00.168831 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 2 19:42:00.168839 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Oct 2 19:42:00.168847 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:42:00.168862 kernel: Spectre V2 : Mitigation: Retpolines Oct 2 19:42:00.168872 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:42:00.168880 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 2 19:42:00.168888 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Oct 2 19:42:00.168896 kernel: RETBleed: Vulnerable Oct 2 19:42:00.168904 kernel: Speculative Store Bypass: Vulnerable Oct 2 19:42:00.168912 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:42:00.168920 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:42:00.168927 kernel: GDS: Unknown: Dependent on hypervisor status Oct 2 19:42:00.168935 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:42:00.168946 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:42:00.168954 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:42:00.168962 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Oct 2 19:42:00.168970 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Oct 2 19:42:00.169082 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Oct 2 19:42:00.169092 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Oct 2 19:42:00.169104 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Oct 2 19:42:00.169112 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Oct 2 19:42:00.169121 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:42:00.169129 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Oct 2 19:42:00.169137 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Oct 2 19:42:00.169145 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Oct 2 19:42:00.169194 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Oct 2 19:42:00.169202 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Oct 2 19:42:00.169210 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Oct 2 19:42:00.169218 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Oct 2 19:42:00.169226 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:42:00.169237 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:42:00.169245 kernel: LSM: Security Framework initializing Oct 2 19:42:00.169253 kernel: SELinux: Initializing. Oct 2 19:42:00.169261 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:42:00.169269 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:42:00.169277 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Oct 2 19:42:00.169285 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Oct 2 19:42:00.169293 kernel: signal: max sigframe size: 3632 Oct 2 19:42:00.169302 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:42:00.169310 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 2 19:42:00.169318 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:42:00.169328 kernel: x86: Booting SMP configuration: Oct 2 19:42:00.169336 kernel: .... node #0, CPUs: #1 Oct 2 19:42:00.169344 kernel: kvm-clock: cpu 1, msr 2bf8a041, secondary cpu clock Oct 2 19:42:00.169352 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Oct 2 19:42:00.169361 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Oct 2 19:42:00.169370 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Oct 2 19:42:00.169378 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 19:42:00.169386 kernel: smpboot: Max logical packages: 1 Oct 2 19:42:00.169396 kernel: smpboot: Total of 2 processors activated (9999.98 BogoMIPS) Oct 2 19:42:00.169404 kernel: devtmpfs: initialized Oct 2 19:42:00.169413 kernel: x86/mm: Memory block size: 128MB Oct 2 19:42:00.169421 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:42:00.169429 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 19:42:00.169438 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:42:00.169446 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:42:00.169454 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:42:00.169462 kernel: audit: type=2000 audit(1696275719.549:1): state=initialized audit_enabled=0 res=1 Oct 2 19:42:00.169473 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:42:00.169481 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:42:00.169489 kernel: cpuidle: using governor menu Oct 2 19:42:00.169497 kernel: ACPI: bus type PCI registered Oct 2 19:42:00.169505 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:42:00.169513 kernel: dca service started, version 1.12.1 Oct 2 19:42:00.169521 kernel: PCI: Using configuration type 1 for base access Oct 2 19:42:00.169529 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:42:00.169537 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:42:00.169548 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:42:00.169556 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:42:00.169564 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:42:00.169572 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:42:00.169580 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:42:00.169588 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:42:00.169609 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:42:00.169617 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:42:00.169625 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Oct 2 19:42:00.169636 kernel: ACPI: Interpreter enabled Oct 2 19:42:00.169644 kernel: ACPI: PM: (supports S0 S5) Oct 2 19:42:00.169652 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:42:00.169660 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:42:00.169668 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Oct 2 19:42:00.169676 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 2 19:42:00.169854 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:42:00.169943 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Oct 2 19:42:00.169956 kernel: acpiphp: Slot [3] registered Oct 2 19:42:00.169965 kernel: acpiphp: Slot [4] registered Oct 2 19:42:00.169973 kernel: acpiphp: Slot [5] registered Oct 2 19:42:00.169981 kernel: acpiphp: Slot [6] registered Oct 2 19:42:00.169989 kernel: acpiphp: Slot [7] registered Oct 2 19:42:00.169996 kernel: acpiphp: Slot [8] registered Oct 2 19:42:00.170004 kernel: acpiphp: Slot [9] registered Oct 2 19:42:00.170012 kernel: acpiphp: Slot [10] registered Oct 2 19:42:00.170020 kernel: acpiphp: Slot [11] registered Oct 2 19:42:00.170031 kernel: acpiphp: Slot [12] registered Oct 2 19:42:00.170039 kernel: acpiphp: Slot [13] registered Oct 2 19:42:00.170047 kernel: acpiphp: Slot [14] registered Oct 2 19:42:00.170055 kernel: acpiphp: Slot [15] registered Oct 2 19:42:00.170063 kernel: acpiphp: Slot [16] registered Oct 2 19:42:00.170071 kernel: acpiphp: Slot [17] registered Oct 2 19:42:00.170079 kernel: acpiphp: Slot [18] registered Oct 2 19:42:00.170194 kernel: acpiphp: Slot [19] registered Oct 2 19:42:00.170209 kernel: acpiphp: Slot [20] registered Oct 2 19:42:00.170222 kernel: acpiphp: Slot [21] registered Oct 2 19:42:00.170230 kernel: acpiphp: Slot [22] registered Oct 2 19:42:00.170238 kernel: acpiphp: Slot [23] registered Oct 2 19:42:00.170246 kernel: acpiphp: Slot [24] registered Oct 2 19:42:00.170254 kernel: acpiphp: Slot [25] registered Oct 2 19:42:00.170262 kernel: acpiphp: Slot [26] registered Oct 2 19:42:00.170270 kernel: acpiphp: Slot [27] registered Oct 2 19:42:00.170278 kernel: acpiphp: Slot [28] registered Oct 2 19:42:00.170286 kernel: acpiphp: Slot [29] registered Oct 2 19:42:00.170304 kernel: acpiphp: Slot [30] registered Oct 2 19:42:00.170314 kernel: acpiphp: Slot [31] registered Oct 2 19:42:00.170322 kernel: PCI host bridge to bus 0000:00 Oct 2 19:42:00.170428 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 19:42:00.170506 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 2 19:42:00.170579 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 19:42:00.177757 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Oct 2 19:42:00.177859 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 2 19:42:00.178063 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Oct 2 19:42:00.178223 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Oct 2 19:42:00.178330 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Oct 2 19:42:00.178414 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Oct 2 19:42:00.178498 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Oct 2 19:42:00.178579 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Oct 2 19:42:00.178676 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Oct 2 19:42:00.178762 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Oct 2 19:42:00.178843 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Oct 2 19:42:00.178922 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Oct 2 19:42:00.179003 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Oct 2 19:42:00.179089 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Oct 2 19:42:00.179170 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Oct 2 19:42:00.179306 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Oct 2 19:42:00.179394 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 2 19:42:00.179480 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Oct 2 19:42:00.179562 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Oct 2 19:42:00.179659 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Oct 2 19:42:00.179742 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Oct 2 19:42:00.179753 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 2 19:42:00.179765 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 2 19:42:00.179773 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 2 19:42:00.179781 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 2 19:42:00.179790 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 2 19:42:00.179798 kernel: iommu: Default domain type: Translated Oct 2 19:42:00.179806 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:42:00.179884 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Oct 2 19:42:00.179965 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 2 19:42:00.180066 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Oct 2 19:42:00.180081 kernel: vgaarb: loaded Oct 2 19:42:00.180089 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:42:00.180097 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:42:00.180106 kernel: PTP clock support registered Oct 2 19:42:00.180114 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:42:00.180123 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 19:42:00.180145 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 2 19:42:00.180163 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Oct 2 19:42:00.180171 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Oct 2 19:42:00.180181 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Oct 2 19:42:00.180190 kernel: clocksource: Switched to clocksource kvm-clock Oct 2 19:42:00.180198 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:42:00.180207 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:42:00.180215 kernel: pnp: PnP ACPI init Oct 2 19:42:00.180223 kernel: pnp: PnP ACPI: found 5 devices Oct 2 19:42:00.180231 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:42:00.180240 kernel: NET: Registered PF_INET protocol family Oct 2 19:42:00.180250 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 19:42:00.180258 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 2 19:42:00.180266 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:42:00.180275 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:42:00.180283 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 2 19:42:00.180292 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 2 19:42:00.180300 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:42:00.180308 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:42:00.180316 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:42:00.180327 kernel: NET: Registered PF_XDP protocol family Oct 2 19:42:00.180411 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 2 19:42:00.180495 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 2 19:42:00.180567 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 2 19:42:00.183788 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Oct 2 19:42:00.183898 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 2 19:42:00.183984 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Oct 2 19:42:00.184001 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:42:00.184010 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 2 19:42:00.184019 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Oct 2 19:42:00.184027 kernel: clocksource: Switched to clocksource tsc Oct 2 19:42:00.184035 kernel: Initialise system trusted keyrings Oct 2 19:42:00.184043 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 2 19:42:00.184052 kernel: Key type asymmetric registered Oct 2 19:42:00.184060 kernel: Asymmetric key parser 'x509' registered Oct 2 19:42:00.184068 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:42:00.184079 kernel: io scheduler mq-deadline registered Oct 2 19:42:00.184087 kernel: io scheduler kyber registered Oct 2 19:42:00.184096 kernel: io scheduler bfq registered Oct 2 19:42:00.184104 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:42:00.184112 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:42:00.184120 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:42:00.184129 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 2 19:42:00.184137 kernel: i8042: Warning: Keylock active Oct 2 19:42:00.184145 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 2 19:42:00.184153 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 2 19:42:00.184248 kernel: rtc_cmos 00:00: RTC can wake from S4 Oct 2 19:42:00.184325 kernel: rtc_cmos 00:00: registered as rtc0 Oct 2 19:42:00.184399 kernel: rtc_cmos 00:00: setting system clock to 2023-10-02T19:41:59 UTC (1696275719) Oct 2 19:42:00.184473 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Oct 2 19:42:00.184483 kernel: intel_pstate: CPU model not supported Oct 2 19:42:00.184491 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:42:00.184499 kernel: Segment Routing with IPv6 Oct 2 19:42:00.184510 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:42:00.184518 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:42:00.184526 kernel: Key type dns_resolver registered Oct 2 19:42:00.184534 kernel: IPI shorthand broadcast: enabled Oct 2 19:42:00.184542 kernel: sched_clock: Marking stable (491301175, 293990707)->(1012803616, -227511734) Oct 2 19:42:00.184550 kernel: registered taskstats version 1 Oct 2 19:42:00.184558 kernel: Loading compiled-in X.509 certificates Oct 2 19:42:00.184567 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:42:00.184575 kernel: Key type .fscrypt registered Oct 2 19:42:00.184585 kernel: Key type fscrypt-provisioning registered Oct 2 19:42:00.186633 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 19:42:00.186652 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:42:00.186661 kernel: ima: No architecture policies found Oct 2 19:42:00.188025 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:42:00.188056 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:42:00.188066 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:42:00.188075 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:42:00.188083 kernel: Run /init as init process Oct 2 19:42:00.188097 kernel: with arguments: Oct 2 19:42:00.188106 kernel: /init Oct 2 19:42:00.188114 kernel: with environment: Oct 2 19:42:00.188122 kernel: HOME=/ Oct 2 19:42:00.188130 kernel: TERM=linux Oct 2 19:42:00.188139 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:42:00.188152 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:42:00.188163 systemd[1]: Detected virtualization amazon. Oct 2 19:42:00.188174 systemd[1]: Detected architecture x86-64. Oct 2 19:42:00.188183 systemd[1]: Running in initrd. Oct 2 19:42:00.188191 systemd[1]: No hostname configured, using default hostname. Oct 2 19:42:00.188200 systemd[1]: Hostname set to . Oct 2 19:42:00.188223 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:42:00.188235 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 2 19:42:00.188244 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:42:00.188253 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:42:00.188262 systemd[1]: Reached target cryptsetup.target. Oct 2 19:42:00.188271 systemd[1]: Reached target paths.target. Oct 2 19:42:00.188279 systemd[1]: Reached target slices.target. Oct 2 19:42:00.188288 systemd[1]: Reached target swap.target. Oct 2 19:42:00.188297 systemd[1]: Reached target timers.target. Oct 2 19:42:00.188309 systemd[1]: Listening on iscsid.socket. Oct 2 19:42:00.188318 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:42:00.188327 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:42:00.188336 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:42:00.188345 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:42:00.188354 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:42:00.188363 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:42:00.188371 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:42:00.188380 systemd[1]: Reached target sockets.target. Oct 2 19:42:00.188391 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:42:00.188400 systemd[1]: Finished network-cleanup.service. Oct 2 19:42:00.188409 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:42:00.188418 systemd[1]: Starting systemd-journald.service... Oct 2 19:42:00.188427 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:42:00.188438 systemd[1]: Starting systemd-resolved.service... Oct 2 19:42:00.188447 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:42:00.188456 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:42:00.188465 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:42:00.188476 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:42:00.188485 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:42:00.188494 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:42:00.188502 kernel: Bridge firewalling registered Oct 2 19:42:00.188511 kernel: SCSI subsystem initialized Oct 2 19:42:00.188525 systemd-journald[185]: Journal started Oct 2 19:42:00.191646 systemd-journald[185]: Runtime Journal (/run/log/journal/ec200b2ce3ec7b11b9f66d954473c176) is 4.8M, max 38.7M, 33.9M free. Oct 2 19:42:00.191712 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:42:00.191737 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:42:00.191755 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:42:00.138352 systemd-modules-load[186]: Inserted module 'overlay' Oct 2 19:42:00.369743 systemd[1]: Started systemd-journald.service. Oct 2 19:42:00.369770 kernel: audit: type=1130 audit(1696275720.360:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:00.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:00.163772 systemd-modules-load[186]: Inserted module 'br_netfilter' Oct 2 19:42:00.201662 systemd-resolved[187]: Positive Trust Anchors: Oct 2 19:42:00.386668 kernel: audit: type=1130 audit(1696275720.372:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:00.386703 kernel: audit: type=1130 audit(1696275720.378:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:00.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:00.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:00.201679 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:42:00.201844 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:42:00.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:00.209507 systemd-resolved[187]: Defaulting to hostname 'linux'. Oct 2 19:42:00.403500 kernel: audit: type=1130 audit(1696275720.389:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:00.215577 systemd-modules-load[186]: Inserted module 'dm_multipath' Oct 2 19:42:00.373331 systemd[1]: Started systemd-resolved.service. Oct 2 19:42:00.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:00.386945 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:42:00.412981 kernel: audit: type=1130 audit(1696275720.403:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:00.390874 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:42:00.407357 systemd[1]: Reached target nss-lookup.target. Oct 2 19:42:00.417195 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:42:00.422360 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:42:00.447500 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:42:00.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:00.462360 kernel: audit: type=1130 audit(1696275720.446:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:00.464022 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:42:00.465412 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:42:00.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:00.475992 kernel: audit: type=1130 audit(1696275720.462:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:00.483023 dracut-cmdline[208]: dracut-dracut-053 Oct 2 19:42:00.489743 dracut-cmdline[208]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:42:00.647615 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:42:00.664623 kernel: iscsi: registered transport (tcp) Oct 2 19:42:00.689335 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:42:00.689421 kernel: QLogic iSCSI HBA Driver Oct 2 19:42:00.729616 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:42:00.746208 kernel: audit: type=1130 audit(1696275720.729:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:00.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:00.732607 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:42:00.834653 kernel: raid6: avx512x4 gen() 15038 MB/s Oct 2 19:42:00.854634 kernel: raid6: avx512x4 xor() 6224 MB/s Oct 2 19:42:00.871642 kernel: raid6: avx512x2 gen() 15789 MB/s Oct 2 19:42:00.889641 kernel: raid6: avx512x2 xor() 10511 MB/s Oct 2 19:42:00.907828 kernel: raid6: avx512x1 gen() 5296 MB/s Oct 2 19:42:00.925932 kernel: raid6: avx512x1 xor() 6260 MB/s Oct 2 19:42:00.944886 kernel: raid6: avx2x4 gen() 6389 MB/s Oct 2 19:42:00.962830 kernel: raid6: avx2x4 xor() 2726 MB/s Oct 2 19:42:00.981835 kernel: raid6: avx2x2 gen() 6490 MB/s Oct 2 19:42:01.000649 kernel: raid6: avx2x2 xor() 7291 MB/s Oct 2 19:42:01.018658 kernel: raid6: avx2x1 gen() 7354 MB/s Oct 2 19:42:01.039645 kernel: raid6: avx2x1 xor() 8830 MB/s Oct 2 19:42:01.059000 kernel: raid6: sse2x4 gen() 3807 MB/s Oct 2 19:42:01.076647 kernel: raid6: sse2x4 xor() 2355 MB/s Oct 2 19:42:01.093645 kernel: raid6: sse2x2 gen() 5799 MB/s Oct 2 19:42:01.111646 kernel: raid6: sse2x2 xor() 4185 MB/s Oct 2 19:42:01.130694 kernel: raid6: sse2x1 gen() 2453 MB/s Oct 2 19:42:01.153205 kernel: raid6: sse2x1 xor() 2224 MB/s Oct 2 19:42:01.153294 kernel: raid6: using algorithm avx512x2 gen() 15789 MB/s Oct 2 19:42:01.153314 kernel: raid6: .... xor() 10511 MB/s, rmw enabled Oct 2 19:42:01.155097 kernel: raid6: using avx512x2 recovery algorithm Oct 2 19:42:01.186634 kernel: xor: automatically using best checksumming function avx Oct 2 19:42:01.317620 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:42:01.328961 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:42:01.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:01.329000 audit: BPF prog-id=7 op=LOAD Oct 2 19:42:01.334000 audit: BPF prog-id=8 op=LOAD Oct 2 19:42:01.337629 kernel: audit: type=1130 audit(1696275721.327:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:01.336765 systemd[1]: Starting systemd-udevd.service... Oct 2 19:42:01.377072 systemd-udevd[386]: Using default interface naming scheme 'v252'. Oct 2 19:42:01.395888 systemd[1]: Started systemd-udevd.service. Oct 2 19:42:01.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:01.409716 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:42:01.452898 dracut-pre-trigger[399]: rd.md=0: removing MD RAID activation Oct 2 19:42:01.530407 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:42:01.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:01.531860 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:42:01.665392 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:42:01.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:01.765620 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:42:01.786922 kernel: ena 0000:00:05.0: ENA device version: 0.10 Oct 2 19:42:01.787240 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Oct 2 19:42:01.804628 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:42:01.804714 kernel: AES CTR mode by8 optimization enabled Oct 2 19:42:01.805609 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Oct 2 19:42:01.809619 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:b3:9d:b8:08:a9 Oct 2 19:42:01.812693 (udev-worker)[439]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:42:02.041132 kernel: nvme nvme0: pci function 0000:00:04.0 Oct 2 19:42:02.041389 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Oct 2 19:42:02.041411 kernel: nvme nvme0: 2/0/0 default/read/poll queues Oct 2 19:42:02.041540 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 19:42:02.041558 kernel: GPT:9289727 != 16777215 Oct 2 19:42:02.041574 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 19:42:02.041619 kernel: GPT:9289727 != 16777215 Oct 2 19:42:02.041641 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 19:42:02.041658 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:42:02.041674 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (445) Oct 2 19:42:01.948122 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:42:02.058993 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:42:02.085811 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:42:02.126862 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:42:02.128466 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:42:02.147860 systemd[1]: Starting disk-uuid.service... Oct 2 19:42:02.161498 disk-uuid[586]: Primary Header is updated. Oct 2 19:42:02.161498 disk-uuid[586]: Secondary Entries is updated. Oct 2 19:42:02.161498 disk-uuid[586]: Secondary Header is updated. Oct 2 19:42:02.173627 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:42:02.198113 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:42:03.191986 disk-uuid[587]: The operation has completed successfully. Oct 2 19:42:03.193923 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:42:03.356729 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:42:03.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:03.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:03.356858 systemd[1]: Finished disk-uuid.service. Oct 2 19:42:03.359354 systemd[1]: Starting verity-setup.service... Oct 2 19:42:03.379629 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:42:03.469327 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:42:03.474336 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:42:03.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:03.475524 systemd[1]: Finished verity-setup.service. Oct 2 19:42:03.575672 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:42:03.575639 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:42:03.577524 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:42:03.580190 systemd[1]: Starting ignition-setup.service... Oct 2 19:42:03.583617 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:42:03.603371 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:42:03.603433 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:42:03.603446 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:42:03.620680 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:42:03.639631 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:42:03.673023 systemd[1]: Finished ignition-setup.service. Oct 2 19:42:03.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:03.675817 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:42:03.741158 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:42:03.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:03.742000 audit: BPF prog-id=9 op=LOAD Oct 2 19:42:03.745330 systemd[1]: Starting systemd-networkd.service... Oct 2 19:42:03.792111 systemd-networkd[1027]: lo: Link UP Oct 2 19:42:03.792123 systemd-networkd[1027]: lo: Gained carrier Oct 2 19:42:03.792825 systemd-networkd[1027]: Enumeration completed Oct 2 19:42:03.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:03.792948 systemd[1]: Started systemd-networkd.service. Oct 2 19:42:03.793210 systemd-networkd[1027]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:42:03.796098 systemd[1]: Reached target network.target. Oct 2 19:42:03.803112 systemd[1]: Starting iscsiuio.service... Oct 2 19:42:03.803790 systemd-networkd[1027]: eth0: Link UP Oct 2 19:42:03.803796 systemd-networkd[1027]: eth0: Gained carrier Oct 2 19:42:03.816467 systemd[1]: Started iscsiuio.service. Oct 2 19:42:03.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:03.819353 systemd[1]: Starting iscsid.service... Oct 2 19:42:03.822340 systemd-networkd[1027]: eth0: DHCPv4 address 172.31.21.168/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 19:42:03.824619 iscsid[1032]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:42:03.824619 iscsid[1032]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:42:03.824619 iscsid[1032]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:42:03.824619 iscsid[1032]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:42:03.824619 iscsid[1032]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:42:03.824619 iscsid[1032]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:42:03.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:03.826894 systemd[1]: Started iscsid.service. Oct 2 19:42:03.831092 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:42:03.851228 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:42:03.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:03.854115 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:42:03.855885 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:42:03.856933 systemd[1]: Reached target remote-fs.target. Oct 2 19:42:03.858977 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:42:03.870897 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:42:03.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:04.360163 ignition[990]: Ignition 2.14.0 Oct 2 19:42:04.360179 ignition[990]: Stage: fetch-offline Oct 2 19:42:04.360433 ignition[990]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:42:04.360477 ignition[990]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:42:04.412429 ignition[990]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:42:04.413029 ignition[990]: Ignition finished successfully Oct 2 19:42:04.414518 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:42:04.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:04.419378 systemd[1]: Starting ignition-fetch.service... Oct 2 19:42:04.428368 kernel: kauditd_printk_skb: 16 callbacks suppressed Oct 2 19:42:04.428400 kernel: audit: type=1130 audit(1696275724.415:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:04.443472 ignition[1051]: Ignition 2.14.0 Oct 2 19:42:04.443486 ignition[1051]: Stage: fetch Oct 2 19:42:04.443708 ignition[1051]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:42:04.443741 ignition[1051]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:42:04.453978 ignition[1051]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:42:04.456748 ignition[1051]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:42:04.464146 ignition[1051]: INFO : PUT result: OK Oct 2 19:42:04.468487 ignition[1051]: DEBUG : parsed url from cmdline: "" Oct 2 19:42:04.468487 ignition[1051]: INFO : no config URL provided Oct 2 19:42:04.468487 ignition[1051]: INFO : reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:42:04.468487 ignition[1051]: INFO : no config at "/usr/lib/ignition/user.ign" Oct 2 19:42:04.474034 ignition[1051]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:42:04.474034 ignition[1051]: INFO : PUT result: OK Oct 2 19:42:04.474034 ignition[1051]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Oct 2 19:42:04.482363 ignition[1051]: INFO : GET result: OK Oct 2 19:42:04.482363 ignition[1051]: DEBUG : parsing config with SHA512: b08dba03a920f668a0760626310ae8a2bbcbda28a02320ea31b13a38b7b14577147c6a92b132197fa870b30dcbe8dbe373152bfcdef90ca48deaf5dd8d392880 Oct 2 19:42:04.523313 unknown[1051]: fetched base config from "system" Oct 2 19:42:04.523328 unknown[1051]: fetched base config from "system" Oct 2 19:42:04.524317 ignition[1051]: fetch: fetch complete Oct 2 19:42:04.523335 unknown[1051]: fetched user config from "aws" Oct 2 19:42:04.524324 ignition[1051]: fetch: fetch passed Oct 2 19:42:04.524385 ignition[1051]: Ignition finished successfully Oct 2 19:42:04.528580 systemd[1]: Finished ignition-fetch.service. Oct 2 19:42:04.535783 kernel: audit: type=1130 audit(1696275724.528:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:04.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:04.536921 systemd[1]: Starting ignition-kargs.service... Oct 2 19:42:04.564912 ignition[1057]: Ignition 2.14.0 Oct 2 19:42:04.564924 ignition[1057]: Stage: kargs Oct 2 19:42:04.565134 ignition[1057]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:42:04.565169 ignition[1057]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:42:04.573572 ignition[1057]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:42:04.575683 ignition[1057]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:42:04.586341 ignition[1057]: INFO : PUT result: OK Oct 2 19:42:04.595992 ignition[1057]: kargs: kargs passed Oct 2 19:42:04.596077 ignition[1057]: Ignition finished successfully Oct 2 19:42:04.601436 systemd[1]: Finished ignition-kargs.service. Oct 2 19:42:04.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:04.607228 systemd[1]: Starting ignition-disks.service... Oct 2 19:42:04.613506 kernel: audit: type=1130 audit(1696275724.604:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:04.618623 ignition[1063]: Ignition 2.14.0 Oct 2 19:42:04.618635 ignition[1063]: Stage: disks Oct 2 19:42:04.618836 ignition[1063]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:42:04.618868 ignition[1063]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:42:04.631671 ignition[1063]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:42:04.633083 ignition[1063]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:42:04.635177 ignition[1063]: INFO : PUT result: OK Oct 2 19:42:04.638102 ignition[1063]: disks: disks passed Oct 2 19:42:04.638365 ignition[1063]: Ignition finished successfully Oct 2 19:42:04.640876 systemd[1]: Finished ignition-disks.service. Oct 2 19:42:04.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:04.644834 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:42:04.652784 kernel: audit: type=1130 audit(1696275724.643:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:04.652793 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:42:04.654769 systemd[1]: Reached target local-fs.target. Oct 2 19:42:04.657133 systemd[1]: Reached target sysinit.target. Oct 2 19:42:04.659045 systemd[1]: Reached target basic.target. Oct 2 19:42:04.661777 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:42:04.691873 systemd-fsck[1071]: ROOT: clean, 603/553520 files, 56012/553472 blocks Oct 2 19:42:04.703746 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:42:04.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:04.714692 kernel: audit: type=1130 audit(1696275724.706:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:04.714940 systemd[1]: Mounting sysroot.mount... Oct 2 19:42:04.733622 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:42:04.735741 systemd[1]: Mounted sysroot.mount. Oct 2 19:42:04.738374 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:42:04.742460 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:42:04.745200 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 19:42:04.745267 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:42:04.745300 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:42:04.754894 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:42:04.769372 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:42:04.771761 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:42:04.788617 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1088) Oct 2 19:42:04.788681 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:42:04.788702 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:42:04.790160 initrd-setup-root[1093]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:42:04.794716 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:42:04.797318 initrd-setup-root[1117]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:42:04.804623 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:42:04.807869 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:42:04.814793 initrd-setup-root[1127]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:42:04.818773 initrd-setup-root[1135]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:42:04.982521 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:42:04.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:04.983708 systemd[1]: Starting ignition-mount.service... Oct 2 19:42:04.996717 kernel: audit: type=1130 audit(1696275724.981:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:04.997289 systemd-networkd[1027]: eth0: Gained IPv6LL Oct 2 19:42:05.000388 systemd[1]: Starting sysroot-boot.service... Oct 2 19:42:05.014489 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 19:42:05.014647 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 19:42:05.045084 ignition[1154]: INFO : Ignition 2.14.0 Oct 2 19:42:05.045084 ignition[1154]: INFO : Stage: mount Oct 2 19:42:05.047878 ignition[1154]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:42:05.047878 ignition[1154]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:42:05.059268 ignition[1154]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:42:05.061198 ignition[1154]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:42:05.065142 systemd[1]: Finished sysroot-boot.service. Oct 2 19:42:05.081701 kernel: audit: type=1130 audit(1696275725.064:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:05.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:05.082014 ignition[1154]: INFO : PUT result: OK Oct 2 19:42:05.090271 ignition[1154]: INFO : mount: mount passed Oct 2 19:42:05.094405 ignition[1154]: INFO : Ignition finished successfully Oct 2 19:42:05.099538 systemd[1]: Finished ignition-mount.service. Oct 2 19:42:05.100780 systemd[1]: Starting ignition-files.service... Oct 2 19:42:05.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:05.108832 kernel: audit: type=1130 audit(1696275725.098:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:05.112133 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:42:05.127618 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1163) Oct 2 19:42:05.131275 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:42:05.131338 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:42:05.131356 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:42:05.138614 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:42:05.141749 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:42:05.156088 ignition[1182]: INFO : Ignition 2.14.0 Oct 2 19:42:05.156088 ignition[1182]: INFO : Stage: files Oct 2 19:42:05.158305 ignition[1182]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:42:05.158305 ignition[1182]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:42:05.169563 ignition[1182]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:42:05.172935 ignition[1182]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:42:05.174600 ignition[1182]: INFO : PUT result: OK Oct 2 19:42:05.178946 ignition[1182]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:42:05.183163 ignition[1182]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:42:05.183163 ignition[1182]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:42:05.219749 ignition[1182]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:42:05.221788 ignition[1182]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:42:05.224441 unknown[1182]: wrote ssh authorized keys file for user: core Oct 2 19:42:05.225911 ignition[1182]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:42:05.229443 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:42:05.231955 ignition[1182]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Oct 2 19:42:05.586521 ignition[1182]: INFO : GET result: OK Oct 2 19:42:05.944008 ignition[1182]: DEBUG : file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Oct 2 19:42:05.946921 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:42:05.946921 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:42:05.946921 ignition[1182]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Oct 2 19:42:06.173602 ignition[1182]: INFO : GET result: OK Oct 2 19:42:06.453209 ignition[1182]: DEBUG : file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Oct 2 19:42:06.457160 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:42:06.457160 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:42:06.457160 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:42:06.457160 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 19:42:06.467984 ignition[1182]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:42:06.474605 ignition[1182]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem210581783" Oct 2 19:42:06.476506 ignition[1182]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem210581783": device or resource busy Oct 2 19:42:06.476506 ignition[1182]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem210581783", trying btrfs: device or resource busy Oct 2 19:42:06.476506 ignition[1182]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem210581783" Oct 2 19:42:06.487905 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1185) Oct 2 19:42:06.487931 ignition[1182]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem210581783" Oct 2 19:42:06.489816 ignition[1182]: INFO : op(3): [started] unmounting "/mnt/oem210581783" Oct 2 19:42:06.493013 ignition[1182]: INFO : op(3): [finished] unmounting "/mnt/oem210581783" Oct 2 19:42:06.493013 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 19:42:06.493013 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:42:06.493013 ignition[1182]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:42:06.508714 systemd[1]: mnt-oem210581783.mount: Deactivated successfully. Oct 2 19:42:06.580445 ignition[1182]: INFO : GET result: OK Oct 2 19:42:06.999023 ignition[1182]: DEBUG : file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Oct 2 19:42:07.007771 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:42:07.007771 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:42:07.007771 ignition[1182]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:42:07.059945 ignition[1182]: INFO : GET result: OK Oct 2 19:42:07.731829 ignition[1182]: DEBUG : file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Oct 2 19:42:07.735155 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:42:07.735155 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:42:07.735155 ignition[1182]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubectl: attempt #1 Oct 2 19:42:07.789975 ignition[1182]: INFO : GET result: OK Oct 2 19:42:08.716258 ignition[1182]: DEBUG : file matches expected sum of: 33cf3f6e37bcee4dff7ce14ab933c605d07353d4e31446dd2b52c3f05e0b150b60e531f6069f112d8a76331322a72b593537531e62104cfc7c70cb03d46f76b3 Oct 2 19:42:08.720401 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:42:08.720401 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/bin/cilium.tar.gz" Oct 2 19:42:08.720401 ignition[1182]: INFO : GET https://github.com/cilium/cilium-cli/releases/download/v0.12.12/cilium-linux-amd64.tar.gz: attempt #1 Oct 2 19:42:08.804691 ignition[1182]: INFO : GET result: OK Oct 2 19:42:08.921686 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/bin/cilium.tar.gz" Oct 2 19:42:08.925654 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:42:08.930387 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:42:08.930387 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:42:08.936420 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:42:08.939921 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:42:08.952187 ignition[1182]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:42:08.972090 ignition[1182]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem906354336" Oct 2 19:42:08.975678 ignition[1182]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem906354336": device or resource busy Oct 2 19:42:08.975678 ignition[1182]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem906354336", trying btrfs: device or resource busy Oct 2 19:42:08.975678 ignition[1182]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem906354336" Oct 2 19:42:08.975678 ignition[1182]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem906354336" Oct 2 19:42:08.975678 ignition[1182]: INFO : op(6): [started] unmounting "/mnt/oem906354336" Oct 2 19:42:08.975678 ignition[1182]: INFO : op(6): [finished] unmounting "/mnt/oem906354336" Oct 2 19:42:08.975678 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:42:08.975678 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 19:42:09.003225 ignition[1182]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:42:08.979804 systemd[1]: mnt-oem906354336.mount: Deactivated successfully. Oct 2 19:42:09.012824 ignition[1182]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem287617912" Oct 2 19:42:09.015239 ignition[1182]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem287617912": device or resource busy Oct 2 19:42:09.015239 ignition[1182]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem287617912", trying btrfs: device or resource busy Oct 2 19:42:09.015239 ignition[1182]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem287617912" Oct 2 19:42:09.022459 ignition[1182]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem287617912" Oct 2 19:42:09.022459 ignition[1182]: INFO : op(9): [started] unmounting "/mnt/oem287617912" Oct 2 19:42:09.026409 ignition[1182]: INFO : op(9): [finished] unmounting "/mnt/oem287617912" Oct 2 19:42:09.026409 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 19:42:09.026409 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 19:42:09.026409 ignition[1182]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:42:09.023627 systemd[1]: mnt-oem287617912.mount: Deactivated successfully. Oct 2 19:42:09.045187 ignition[1182]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1587817568" Oct 2 19:42:09.047044 ignition[1182]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1587817568": device or resource busy Oct 2 19:42:09.047044 ignition[1182]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1587817568", trying btrfs: device or resource busy Oct 2 19:42:09.047044 ignition[1182]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1587817568" Oct 2 19:42:09.061128 ignition[1182]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1587817568" Oct 2 19:42:09.063292 ignition[1182]: INFO : op(c): [started] unmounting "/mnt/oem1587817568" Oct 2 19:42:09.064979 ignition[1182]: INFO : op(c): [finished] unmounting "/mnt/oem1587817568" Oct 2 19:42:09.066741 ignition[1182]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 19:42:09.066741 ignition[1182]: INFO : files: op(10): [started] processing unit "nvidia.service" Oct 2 19:42:09.066741 ignition[1182]: INFO : files: op(10): [finished] processing unit "nvidia.service" Oct 2 19:42:09.066741 ignition[1182]: INFO : files: op(11): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:42:09.066741 ignition[1182]: INFO : files: op(11): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:42:09.066741 ignition[1182]: INFO : files: op(12): [started] processing unit "amazon-ssm-agent.service" Oct 2 19:42:09.066741 ignition[1182]: INFO : files: op(12): op(13): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 19:42:09.066741 ignition[1182]: INFO : files: op(12): op(13): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 19:42:09.066741 ignition[1182]: INFO : files: op(12): [finished] processing unit "amazon-ssm-agent.service" Oct 2 19:42:09.066741 ignition[1182]: INFO : files: op(14): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:42:09.066741 ignition[1182]: INFO : files: op(14): op(15): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:42:09.066741 ignition[1182]: INFO : files: op(14): op(15): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:42:09.066741 ignition[1182]: INFO : files: op(14): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:42:09.066741 ignition[1182]: INFO : files: op(16): [started] processing unit "prepare-critools.service" Oct 2 19:42:09.066741 ignition[1182]: INFO : files: op(16): op(17): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:42:09.066741 ignition[1182]: INFO : files: op(16): op(17): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:42:09.066741 ignition[1182]: INFO : files: op(16): [finished] processing unit "prepare-critools.service" Oct 2 19:42:09.066741 ignition[1182]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" Oct 2 19:42:09.131930 ignition[1182]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" Oct 2 19:42:09.131930 ignition[1182]: INFO : files: op(19): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:42:09.131930 ignition[1182]: INFO : files: op(19): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:42:09.131930 ignition[1182]: INFO : files: op(1a): [started] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 19:42:09.131930 ignition[1182]: INFO : files: op(1a): [finished] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 19:42:09.131930 ignition[1182]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:42:09.131930 ignition[1182]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:42:09.131930 ignition[1182]: INFO : files: op(1c): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:42:09.131930 ignition[1182]: INFO : files: op(1c): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:42:09.170519 ignition[1182]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:42:09.170519 ignition[1182]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:42:09.170519 ignition[1182]: INFO : files: files passed Oct 2 19:42:09.170519 ignition[1182]: INFO : Ignition finished successfully Oct 2 19:42:09.179913 systemd[1]: Finished ignition-files.service. Oct 2 19:42:09.192253 kernel: audit: type=1130 audit(1696275729.182:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.201654 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:42:09.203336 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:42:09.225483 systemd[1]: Starting ignition-quench.service... Oct 2 19:42:09.231283 initrd-setup-root-after-ignition[1206]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:42:09.232333 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:42:09.232460 systemd[1]: Finished ignition-quench.service. Oct 2 19:42:09.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.237814 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:42:09.244709 kernel: audit: type=1130 audit(1696275729.235:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.244716 systemd[1]: Reached target ignition-complete.target. Oct 2 19:42:09.247879 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:42:09.279039 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:42:09.279135 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:42:09.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.281800 systemd[1]: Reached target initrd-fs.target. Oct 2 19:42:09.283055 systemd[1]: Reached target initrd.target. Oct 2 19:42:09.286074 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:42:09.288958 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:42:09.312444 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:42:09.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.318378 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:42:09.343109 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:42:09.343390 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:42:09.357993 systemd[1]: Stopped target timers.target. Oct 2 19:42:09.361101 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:42:09.363923 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:42:09.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.368249 systemd[1]: Stopped target initrd.target. Oct 2 19:42:09.370716 systemd[1]: Stopped target basic.target. Oct 2 19:42:09.373423 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:42:09.378778 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:42:09.381231 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:42:09.383906 systemd[1]: Stopped target remote-fs.target. Oct 2 19:42:09.387474 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:42:09.390691 systemd[1]: Stopped target sysinit.target. Oct 2 19:42:09.392924 systemd[1]: Stopped target local-fs.target. Oct 2 19:42:09.395554 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:42:09.400167 systemd[1]: Stopped target swap.target. Oct 2 19:42:09.400265 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:42:09.400381 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:42:09.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.407486 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:42:09.408981 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:42:09.409092 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:42:09.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.413831 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:42:09.416448 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:42:09.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.419250 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:42:09.421177 systemd[1]: Stopped ignition-files.service. Oct 2 19:42:09.425739 kernel: kauditd_printk_skb: 9 callbacks suppressed Oct 2 19:42:09.425768 kernel: audit: type=1131 audit(1696275729.422:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.425095 systemd[1]: Stopping ignition-mount.service... Oct 2 19:42:09.455520 kernel: audit: type=1131 audit(1696275729.441:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.455682 ignition[1220]: INFO : Ignition 2.14.0 Oct 2 19:42:09.455682 ignition[1220]: INFO : Stage: umount Oct 2 19:42:09.455682 ignition[1220]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:42:09.455682 ignition[1220]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:42:09.468343 kernel: audit: type=1131 audit(1696275729.449:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.437622 systemd[1]: Stopping iscsid.service... Oct 2 19:42:09.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.476959 iscsid[1032]: iscsid shutting down. Oct 2 19:42:09.481865 kernel: audit: type=1131 audit(1696275729.467:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.439490 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:42:09.441885 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:42:09.491275 ignition[1220]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:42:09.491275 ignition[1220]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:42:09.491275 ignition[1220]: INFO : PUT result: OK Oct 2 19:42:09.491275 ignition[1220]: INFO : umount: umount passed Oct 2 19:42:09.491275 ignition[1220]: INFO : Ignition finished successfully Oct 2 19:42:09.512897 kernel: audit: type=1131 audit(1696275729.485:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.512935 kernel: audit: type=1130 audit(1696275729.487:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.512955 kernel: audit: type=1131 audit(1696275729.487:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.442044 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:42:09.443673 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:42:09.443778 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:42:09.465280 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:42:09.465405 systemd[1]: Stopped iscsid.service. Oct 2 19:42:09.470288 systemd[1]: Stopping iscsiuio.service... Oct 2 19:42:09.484934 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:42:09.485051 systemd[1]: Stopped iscsiuio.service. Oct 2 19:42:09.487301 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:42:09.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.549651 kernel: audit: type=1131 audit(1696275729.530:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.487425 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:42:09.509067 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:42:09.509187 systemd[1]: Stopped ignition-mount.service. Oct 2 19:42:09.564690 kernel: audit: type=1131 audit(1696275729.552:54): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.564719 kernel: audit: type=1131 audit(1696275729.557:55): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.531819 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:42:09.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.531899 systemd[1]: Stopped ignition-disks.service. Oct 2 19:42:09.553306 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:42:09.553416 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:42:09.564687 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 19:42:09.564749 systemd[1]: Stopped ignition-fetch.service. Oct 2 19:42:09.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.565922 systemd[1]: Stopped target network.target. Oct 2 19:42:09.569186 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:42:09.570425 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:42:09.572821 systemd[1]: Stopped target paths.target. Oct 2 19:42:09.575028 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:42:09.582765 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:42:09.589109 systemd[1]: Stopped target slices.target. Oct 2 19:42:09.591532 systemd[1]: Stopped target sockets.target. Oct 2 19:42:09.593813 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:42:09.593881 systemd[1]: Closed iscsid.socket. Oct 2 19:42:09.596673 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:42:09.596729 systemd[1]: Closed iscsiuio.socket. Oct 2 19:42:09.599460 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:42:09.599540 systemd[1]: Stopped ignition-setup.service. Oct 2 19:42:09.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.602193 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:42:09.604621 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:42:09.606652 systemd-networkd[1027]: eth0: DHCPv6 lease lost Oct 2 19:42:09.609463 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:42:09.609663 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:42:09.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.617166 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:42:09.618636 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:42:09.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.622414 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:42:09.623851 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:42:09.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.625392 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:42:09.623000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:42:09.623000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:42:09.625456 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:42:09.627224 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:42:09.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.627277 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:42:09.632011 systemd[1]: Stopping network-cleanup.service... Oct 2 19:42:09.633583 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:42:09.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.633653 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:42:09.636761 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:42:09.636818 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:42:09.646160 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:42:09.646268 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:42:09.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.652157 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:42:09.657057 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:42:09.658774 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:42:09.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.661460 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:42:09.662297 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:42:09.675462 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:42:09.675515 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:42:09.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.677483 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:42:09.677995 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:42:09.682972 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:42:09.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.683043 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:42:09.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.687256 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:42:09.688355 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:42:09.700085 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:42:09.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.701354 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 2 19:42:09.701446 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 2 19:42:09.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.703187 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:42:09.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:09.703330 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:42:09.705708 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:42:09.705809 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:42:09.709370 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:42:09.709749 systemd[1]: Stopped network-cleanup.service. Oct 2 19:42:09.713165 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:42:09.714887 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:42:09.718815 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:42:09.722624 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:42:09.742958 systemd[1]: Switching root. Oct 2 19:42:09.767359 systemd-journald[185]: Journal stopped Oct 2 19:42:15.585860 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Oct 2 19:42:15.585945 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:42:15.585972 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:42:15.585996 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:42:15.586022 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:42:15.586044 kernel: SELinux: policy capability open_perms=1 Oct 2 19:42:15.586066 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:42:15.586087 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:42:15.586114 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:42:15.586141 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:42:15.586163 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:42:15.586199 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:42:15.586225 systemd[1]: Successfully loaded SELinux policy in 134.417ms. Oct 2 19:42:15.586267 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 23.860ms. Oct 2 19:42:15.586292 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:42:15.586315 systemd[1]: Detected virtualization amazon. Oct 2 19:42:15.586338 systemd[1]: Detected architecture x86-64. Oct 2 19:42:15.586363 systemd[1]: Detected first boot. Oct 2 19:42:15.586387 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:42:15.586493 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:42:15.586521 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:42:15.586550 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:42:15.586576 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:42:15.586624 kernel: kauditd_printk_skb: 29 callbacks suppressed Oct 2 19:42:15.586649 kernel: audit: type=1334 audit(1696275735.196:85): prog-id=12 op=LOAD Oct 2 19:42:15.586671 kernel: audit: type=1334 audit(1696275735.196:86): prog-id=3 op=UNLOAD Oct 2 19:42:15.586692 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:42:15.586715 kernel: audit: type=1334 audit(1696275735.197:87): prog-id=13 op=LOAD Oct 2 19:42:15.586735 kernel: audit: type=1334 audit(1696275735.199:88): prog-id=14 op=LOAD Oct 2 19:42:15.586756 kernel: audit: type=1334 audit(1696275735.199:89): prog-id=4 op=UNLOAD Oct 2 19:42:15.586778 kernel: audit: type=1334 audit(1696275735.199:90): prog-id=5 op=UNLOAD Oct 2 19:42:15.586800 kernel: audit: type=1131 audit(1696275735.200:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.586821 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:42:15.586848 kernel: audit: type=1130 audit(1696275735.216:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.586870 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:42:15.586892 kernel: audit: type=1131 audit(1696275735.216:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.586921 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:42:15.586944 kernel: audit: type=1334 audit(1696275735.216:94): prog-id=12 op=UNLOAD Oct 2 19:42:15.586968 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:42:15.586988 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 19:42:15.587011 systemd[1]: Created slice system-getty.slice. Oct 2 19:42:15.587037 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:42:15.587059 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:42:15.587082 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:42:15.587105 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:42:15.587128 systemd[1]: Created slice user.slice. Oct 2 19:42:15.587150 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:42:15.587173 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:42:15.587263 systemd[1]: Set up automount boot.automount. Oct 2 19:42:15.587288 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:42:15.587311 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:42:15.587336 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:42:15.587358 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:42:15.587382 systemd[1]: Reached target integritysetup.target. Oct 2 19:42:15.587404 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:42:15.587431 systemd[1]: Reached target remote-fs.target. Oct 2 19:42:15.587466 systemd[1]: Reached target slices.target. Oct 2 19:42:15.587489 systemd[1]: Reached target swap.target. Oct 2 19:42:15.587515 systemd[1]: Reached target torcx.target. Oct 2 19:42:15.587540 systemd[1]: Reached target veritysetup.target. Oct 2 19:42:15.587564 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:42:15.587588 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:42:15.587622 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:42:15.587650 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:42:15.587672 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:42:15.587695 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:42:15.587765 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:42:15.587791 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:42:15.587853 systemd[1]: Mounting media.mount... Oct 2 19:42:15.587881 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:42:15.587940 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:42:15.588022 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:42:15.588054 systemd[1]: Mounting tmp.mount... Oct 2 19:42:15.588113 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:42:15.588139 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:42:15.588195 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:42:15.588221 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:42:15.588312 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:42:15.588374 systemd[1]: Starting modprobe@drm.service... Oct 2 19:42:15.588400 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:42:15.588432 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:42:15.588499 systemd[1]: Starting modprobe@loop.service... Oct 2 19:42:15.588524 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:42:15.588547 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:42:15.588570 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:42:15.588604 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:42:15.588628 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:42:15.588650 systemd[1]: Stopped systemd-journald.service. Oct 2 19:42:15.588673 systemd[1]: Starting systemd-journald.service... Oct 2 19:42:15.588695 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:42:15.588722 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:42:15.588745 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:42:15.588769 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:42:15.588793 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:42:15.588815 systemd[1]: Stopped verity-setup.service. Oct 2 19:42:15.588839 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:42:15.588862 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:42:15.588886 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:42:15.588909 systemd[1]: Mounted media.mount. Oct 2 19:42:15.588936 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:42:15.588960 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:42:15.588984 systemd[1]: Mounted tmp.mount. Oct 2 19:42:15.589006 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:42:15.589029 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:42:15.589054 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:42:15.589076 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:42:15.589108 systemd-journald[1332]: Journal started Oct 2 19:42:15.589194 systemd-journald[1332]: Runtime Journal (/run/log/journal/ec200b2ce3ec7b11b9f66d954473c176) is 4.8M, max 38.7M, 33.9M free. Oct 2 19:42:10.418000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:42:10.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:42:10.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:42:10.637000 audit: BPF prog-id=10 op=LOAD Oct 2 19:42:15.598645 kernel: fuse: init (API version 7.34) Oct 2 19:42:10.637000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:42:10.637000 audit: BPF prog-id=11 op=LOAD Oct 2 19:42:10.637000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:42:15.196000 audit: BPF prog-id=12 op=LOAD Oct 2 19:42:15.196000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:42:15.197000 audit: BPF prog-id=13 op=LOAD Oct 2 19:42:15.199000 audit: BPF prog-id=14 op=LOAD Oct 2 19:42:15.199000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:42:15.199000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:42:15.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.216000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:42:15.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.482000 audit: BPF prog-id=15 op=LOAD Oct 2 19:42:15.482000 audit: BPF prog-id=16 op=LOAD Oct 2 19:42:15.482000 audit: BPF prog-id=17 op=LOAD Oct 2 19:42:15.482000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:42:15.482000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:42:15.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.582000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:42:15.582000 audit[1332]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffdc24bb330 a2=4000 a3=7ffdc24bb3cc items=0 ppid=1 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:15.582000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:42:15.195954 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:42:15.601943 kernel: loop: module loaded Oct 2 19:42:15.601987 systemd[1]: Finished modprobe@drm.service. Oct 2 19:42:10.970060 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:42:15.201483 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:42:10.970733 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:10Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:42:10.970753 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:10Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:42:10.970786 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:10Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:42:10.970796 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:10Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:42:10.970826 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:10Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:42:15.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.604675 systemd[1]: Started systemd-journald.service. Oct 2 19:42:15.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:10.970839 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:10Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:42:10.971025 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:10Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:42:10.971064 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:10Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:42:10.971077 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:10Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:42:10.971738 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:10Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:42:10.971772 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:10Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:42:10.971790 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:10Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:42:15.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:10.971805 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:10Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:42:15.606689 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:42:10.971822 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:10Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:42:15.606957 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:42:10.971836 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:10Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:42:14.574587 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:14Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:42:14.574886 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:14Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:42:14.574999 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:14Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:42:14.575189 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:14Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:42:15.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.608820 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:42:14.575234 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:14Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:42:14.575292 /usr/lib/systemd/system-generators/torcx-generator[1253]: time="2023-10-02T19:42:14Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:42:15.610829 systemd[1]: Finished modprobe@loop.service. Oct 2 19:42:15.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.612452 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:42:15.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.615237 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:42:15.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.618672 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:42:15.618842 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:42:15.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.620757 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:42:15.620996 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:42:15.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.622938 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:42:15.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.625335 systemd[1]: Reached target network-pre.target. Oct 2 19:42:15.628680 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:42:15.631697 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:42:15.636310 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:42:15.638989 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:42:15.642069 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:42:15.643763 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:42:15.645803 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:42:15.647171 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:42:15.649420 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:42:15.653268 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:42:15.654803 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:42:15.683820 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:42:15.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.685652 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:42:15.689032 systemd-journald[1332]: Time spent on flushing to /var/log/journal/ec200b2ce3ec7b11b9f66d954473c176 is 91.598ms for 1207 entries. Oct 2 19:42:15.689032 systemd-journald[1332]: System Journal (/var/log/journal/ec200b2ce3ec7b11b9f66d954473c176) is 8.0M, max 195.6M, 187.6M free. Oct 2 19:42:15.792704 systemd-journald[1332]: Received client request to flush runtime journal. Oct 2 19:42:15.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.708010 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:42:15.740836 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:42:15.748490 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:42:15.802470 udevadm[1367]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 2 19:42:15.778044 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:42:15.781784 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:42:15.795067 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:42:15.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:15.920276 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:42:15.923134 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:42:16.015450 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:42:16.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:16.469728 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:42:16.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:16.470000 audit: BPF prog-id=18 op=LOAD Oct 2 19:42:16.470000 audit: BPF prog-id=19 op=LOAD Oct 2 19:42:16.470000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:42:16.470000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:42:16.474133 systemd[1]: Starting systemd-udevd.service... Oct 2 19:42:16.507846 systemd-udevd[1371]: Using default interface naming scheme 'v252'. Oct 2 19:42:16.538775 systemd[1]: Started systemd-udevd.service. Oct 2 19:42:16.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:16.539000 audit: BPF prog-id=20 op=LOAD Oct 2 19:42:16.542506 systemd[1]: Starting systemd-networkd.service... Oct 2 19:42:16.550000 audit: BPF prog-id=21 op=LOAD Oct 2 19:42:16.550000 audit: BPF prog-id=22 op=LOAD Oct 2 19:42:16.550000 audit: BPF prog-id=23 op=LOAD Oct 2 19:42:16.553816 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:42:16.619262 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:42:16.621032 (udev-worker)[1375]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:42:16.656224 systemd[1]: Started systemd-userdbd.service. Oct 2 19:42:16.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:16.796618 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Oct 2 19:42:16.810137 systemd-networkd[1377]: lo: Link UP Oct 2 19:42:16.810149 systemd-networkd[1377]: lo: Gained carrier Oct 2 19:42:16.810993 systemd-networkd[1377]: Enumeration completed Oct 2 19:42:16.811128 systemd[1]: Started systemd-networkd.service. Oct 2 19:42:16.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:16.812464 systemd-networkd[1377]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:42:16.813924 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:42:16.824700 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:42:16.824839 systemd-networkd[1377]: eth0: Link UP Oct 2 19:42:16.825020 systemd-networkd[1377]: eth0: Gained carrier Oct 2 19:42:16.834909 kernel: ACPI: button: Power Button [PWRF] Oct 2 19:42:16.835105 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Oct 2 19:42:16.836774 systemd-networkd[1377]: eth0: DHCPv4 address 172.31.21.168/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 19:42:16.846262 kernel: ACPI: button: Sleep Button [SLPF] Oct 2 19:42:16.806000 audit[1382]: AVC avc: denied { confidentiality } for pid=1382 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:42:16.806000 audit[1382]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ce0232e820 a1=32194 a2=7fe17124bbc5 a3=5 items=106 ppid=1371 pid=1382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:16.806000 audit: CWD cwd="/" Oct 2 19:42:16.806000 audit: PATH item=0 name=(null) inode=14294 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=1 name=(null) inode=14295 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=2 name=(null) inode=14294 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=3 name=(null) inode=14296 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=4 name=(null) inode=14294 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=5 name=(null) inode=14297 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=6 name=(null) inode=14297 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=7 name=(null) inode=14298 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=8 name=(null) inode=14297 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=9 name=(null) inode=14299 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=10 name=(null) inode=14297 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=11 name=(null) inode=14300 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=12 name=(null) inode=14297 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=13 name=(null) inode=14301 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=14 name=(null) inode=14297 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=15 name=(null) inode=14302 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=16 name=(null) inode=14294 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=17 name=(null) inode=14303 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=18 name=(null) inode=14303 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=19 name=(null) inode=14304 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=20 name=(null) inode=14303 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=21 name=(null) inode=14305 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=22 name=(null) inode=14303 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=23 name=(null) inode=14306 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=24 name=(null) inode=14303 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=25 name=(null) inode=14307 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=26 name=(null) inode=14303 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=27 name=(null) inode=14308 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=28 name=(null) inode=14294 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=29 name=(null) inode=14309 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=30 name=(null) inode=14309 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=31 name=(null) inode=14310 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=32 name=(null) inode=14309 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=33 name=(null) inode=14311 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=34 name=(null) inode=14309 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=35 name=(null) inode=14312 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=36 name=(null) inode=14309 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=37 name=(null) inode=14313 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=38 name=(null) inode=14309 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=39 name=(null) inode=14314 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=40 name=(null) inode=14294 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=41 name=(null) inode=14315 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=42 name=(null) inode=14315 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=43 name=(null) inode=14316 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=44 name=(null) inode=14315 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=45 name=(null) inode=14317 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=46 name=(null) inode=14315 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=47 name=(null) inode=14318 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=48 name=(null) inode=14315 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=49 name=(null) inode=14319 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=50 name=(null) inode=14315 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=51 name=(null) inode=14320 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=52 name=(null) inode=1056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=53 name=(null) inode=14321 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=54 name=(null) inode=14321 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=55 name=(null) inode=14322 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=56 name=(null) inode=14321 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=57 name=(null) inode=14323 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=58 name=(null) inode=14321 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=59 name=(null) inode=14324 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=60 name=(null) inode=14324 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=61 name=(null) inode=14325 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=62 name=(null) inode=14324 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=63 name=(null) inode=14326 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=64 name=(null) inode=14324 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=65 name=(null) inode=14327 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=66 name=(null) inode=14324 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=67 name=(null) inode=14328 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=68 name=(null) inode=14324 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=69 name=(null) inode=14329 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=70 name=(null) inode=14321 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=71 name=(null) inode=14330 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=72 name=(null) inode=14330 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=73 name=(null) inode=14331 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=74 name=(null) inode=14330 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=75 name=(null) inode=14332 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=76 name=(null) inode=14330 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=77 name=(null) inode=14333 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=78 name=(null) inode=14330 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=79 name=(null) inode=14334 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=80 name=(null) inode=14330 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=81 name=(null) inode=14335 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=82 name=(null) inode=14321 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=83 name=(null) inode=14336 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=84 name=(null) inode=14336 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=85 name=(null) inode=15361 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=86 name=(null) inode=14336 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=87 name=(null) inode=15362 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=88 name=(null) inode=14336 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=89 name=(null) inode=15363 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=90 name=(null) inode=14336 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=91 name=(null) inode=15364 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=92 name=(null) inode=14336 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=93 name=(null) inode=15365 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=94 name=(null) inode=14321 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=95 name=(null) inode=15366 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=96 name=(null) inode=15366 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=97 name=(null) inode=15367 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=98 name=(null) inode=15366 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=99 name=(null) inode=15368 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=100 name=(null) inode=15366 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=101 name=(null) inode=15369 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=102 name=(null) inode=15366 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=103 name=(null) inode=15370 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=104 name=(null) inode=15366 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PATH item=105 name=(null) inode=15371 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:42:16.806000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:42:16.884623 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Oct 2 19:42:16.904650 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 Oct 2 19:42:16.922620 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:42:16.934664 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1385) Oct 2 19:42:17.053465 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:42:17.117191 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:42:17.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:17.122345 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:42:17.197428 lvm[1485]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:42:17.225606 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:42:17.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:17.227322 systemd[1]: Reached target cryptsetup.target. Oct 2 19:42:17.229750 systemd[1]: Starting lvm2-activation.service... Oct 2 19:42:17.237601 lvm[1486]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:42:17.263455 systemd[1]: Finished lvm2-activation.service. Oct 2 19:42:17.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:17.265058 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:42:17.266729 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:42:17.266787 systemd[1]: Reached target local-fs.target. Oct 2 19:42:17.268078 systemd[1]: Reached target machines.target. Oct 2 19:42:17.270711 systemd[1]: Starting ldconfig.service... Oct 2 19:42:17.272304 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:42:17.272668 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:42:17.275072 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:42:17.279832 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:42:17.282776 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:42:17.284046 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:42:17.284142 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:42:17.289372 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:42:17.324817 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1488 (bootctl) Oct 2 19:42:17.326835 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:42:17.328856 systemd-tmpfiles[1491]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:42:17.335547 systemd-tmpfiles[1491]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:42:17.340000 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:42:17.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:17.343832 systemd-tmpfiles[1491]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:42:17.459971 systemd-fsck[1496]: fsck.fat 4.2 (2021-01-31) Oct 2 19:42:17.459971 systemd-fsck[1496]: /dev/nvme0n1p1: 789 files, 115069/258078 clusters Oct 2 19:42:17.462305 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:42:17.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:17.466217 systemd[1]: Mounting boot.mount... Oct 2 19:42:17.482540 systemd[1]: Mounted boot.mount. Oct 2 19:42:17.513836 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:42:17.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:17.666479 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:42:17.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:17.670373 systemd[1]: Starting audit-rules.service... Oct 2 19:42:17.679000 audit: BPF prog-id=24 op=LOAD Oct 2 19:42:17.673917 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:42:17.677667 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:42:17.684587 systemd[1]: Starting systemd-resolved.service... Oct 2 19:42:17.688000 audit: BPF prog-id=25 op=LOAD Oct 2 19:42:17.694560 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:42:17.698204 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:42:17.729016 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:42:17.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:17.730725 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:42:17.741000 audit[1518]: SYSTEM_BOOT pid=1518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:42:17.747280 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:42:17.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:17.836802 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:42:17.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:17.850000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:42:17.850000 audit[1532]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff6003d740 a2=420 a3=0 items=0 ppid=1510 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:17.850000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:42:17.853206 augenrules[1532]: No rules Oct 2 19:42:17.853906 systemd[1]: Finished audit-rules.service. Oct 2 19:42:17.969869 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:42:17.971896 systemd[1]: Reached target time-set.target. Oct 2 19:42:18.007762 systemd-resolved[1513]: Positive Trust Anchors: Oct 2 19:42:18.007779 systemd-resolved[1513]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:42:18.007831 systemd-resolved[1513]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:42:19.030551 systemd-timesyncd[1515]: Contacted time server 5.78.89.3:123 (0.flatcar.pool.ntp.org). Oct 2 19:42:19.030718 systemd-timesyncd[1515]: Initial clock synchronization to Mon 2023-10-02 19:42:19.030290 UTC. Oct 2 19:42:19.236508 systemd-resolved[1513]: Defaulting to hostname 'linux'. Oct 2 19:42:19.240851 systemd[1]: Started systemd-resolved.service. Oct 2 19:42:19.242178 systemd[1]: Reached target network.target. Oct 2 19:42:19.243941 systemd[1]: Reached target nss-lookup.target. Oct 2 19:42:19.379813 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:42:19.380649 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:42:19.467035 systemd-networkd[1377]: eth0: Gained IPv6LL Oct 2 19:42:19.469649 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:42:19.471102 systemd[1]: Reached target network-online.target. Oct 2 19:42:19.766367 ldconfig[1487]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:42:19.771219 systemd[1]: Finished ldconfig.service. Oct 2 19:42:19.774884 systemd[1]: Starting systemd-update-done.service... Oct 2 19:42:19.784162 systemd[1]: Finished systemd-update-done.service. Oct 2 19:42:19.785499 systemd[1]: Reached target sysinit.target. Oct 2 19:42:19.786885 systemd[1]: Started motdgen.path. Oct 2 19:42:19.788428 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:42:19.790200 systemd[1]: Started logrotate.timer. Oct 2 19:42:19.791266 systemd[1]: Started mdadm.timer. Oct 2 19:42:19.792198 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:42:19.794774 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:42:19.794809 systemd[1]: Reached target paths.target. Oct 2 19:42:19.795924 systemd[1]: Reached target timers.target. Oct 2 19:42:19.798252 systemd[1]: Listening on dbus.socket. Oct 2 19:42:19.800767 systemd[1]: Starting docker.socket... Oct 2 19:42:19.804944 systemd[1]: Listening on sshd.socket. Oct 2 19:42:19.805973 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:42:19.806493 systemd[1]: Listening on docker.socket. Oct 2 19:42:19.807486 systemd[1]: Reached target sockets.target. Oct 2 19:42:19.808523 systemd[1]: Reached target basic.target. Oct 2 19:42:19.809485 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:42:19.809524 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:42:19.811763 systemd[1]: Started amazon-ssm-agent.service. Oct 2 19:42:19.815404 systemd[1]: Starting containerd.service... Oct 2 19:42:19.820044 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 19:42:19.824042 systemd[1]: Starting dbus.service... Oct 2 19:42:19.830751 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:42:19.834152 systemd[1]: Starting extend-filesystems.service... Oct 2 19:42:19.835646 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:42:19.837808 systemd[1]: Starting motdgen.service... Oct 2 19:42:19.854296 systemd[1]: Started nvidia.service. Oct 2 19:42:19.865873 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:42:19.869087 systemd[1]: Starting prepare-critools.service... Oct 2 19:42:19.871990 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:42:19.875606 systemd[1]: Starting sshd-keygen.service... Oct 2 19:42:19.882413 systemd[1]: Starting systemd-logind.service... Oct 2 19:42:19.890154 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:42:19.890241 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 19:42:19.890957 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:42:19.894932 systemd[1]: Starting update-engine.service... Oct 2 19:42:19.962613 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:42:19.968166 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:42:19.968397 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:42:19.992753 jq[1547]: false Oct 2 19:42:19.998727 jq[1560]: true Oct 2 19:42:20.038272 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:42:20.038489 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:42:20.057479 tar[1562]: ./ Oct 2 19:42:20.057479 tar[1562]: ./loopback Oct 2 19:42:20.061312 tar[1563]: crictl Oct 2 19:42:20.107760 dbus-daemon[1546]: [system] SELinux support is enabled Oct 2 19:42:20.108473 systemd[1]: Started dbus.service. Oct 2 19:42:20.112729 dbus-daemon[1546]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1377 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 2 19:42:20.112799 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:42:20.112837 systemd[1]: Reached target system-config.target. Oct 2 19:42:20.114354 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:42:20.114385 systemd[1]: Reached target user-config.target. Oct 2 19:42:20.124732 extend-filesystems[1548]: Found nvme0n1 Oct 2 19:42:20.128438 dbus-daemon[1546]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 19:42:20.134604 systemd[1]: Starting systemd-hostnamed.service... Oct 2 19:42:20.141491 extend-filesystems[1548]: Found nvme0n1p1 Oct 2 19:42:20.142838 extend-filesystems[1548]: Found nvme0n1p2 Oct 2 19:42:20.142838 extend-filesystems[1548]: Found nvme0n1p3 Oct 2 19:42:20.142838 extend-filesystems[1548]: Found usr Oct 2 19:42:20.149315 extend-filesystems[1548]: Found nvme0n1p4 Oct 2 19:42:20.149315 extend-filesystems[1548]: Found nvme0n1p6 Oct 2 19:42:20.149315 extend-filesystems[1548]: Found nvme0n1p7 Oct 2 19:42:20.149315 extend-filesystems[1548]: Found nvme0n1p9 Oct 2 19:42:20.149315 extend-filesystems[1548]: Checking size of /dev/nvme0n1p9 Oct 2 19:42:20.169517 amazon-ssm-agent[1543]: 2023/10/02 19:42:20 Failed to load instance info from vault. RegistrationKey does not exist. Oct 2 19:42:20.171697 amazon-ssm-agent[1543]: Initializing new seelog logger Oct 2 19:42:20.175694 jq[1577]: true Oct 2 19:42:20.193705 amazon-ssm-agent[1543]: New Seelog Logger Creation Complete Oct 2 19:42:20.199073 amazon-ssm-agent[1543]: 2023/10/02 19:42:20 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 19:42:20.201091 amazon-ssm-agent[1543]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 19:42:20.201484 amazon-ssm-agent[1543]: 2023/10/02 19:42:20 processing appconfig overrides Oct 2 19:42:20.212245 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:42:20.212540 systemd[1]: Finished motdgen.service. Oct 2 19:42:20.227081 extend-filesystems[1548]: Resized partition /dev/nvme0n1p9 Oct 2 19:42:20.271219 extend-filesystems[1607]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 19:42:20.280477 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Oct 2 19:42:20.367931 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Oct 2 19:42:20.392602 update_engine[1556]: I1002 19:42:20.370585 1556 main.cc:92] Flatcar Update Engine starting Oct 2 19:42:20.392602 update_engine[1556]: I1002 19:42:20.378201 1556 update_check_scheduler.cc:74] Next update check in 9m55s Oct 2 19:42:20.378152 systemd[1]: Started update-engine.service. Oct 2 19:42:20.389686 systemd[1]: Started locksmithd.service. Oct 2 19:42:20.396313 bash[1619]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:42:20.397192 extend-filesystems[1607]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Oct 2 19:42:20.397192 extend-filesystems[1607]: old_desc_blocks = 1, new_desc_blocks = 1 Oct 2 19:42:20.397192 extend-filesystems[1607]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Oct 2 19:42:20.397283 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:42:20.405990 extend-filesystems[1548]: Resized filesystem in /dev/nvme0n1p9 Oct 2 19:42:20.401295 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:42:20.401489 systemd[1]: Finished extend-filesystems.service. Oct 2 19:42:20.430301 env[1565]: time="2023-10-02T19:42:20.430223874Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:42:20.537975 tar[1562]: ./bandwidth Oct 2 19:42:20.542072 systemd-logind[1555]: Watching system buttons on /dev/input/event1 (Power Button) Oct 2 19:42:20.542403 systemd-logind[1555]: Watching system buttons on /dev/input/event2 (Sleep Button) Oct 2 19:42:20.542439 systemd-logind[1555]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:42:20.543436 systemd-logind[1555]: New seat seat0. Oct 2 19:42:20.551115 systemd[1]: Started systemd-logind.service. Oct 2 19:42:20.578168 systemd[1]: nvidia.service: Deactivated successfully. Oct 2 19:42:20.619729 env[1565]: time="2023-10-02T19:42:20.619645848Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:42:20.619892 env[1565]: time="2023-10-02T19:42:20.619858745Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:42:20.632210 env[1565]: time="2023-10-02T19:42:20.632147661Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:42:20.632210 env[1565]: time="2023-10-02T19:42:20.632207835Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:42:20.632534 env[1565]: time="2023-10-02T19:42:20.632505929Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:42:20.632592 env[1565]: time="2023-10-02T19:42:20.632536787Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:42:20.632592 env[1565]: time="2023-10-02T19:42:20.632557099Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:42:20.632592 env[1565]: time="2023-10-02T19:42:20.632573374Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:42:20.632724 env[1565]: time="2023-10-02T19:42:20.632673868Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:42:20.633116 env[1565]: time="2023-10-02T19:42:20.633081828Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:42:20.633344 env[1565]: time="2023-10-02T19:42:20.633314895Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:42:20.633409 env[1565]: time="2023-10-02T19:42:20.633346292Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:42:20.633486 env[1565]: time="2023-10-02T19:42:20.633438567Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:42:20.633542 env[1565]: time="2023-10-02T19:42:20.633456515Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:42:20.648428 env[1565]: time="2023-10-02T19:42:20.648342479Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:42:20.648428 env[1565]: time="2023-10-02T19:42:20.648405115Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:42:20.648428 env[1565]: time="2023-10-02T19:42:20.648425168Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:42:20.648775 env[1565]: time="2023-10-02T19:42:20.648495374Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:42:20.648775 env[1565]: time="2023-10-02T19:42:20.648519272Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:42:20.648775 env[1565]: time="2023-10-02T19:42:20.648725832Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:42:20.648775 env[1565]: time="2023-10-02T19:42:20.648754091Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:42:20.648943 env[1565]: time="2023-10-02T19:42:20.648795162Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:42:20.648943 env[1565]: time="2023-10-02T19:42:20.648817051Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:42:20.648943 env[1565]: time="2023-10-02T19:42:20.648836410Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:42:20.648943 env[1565]: time="2023-10-02T19:42:20.648868238Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:42:20.648943 env[1565]: time="2023-10-02T19:42:20.648890181Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:42:20.649120 env[1565]: time="2023-10-02T19:42:20.649084904Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:42:20.649248 env[1565]: time="2023-10-02T19:42:20.649212401Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:42:20.649737 env[1565]: time="2023-10-02T19:42:20.649708733Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:42:20.649812 env[1565]: time="2023-10-02T19:42:20.649769631Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:42:20.649812 env[1565]: time="2023-10-02T19:42:20.649800302Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:42:20.649967 env[1565]: time="2023-10-02T19:42:20.649889285Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:42:20.650074 env[1565]: time="2023-10-02T19:42:20.650053475Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:42:20.650126 env[1565]: time="2023-10-02T19:42:20.650083869Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:42:20.650126 env[1565]: time="2023-10-02T19:42:20.650101981Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:42:20.650126 env[1565]: time="2023-10-02T19:42:20.650121504Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:42:20.650317 env[1565]: time="2023-10-02T19:42:20.650155653Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:42:20.650317 env[1565]: time="2023-10-02T19:42:20.650175536Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:42:20.650317 env[1565]: time="2023-10-02T19:42:20.650241729Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:42:20.650317 env[1565]: time="2023-10-02T19:42:20.650264592Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:42:20.650475 env[1565]: time="2023-10-02T19:42:20.650442966Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:42:20.650475 env[1565]: time="2023-10-02T19:42:20.650465707Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:42:20.650552 env[1565]: time="2023-10-02T19:42:20.650484560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:42:20.650552 env[1565]: time="2023-10-02T19:42:20.650522739Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:42:20.650630 env[1565]: time="2023-10-02T19:42:20.650546585Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:42:20.650630 env[1565]: time="2023-10-02T19:42:20.650565984Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:42:20.650630 env[1565]: time="2023-10-02T19:42:20.650592124Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:42:20.650742 env[1565]: time="2023-10-02T19:42:20.650634183Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:42:20.651026 env[1565]: time="2023-10-02T19:42:20.650948830Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:42:20.657711 env[1565]: time="2023-10-02T19:42:20.651041752Z" level=info msg="Connect containerd service" Oct 2 19:42:20.657711 env[1565]: time="2023-10-02T19:42:20.651090988Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:42:20.658534 env[1565]: time="2023-10-02T19:42:20.658487333Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:42:20.663121 env[1565]: time="2023-10-02T19:42:20.663084058Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:42:20.663225 env[1565]: time="2023-10-02T19:42:20.663164627Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:42:20.663298 systemd[1]: Started containerd.service. Oct 2 19:42:20.664391 env[1565]: time="2023-10-02T19:42:20.663927357Z" level=info msg="containerd successfully booted in 0.285515s" Oct 2 19:42:20.665348 dbus-daemon[1546]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 2 19:42:20.665864 systemd[1]: Started systemd-hostnamed.service. Oct 2 19:42:20.667250 env[1565]: time="2023-10-02T19:42:20.666591871Z" level=info msg="Start subscribing containerd event" Oct 2 19:42:20.667250 env[1565]: time="2023-10-02T19:42:20.666682299Z" level=info msg="Start recovering state" Oct 2 19:42:20.669157 env[1565]: time="2023-10-02T19:42:20.666764340Z" level=info msg="Start event monitor" Oct 2 19:42:20.669278 env[1565]: time="2023-10-02T19:42:20.669165687Z" level=info msg="Start snapshots syncer" Oct 2 19:42:20.669278 env[1565]: time="2023-10-02T19:42:20.669229443Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:42:20.669278 env[1565]: time="2023-10-02T19:42:20.669244219Z" level=info msg="Start streaming server" Oct 2 19:42:20.669660 dbus-daemon[1546]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1588 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 2 19:42:20.673434 systemd[1]: Starting polkit.service... Oct 2 19:42:20.697634 polkitd[1646]: Started polkitd version 121 Oct 2 19:42:20.723975 polkitd[1646]: Loading rules from directory /etc/polkit-1/rules.d Oct 2 19:42:20.724067 polkitd[1646]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 2 19:42:20.737697 polkitd[1646]: Finished loading, compiling and executing 2 rules Oct 2 19:42:20.738508 dbus-daemon[1546]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 2 19:42:20.738711 systemd[1]: Started polkit.service. Oct 2 19:42:20.740078 polkitd[1646]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 2 19:42:20.780009 systemd-hostnamed[1588]: Hostname set to (transient) Oct 2 19:42:20.780140 systemd-resolved[1513]: System hostname changed to 'ip-172-31-21-168'. Oct 2 19:42:20.826289 tar[1562]: ./ptp Oct 2 19:42:20.986277 amazon-ssm-agent[1543]: 2023-10-02 19:42:20 INFO Entering SSM Agent hibernate - AccessDeniedException: User: arn:aws:sts::075585003325:assumed-role/jenkins-test/i-044a78b7f4bff8b37 is not authorized to perform: ssm:UpdateInstanceInformation on resource: arn:aws:ec2:us-west-2:075585003325:instance/i-044a78b7f4bff8b37 because no identity-based policy allows the ssm:UpdateInstanceInformation action Oct 2 19:42:20.986277 amazon-ssm-agent[1543]: status code: 400, request id: 6ce63922-7c2e-44ce-a18f-e063822dded8 Oct 2 19:42:20.986277 amazon-ssm-agent[1543]: 2023-10-02 19:42:20 INFO Agent is in hibernate mode. Reducing logging. Logging will be reduced to one log per backoff period Oct 2 19:42:21.032443 coreos-metadata[1545]: Oct 02 19:42:21.027 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Oct 2 19:42:21.034180 tar[1562]: ./vlan Oct 2 19:42:21.036597 coreos-metadata[1545]: Oct 02 19:42:21.036 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Oct 2 19:42:21.036794 coreos-metadata[1545]: Oct 02 19:42:21.036 INFO Fetch successful Oct 2 19:42:21.036901 coreos-metadata[1545]: Oct 02 19:42:21.036 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Oct 2 19:42:21.037671 coreos-metadata[1545]: Oct 02 19:42:21.037 INFO Fetch successful Oct 2 19:42:21.043600 unknown[1545]: wrote ssh authorized keys file for user: core Oct 2 19:42:21.072358 update-ssh-keys[1707]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:42:21.073088 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 19:42:21.186626 tar[1562]: ./host-device Oct 2 19:42:21.330187 tar[1562]: ./tuning Oct 2 19:42:21.433709 tar[1562]: ./vrf Oct 2 19:42:21.558518 tar[1562]: ./sbr Oct 2 19:42:21.589709 systemd[1]: Finished prepare-critools.service. Oct 2 19:42:21.644918 tar[1562]: ./tap Oct 2 19:42:21.713365 tar[1562]: ./dhcp Oct 2 19:42:21.846675 tar[1562]: ./static Oct 2 19:42:21.897335 tar[1562]: ./firewall Oct 2 19:42:21.996204 tar[1562]: ./macvlan Oct 2 19:42:22.052965 tar[1562]: ./dummy Oct 2 19:42:22.107600 tar[1562]: ./bridge Oct 2 19:42:22.162676 tar[1562]: ./ipvlan Oct 2 19:42:22.216526 tar[1562]: ./portmap Oct 2 19:42:22.267641 tar[1562]: ./host-local Oct 2 19:42:22.327746 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:42:22.467406 locksmithd[1629]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:42:22.896115 sshd_keygen[1580]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:42:22.919612 systemd[1]: Finished sshd-keygen.service. Oct 2 19:42:22.922361 systemd[1]: Starting issuegen.service... Oct 2 19:42:22.930008 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:42:22.930172 systemd[1]: Finished issuegen.service. Oct 2 19:42:22.933015 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:42:22.941067 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:42:22.944019 systemd[1]: Started getty@tty1.service. Oct 2 19:42:22.947367 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:42:22.948650 systemd[1]: Reached target getty.target. Oct 2 19:42:22.949811 systemd[1]: Reached target multi-user.target. Oct 2 19:42:22.952436 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:42:22.962608 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:42:22.962835 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:42:22.964279 systemd[1]: Startup finished in 813ms (kernel) + 10.420s (initrd) + 11.732s (userspace) = 22.966s. Oct 2 19:42:28.787850 systemd[1]: Created slice system-sshd.slice. Oct 2 19:42:28.789519 systemd[1]: Started sshd@0-172.31.21.168:22-139.178.89.65:44614.service. Oct 2 19:42:28.962134 sshd[1757]: Accepted publickey for core from 139.178.89.65 port 44614 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:42:28.964418 sshd[1757]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:42:28.978114 systemd[1]: Created slice user-500.slice. Oct 2 19:42:28.981428 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:42:28.986992 systemd-logind[1555]: New session 1 of user core. Oct 2 19:42:28.994843 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:42:28.997228 systemd[1]: Starting user@500.service... Oct 2 19:42:29.001759 (systemd)[1760]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:42:29.112580 systemd[1760]: Queued start job for default target default.target. Oct 2 19:42:29.113365 systemd[1760]: Reached target paths.target. Oct 2 19:42:29.113399 systemd[1760]: Reached target sockets.target. Oct 2 19:42:29.113438 systemd[1760]: Reached target timers.target. Oct 2 19:42:29.113454 systemd[1760]: Reached target basic.target. Oct 2 19:42:29.113595 systemd[1]: Started user@500.service. Oct 2 19:42:29.115771 systemd[1]: Started session-1.scope. Oct 2 19:42:29.116837 systemd[1760]: Reached target default.target. Oct 2 19:42:29.117091 systemd[1760]: Startup finished in 106ms. Oct 2 19:42:29.270069 systemd[1]: Started sshd@1-172.31.21.168:22-139.178.89.65:44624.service. Oct 2 19:42:29.442259 sshd[1769]: Accepted publickey for core from 139.178.89.65 port 44624 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:42:29.443651 sshd[1769]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:42:29.448756 systemd-logind[1555]: New session 2 of user core. Oct 2 19:42:29.449392 systemd[1]: Started session-2.scope. Oct 2 19:42:29.584502 sshd[1769]: pam_unix(sshd:session): session closed for user core Oct 2 19:42:29.591388 systemd[1]: sshd@1-172.31.21.168:22-139.178.89.65:44624.service: Deactivated successfully. Oct 2 19:42:29.593863 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 19:42:29.596035 systemd-logind[1555]: Session 2 logged out. Waiting for processes to exit. Oct 2 19:42:29.598782 systemd-logind[1555]: Removed session 2. Oct 2 19:42:29.620824 systemd[1]: Started sshd@2-172.31.21.168:22-139.178.89.65:44628.service. Oct 2 19:42:29.787220 sshd[1775]: Accepted publickey for core from 139.178.89.65 port 44628 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:42:29.790460 sshd[1775]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:42:29.799112 systemd-logind[1555]: New session 3 of user core. Oct 2 19:42:29.799697 systemd[1]: Started session-3.scope. Oct 2 19:42:29.919021 sshd[1775]: pam_unix(sshd:session): session closed for user core Oct 2 19:42:29.922795 systemd[1]: sshd@2-172.31.21.168:22-139.178.89.65:44628.service: Deactivated successfully. Oct 2 19:42:29.924170 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 19:42:29.925459 systemd-logind[1555]: Session 3 logged out. Waiting for processes to exit. Oct 2 19:42:29.926867 systemd-logind[1555]: Removed session 3. Oct 2 19:42:29.944514 systemd[1]: Started sshd@3-172.31.21.168:22-139.178.89.65:44644.service. Oct 2 19:42:30.102601 sshd[1781]: Accepted publickey for core from 139.178.89.65 port 44644 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:42:30.104171 sshd[1781]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:42:30.111862 systemd[1]: Started session-4.scope. Oct 2 19:42:30.113101 systemd-logind[1555]: New session 4 of user core. Oct 2 19:42:30.252193 sshd[1781]: pam_unix(sshd:session): session closed for user core Oct 2 19:42:30.258191 systemd-logind[1555]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:42:30.258449 systemd[1]: sshd@3-172.31.21.168:22-139.178.89.65:44644.service: Deactivated successfully. Oct 2 19:42:30.259657 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:42:30.260789 systemd-logind[1555]: Removed session 4. Oct 2 19:42:30.279361 systemd[1]: Started sshd@4-172.31.21.168:22-139.178.89.65:44652.service. Oct 2 19:42:30.441321 sshd[1787]: Accepted publickey for core from 139.178.89.65 port 44652 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:42:30.443230 sshd[1787]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:42:30.448937 systemd[1]: Started session-5.scope. Oct 2 19:42:30.449613 systemd-logind[1555]: New session 5 of user core. Oct 2 19:42:30.567276 sudo[1790]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:42:30.567755 sudo[1790]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:42:30.577298 dbus-daemon[1546]: \xd0M\xcf\xda\xc1U: received setenforce notice (enforcing=1800786912) Oct 2 19:42:30.580259 sudo[1790]: pam_unix(sudo:session): session closed for user root Oct 2 19:42:30.604635 sshd[1787]: pam_unix(sshd:session): session closed for user core Oct 2 19:42:30.608292 systemd[1]: sshd@4-172.31.21.168:22-139.178.89.65:44652.service: Deactivated successfully. Oct 2 19:42:30.609424 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:42:30.610153 systemd-logind[1555]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:42:30.611209 systemd-logind[1555]: Removed session 5. Oct 2 19:42:30.631459 systemd[1]: Started sshd@5-172.31.21.168:22-139.178.89.65:44660.service. Oct 2 19:42:30.790988 sshd[1794]: Accepted publickey for core from 139.178.89.65 port 44660 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:42:30.793113 sshd[1794]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:42:30.800242 systemd-logind[1555]: New session 6 of user core. Oct 2 19:42:30.800846 systemd[1]: Started session-6.scope. Oct 2 19:42:30.905713 sudo[1798]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:42:30.906027 sudo[1798]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:42:30.913778 sudo[1798]: pam_unix(sudo:session): session closed for user root Oct 2 19:42:30.919042 sudo[1797]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:42:30.919402 sudo[1797]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:42:30.935957 systemd[1]: Stopping audit-rules.service... Oct 2 19:42:30.937000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:42:30.939496 kernel: kauditd_printk_skb: 175 callbacks suppressed Oct 2 19:42:30.939747 kernel: audit: type=1305 audit(1696275750.937:157): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:42:30.939787 auditctl[1801]: No rules Oct 2 19:42:30.940384 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:42:30.940586 systemd[1]: Stopped audit-rules.service. Oct 2 19:42:30.937000 audit[1801]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc9d9e6810 a2=420 a3=0 items=0 ppid=1 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:30.944057 systemd[1]: Starting audit-rules.service... Oct 2 19:42:30.953936 kernel: audit: type=1300 audit(1696275750.937:157): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc9d9e6810 a2=420 a3=0 items=0 ppid=1 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:30.954049 kernel: audit: type=1327 audit(1696275750.937:157): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:42:30.954081 kernel: audit: type=1131 audit(1696275750.939:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:30.937000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:42:30.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:30.977703 augenrules[1818]: No rules Oct 2 19:42:30.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:30.978647 systemd[1]: Finished audit-rules.service. Oct 2 19:42:30.980730 sudo[1797]: pam_unix(sudo:session): session closed for user root Oct 2 19:42:30.979000 audit[1797]: USER_END pid=1797 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:42:30.993497 kernel: audit: type=1130 audit(1696275750.977:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:30.993635 kernel: audit: type=1106 audit(1696275750.979:160): pid=1797 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:42:30.993671 kernel: audit: type=1104 audit(1696275750.980:161): pid=1797 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:42:30.980000 audit[1797]: CRED_DISP pid=1797 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:42:31.003337 sshd[1794]: pam_unix(sshd:session): session closed for user core Oct 2 19:42:31.008000 audit[1794]: USER_END pid=1794 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:42:31.022079 kernel: audit: type=1106 audit(1696275751.008:162): pid=1794 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:42:31.017289 systemd-logind[1555]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:42:31.019436 systemd[1]: sshd@5-172.31.21.168:22-139.178.89.65:44660.service: Deactivated successfully. Oct 2 19:42:31.020357 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:42:31.021811 systemd-logind[1555]: Removed session 6. Oct 2 19:42:31.009000 audit[1794]: CRED_DISP pid=1794 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:42:31.034066 kernel: audit: type=1104 audit(1696275751.009:163): pid=1794 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:42:31.034152 kernel: audit: type=1131 audit(1696275751.018:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.21.168:22-139.178.89.65:44660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:31.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.21.168:22-139.178.89.65:44660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:31.034976 systemd[1]: Started sshd@6-172.31.21.168:22-139.178.89.65:44674.service. Oct 2 19:42:31.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.168:22-139.178.89.65:44674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:31.190000 audit[1824]: USER_ACCT pid=1824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:42:31.191417 sshd[1824]: Accepted publickey for core from 139.178.89.65 port 44674 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:42:31.192000 audit[1824]: CRED_ACQ pid=1824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:42:31.192000 audit[1824]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc55dca680 a2=3 a3=0 items=0 ppid=1 pid=1824 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:31.192000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:42:31.193782 sshd[1824]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:42:31.199060 systemd[1]: Started session-7.scope. Oct 2 19:42:31.199699 systemd-logind[1555]: New session 7 of user core. Oct 2 19:42:31.204000 audit[1824]: USER_START pid=1824 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:42:31.205000 audit[1826]: CRED_ACQ pid=1826 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:42:31.301000 audit[1827]: USER_ACCT pid=1827 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:42:31.302592 sudo[1827]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:42:31.301000 audit[1827]: CRED_REFR pid=1827 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:42:31.302886 sudo[1827]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:42:31.303000 audit[1827]: USER_START pid=1827 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:42:31.922988 systemd[1]: Starting docker.service... Oct 2 19:42:31.980865 env[1842]: time="2023-10-02T19:42:31.980806494Z" level=info msg="Starting up" Oct 2 19:42:31.982355 env[1842]: time="2023-10-02T19:42:31.982331809Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:42:31.982480 env[1842]: time="2023-10-02T19:42:31.982467699Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:42:31.982541 env[1842]: time="2023-10-02T19:42:31.982529366Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:42:31.982583 env[1842]: time="2023-10-02T19:42:31.982575292Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:42:31.986190 env[1842]: time="2023-10-02T19:42:31.986153275Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:42:31.986190 env[1842]: time="2023-10-02T19:42:31.986174758Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:42:31.986353 env[1842]: time="2023-10-02T19:42:31.986196211Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:42:31.986353 env[1842]: time="2023-10-02T19:42:31.986208378Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:42:31.993688 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1872668586-merged.mount: Deactivated successfully. Oct 2 19:42:32.034791 env[1842]: time="2023-10-02T19:42:32.034745689Z" level=info msg="Loading containers: start." Oct 2 19:42:32.097000 audit[1872]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1872 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.097000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff6a148c50 a2=0 a3=7fff6a148c3c items=0 ppid=1842 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.097000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 19:42:32.099000 audit[1874]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1874 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.099000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff5d1b4f00 a2=0 a3=7fff5d1b4eec items=0 ppid=1842 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.099000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 19:42:32.101000 audit[1876]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1876 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.101000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffeadf5460 a2=0 a3=7fffeadf544c items=0 ppid=1842 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.101000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:42:32.103000 audit[1878]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1878 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.103000 audit[1878]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc326a5430 a2=0 a3=7ffc326a541c items=0 ppid=1842 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.103000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:42:32.106000 audit[1880]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1880 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.106000 audit[1880]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd5223eec0 a2=0 a3=7ffd5223eeac items=0 ppid=1842 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.106000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 19:42:32.124000 audit[1885]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.124000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffce9c75390 a2=0 a3=7ffce9c7537c items=0 ppid=1842 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.124000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 19:42:32.134000 audit[1887]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1887 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.134000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc5e381680 a2=0 a3=7ffc5e38166c items=0 ppid=1842 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.134000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 19:42:32.136000 audit[1889]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1889 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.136000 audit[1889]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffdb951c330 a2=0 a3=7ffdb951c31c items=0 ppid=1842 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.136000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 19:42:32.138000 audit[1892]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1892 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.138000 audit[1892]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffea3147f40 a2=0 a3=7ffea3147f2c items=0 ppid=1842 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.138000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:42:32.150000 audit[1896]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1896 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.150000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffebd288ff0 a2=0 a3=7ffebd288fdc items=0 ppid=1842 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.150000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:42:32.151000 audit[1897]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1897 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.151000 audit[1897]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc6257aae0 a2=0 a3=7ffc6257aacc items=0 ppid=1842 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.151000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:42:32.162985 kernel: Initializing XFRM netlink socket Oct 2 19:42:32.206483 env[1842]: time="2023-10-02T19:42:32.203086884Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 19:42:32.210716 (udev-worker)[1852]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:42:32.263000 audit[1905]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.263000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffc36d1750 a2=0 a3=7fffc36d173c items=0 ppid=1842 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.263000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 19:42:32.325000 audit[1908]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1908 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.325000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff1034c8c0 a2=0 a3=7fff1034c8ac items=0 ppid=1842 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.325000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 19:42:32.329000 audit[1911]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1911 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.329000 audit[1911]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc3db5d4c0 a2=0 a3=7ffc3db5d4ac items=0 ppid=1842 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.329000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 19:42:32.334000 audit[1913]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1913 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.334000 audit[1913]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff0aae4530 a2=0 a3=7fff0aae451c items=0 ppid=1842 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.334000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 19:42:32.336000 audit[1915]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.336000 audit[1915]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe3141ced0 a2=0 a3=7ffe3141cebc items=0 ppid=1842 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.336000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 19:42:32.339000 audit[1917]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.339000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd42250d30 a2=0 a3=7ffd42250d1c items=0 ppid=1842 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.339000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 19:42:32.342000 audit[1919]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1919 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.342000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe5b1f6420 a2=0 a3=7ffe5b1f640c items=0 ppid=1842 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.342000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 19:42:32.354000 audit[1922]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1922 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.354000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffee917fbc0 a2=0 a3=7ffee917fbac items=0 ppid=1842 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.354000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 19:42:32.359000 audit[1924]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.359000 audit[1924]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff83c6bd30 a2=0 a3=7fff83c6bd1c items=0 ppid=1842 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.359000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:42:32.361000 audit[1926]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.361000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe5aeb6b20 a2=0 a3=7ffe5aeb6b0c items=0 ppid=1842 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.361000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:42:32.364000 audit[1928]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.364000 audit[1928]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff6a373270 a2=0 a3=7fff6a37325c items=0 ppid=1842 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.364000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 19:42:32.365820 systemd-networkd[1377]: docker0: Link UP Oct 2 19:42:32.376000 audit[1932]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.376000 audit[1932]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd1abb3a30 a2=0 a3=7ffd1abb3a1c items=0 ppid=1842 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.376000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:42:32.377000 audit[1933]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1933 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:42:32.377000 audit[1933]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd344bafb0 a2=0 a3=7ffd344baf9c items=0 ppid=1842 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:42:32.377000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:42:32.379117 env[1842]: time="2023-10-02T19:42:32.379084423Z" level=info msg="Loading containers: done." Oct 2 19:42:32.392043 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3298598217-merged.mount: Deactivated successfully. Oct 2 19:42:32.410995 env[1842]: time="2023-10-02T19:42:32.410947798Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 19:42:32.411223 env[1842]: time="2023-10-02T19:42:32.411199113Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 19:42:32.411346 env[1842]: time="2023-10-02T19:42:32.411323728Z" level=info msg="Daemon has completed initialization" Oct 2 19:42:32.431080 systemd[1]: Started docker.service. Oct 2 19:42:32.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:32.446509 env[1842]: time="2023-10-02T19:42:32.446350148Z" level=info msg="API listen on /run/docker.sock" Oct 2 19:42:32.470646 systemd[1]: Reloading. Oct 2 19:42:32.612106 /usr/lib/systemd/system-generators/torcx-generator[1985]: time="2023-10-02T19:42:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:42:32.612628 /usr/lib/systemd/system-generators/torcx-generator[1985]: time="2023-10-02T19:42:32Z" level=info msg="torcx already run" Oct 2 19:42:32.701871 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:42:32.701894 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:42:32.730022 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:42:32.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.836000 audit: BPF prog-id=34 op=LOAD Oct 2 19:42:32.836000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:42:32.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.839000 audit: BPF prog-id=35 op=LOAD Oct 2 19:42:32.839000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:42:32.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.840000 audit: BPF prog-id=36 op=LOAD Oct 2 19:42:32.840000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:42:32.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.840000 audit: BPF prog-id=37 op=LOAD Oct 2 19:42:32.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.840000 audit: BPF prog-id=38 op=LOAD Oct 2 19:42:32.840000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:42:32.840000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:42:32.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.841000 audit: BPF prog-id=39 op=LOAD Oct 2 19:42:32.842000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:42:32.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.844000 audit: BPF prog-id=40 op=LOAD Oct 2 19:42:32.844000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:42:32.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.845000 audit: BPF prog-id=41 op=LOAD Oct 2 19:42:32.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.845000 audit: BPF prog-id=42 op=LOAD Oct 2 19:42:32.845000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:42:32.845000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit: BPF prog-id=43 op=LOAD Oct 2 19:42:32.846000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit: BPF prog-id=44 op=LOAD Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.846000 audit: BPF prog-id=45 op=LOAD Oct 2 19:42:32.846000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:42:32.846000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:42:32.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.851000 audit: BPF prog-id=46 op=LOAD Oct 2 19:42:32.851000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:42:32.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.851000 audit: BPF prog-id=47 op=LOAD Oct 2 19:42:32.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.851000 audit: BPF prog-id=48 op=LOAD Oct 2 19:42:32.851000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:42:32.851000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:42:32.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.853000 audit: BPF prog-id=49 op=LOAD Oct 2 19:42:32.853000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:42:32.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.853000 audit: BPF prog-id=50 op=LOAD Oct 2 19:42:32.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:42:32.853000 audit: BPF prog-id=51 op=LOAD Oct 2 19:42:32.853000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:42:32.853000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:42:32.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:32.873592 systemd[1]: Started kubelet.service. Oct 2 19:42:32.966453 kubelet[2032]: E1002 19:42:32.966394 2032 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:42:32.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:42:32.968670 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:42:32.968793 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:42:33.303203 env[1565]: time="2023-10-02T19:42:33.303158533Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\"" Oct 2 19:42:33.928148 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2541653562.mount: Deactivated successfully. Oct 2 19:42:38.364501 env[1565]: time="2023-10-02T19:42:38.364448421Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:38.367351 env[1565]: time="2023-10-02T19:42:38.367304791Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcab12b2dd16cce4efc5dd43c082469364f19ad978e922d110b74a42eff7cce,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:38.369953 env[1565]: time="2023-10-02T19:42:38.369872984Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:38.378826 env[1565]: time="2023-10-02T19:42:38.378766559Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\" returns image reference \"sha256:cdcab12b2dd16cce4efc5dd43c082469364f19ad978e922d110b74a42eff7cce\"" Oct 2 19:42:38.379878 env[1565]: time="2023-10-02T19:42:38.379842711Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:6beea2e5531a0606613594fd3ed92d71bbdcef99dd3237522049a0b32cad736c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:38.396695 env[1565]: time="2023-10-02T19:42:38.396651500Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\"" Oct 2 19:42:42.588924 env[1565]: time="2023-10-02T19:42:42.588868876Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:42.591530 env[1565]: time="2023-10-02T19:42:42.591487459Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:55f13c92defb1eb854040a76e366da866bdcb1cc31fd97b2cde94433c8bf3f57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:42.593624 env[1565]: time="2023-10-02T19:42:42.593584792Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:42.595671 env[1565]: time="2023-10-02T19:42:42.595637885Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6a42ce14d716205a99763f3c732c0a8f0ea041bdbbea7d2dfffcc53dafd7cac4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:42.596291 env[1565]: time="2023-10-02T19:42:42.596255747Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\" returns image reference \"sha256:55f13c92defb1eb854040a76e366da866bdcb1cc31fd97b2cde94433c8bf3f57\"" Oct 2 19:42:42.608044 env[1565]: time="2023-10-02T19:42:42.608004255Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\"" Oct 2 19:42:43.220463 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 19:42:43.220738 systemd[1]: Stopped kubelet.service. Oct 2 19:42:43.228418 kernel: kauditd_printk_skb: 292 callbacks suppressed Oct 2 19:42:43.228555 kernel: audit: type=1130 audit(1696275763.219:407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:43.228591 kernel: audit: type=1131 audit(1696275763.219:408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:43.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:43.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:43.222725 systemd[1]: Started kubelet.service. Oct 2 19:42:43.237344 kernel: audit: type=1130 audit(1696275763.221:409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:43.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:43.277618 kubelet[2060]: E1002 19:42:43.277560 2060 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:42:43.283895 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:42:43.284096 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:42:43.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:42:43.289978 kernel: audit: type=1131 audit(1696275763.283:410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:42:45.197306 env[1565]: time="2023-10-02T19:42:45.197247504Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:45.199180 env[1565]: time="2023-10-02T19:42:45.199137362Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7a5d9d67a13f6ae031989bc2969ec55b06437725f397e6eb75b1dccac465a7b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:45.207348 env[1565]: time="2023-10-02T19:42:45.207295835Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:45.211261 env[1565]: time="2023-10-02T19:42:45.211216550Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:6511193f8114a2f011790619698efe12a8119ed9a17e2e36f4c1c759ccf173ab,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:45.212114 env[1565]: time="2023-10-02T19:42:45.212067248Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\" returns image reference \"sha256:7a5d9d67a13f6ae031989bc2969ec55b06437725f397e6eb75b1dccac465a7b8\"" Oct 2 19:42:45.226604 env[1565]: time="2023-10-02T19:42:45.226507168Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\"" Oct 2 19:42:46.728161 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2558772315.mount: Deactivated successfully. Oct 2 19:42:47.502169 env[1565]: time="2023-10-02T19:42:47.502073508Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:47.506116 env[1565]: time="2023-10-02T19:42:47.506058246Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c120fed2beb84b861c2382ce81ab046c0ae612e91264ef7c9e61df5900fa0bb0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:47.508622 env[1565]: time="2023-10-02T19:42:47.508571431Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:47.511021 env[1565]: time="2023-10-02T19:42:47.510804963Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:41c8f92d1cd571e0e36af431f35c78379f84f5daf5b85d43014a9940d697afcf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:47.511812 env[1565]: time="2023-10-02T19:42:47.511776535Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\" returns image reference \"sha256:c120fed2beb84b861c2382ce81ab046c0ae612e91264ef7c9e61df5900fa0bb0\"" Oct 2 19:42:47.535100 env[1565]: time="2023-10-02T19:42:47.535013584Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 19:42:48.079409 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1046129794.mount: Deactivated successfully. Oct 2 19:42:48.087202 env[1565]: time="2023-10-02T19:42:48.087154701Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:48.089860 env[1565]: time="2023-10-02T19:42:48.089815743Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:48.092002 env[1565]: time="2023-10-02T19:42:48.091966524Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:48.093932 env[1565]: time="2023-10-02T19:42:48.093877547Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:48.094586 env[1565]: time="2023-10-02T19:42:48.094550906Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Oct 2 19:42:48.108844 env[1565]: time="2023-10-02T19:42:48.108802602Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Oct 2 19:42:50.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:50.814226 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 2 19:42:50.823051 kernel: audit: type=1131 audit(1696275770.813:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:50.842000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:42:50.842000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:42:50.846145 kernel: audit: type=1334 audit(1696275770.842:412): prog-id=38 op=UNLOAD Oct 2 19:42:50.846205 kernel: audit: type=1334 audit(1696275770.842:413): prog-id=37 op=UNLOAD Oct 2 19:42:50.846235 kernel: audit: type=1334 audit(1696275770.842:414): prog-id=36 op=UNLOAD Oct 2 19:42:50.842000 audit: BPF prog-id=36 op=UNLOAD Oct 2 19:42:53.556859 kernel: audit: type=1130 audit(1696275773.534:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:53.557320 kernel: audit: type=1131 audit(1696275773.534:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:53.557389 kernel: audit: type=1130 audit(1696275773.543:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:53.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:53.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:53.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:42:53.535256 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 2 19:42:53.535531 systemd[1]: Stopped kubelet.service. Oct 2 19:42:53.544068 systemd[1]: Started kubelet.service. Oct 2 19:42:53.648559 kubelet[2085]: E1002 19:42:53.648505 2085 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:42:53.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:42:53.656965 kernel: audit: type=1131 audit(1696275773.650:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:42:53.650800 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:42:53.651030 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:42:57.222069 env[1565]: time="2023-10-02T19:42:57.222004651Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:57.224892 env[1565]: time="2023-10-02T19:42:57.224837560Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:57.228606 env[1565]: time="2023-10-02T19:42:57.228564530Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:57.230667 env[1565]: time="2023-10-02T19:42:57.230624783Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:57.231617 env[1565]: time="2023-10-02T19:42:57.231576816Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9\"" Oct 2 19:42:57.247206 env[1565]: time="2023-10-02T19:42:57.247165309Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Oct 2 19:42:57.763022 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2949333675.mount: Deactivated successfully. Oct 2 19:42:58.657973 env[1565]: time="2023-10-02T19:42:58.657902869Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:58.660823 env[1565]: time="2023-10-02T19:42:58.660776323Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:58.663083 env[1565]: time="2023-10-02T19:42:58.663044458Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:58.665217 env[1565]: time="2023-10-02T19:42:58.665181505Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:42:58.665778 env[1565]: time="2023-10-02T19:42:58.665745481Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Oct 2 19:43:02.556606 systemd[1]: Stopped kubelet.service. Oct 2 19:43:02.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:43:02.571223 kernel: audit: type=1130 audit(1696275782.556:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:43:02.571379 kernel: audit: type=1131 audit(1696275782.556:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:43:02.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:43:02.591780 systemd[1]: Reloading. Oct 2 19:43:02.798750 /usr/lib/systemd/system-generators/torcx-generator[2181]: time="2023-10-02T19:43:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:43:02.798792 /usr/lib/systemd/system-generators/torcx-generator[2181]: time="2023-10-02T19:43:02Z" level=info msg="torcx already run" Oct 2 19:43:03.000240 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:43:03.000264 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:43:03.049747 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:43:03.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.167138 kernel: audit: type=1400 audit(1696275783.161:421): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.172323 kernel: audit: type=1400 audit(1696275783.161:422): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.185202 kernel: audit: type=1400 audit(1696275783.161:423): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.185445 kernel: audit: type=1400 audit(1696275783.161:424): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.190220 kernel: audit: type=1400 audit(1696275783.161:425): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.198414 kernel: audit: type=1400 audit(1696275783.161:426): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.203425 kernel: audit: type=1400 audit(1696275783.161:427): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.203563 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:43:03.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.165000 audit: BPF prog-id=52 op=LOAD Oct 2 19:43:03.166000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:43:03.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.171000 audit: BPF prog-id=53 op=LOAD Oct 2 19:43:03.171000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:43:03.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.177000 audit: BPF prog-id=54 op=LOAD Oct 2 19:43:03.177000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:43:03.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.184000 audit: BPF prog-id=55 op=LOAD Oct 2 19:43:03.184000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:43:03.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.189000 audit: BPF prog-id=56 op=LOAD Oct 2 19:43:03.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.189000 audit: BPF prog-id=57 op=LOAD Oct 2 19:43:03.189000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:43:03.189000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:43:03.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit: BPF prog-id=58 op=LOAD Oct 2 19:43:03.204000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit: BPF prog-id=59 op=LOAD Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.204000 audit: BPF prog-id=60 op=LOAD Oct 2 19:43:03.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.209000 audit: BPF prog-id=61 op=LOAD Oct 2 19:43:03.209000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:43:03.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.209000 audit: BPF prog-id=62 op=LOAD Oct 2 19:43:03.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.209000 audit: BPF prog-id=63 op=LOAD Oct 2 19:43:03.209000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:43:03.209000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:43:03.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.211000 audit: BPF prog-id=64 op=LOAD Oct 2 19:43:03.211000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:43:03.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.211000 audit: BPF prog-id=65 op=LOAD Oct 2 19:43:03.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.211000 audit: BPF prog-id=66 op=LOAD Oct 2 19:43:03.211000 audit: BPF prog-id=50 op=UNLOAD Oct 2 19:43:03.211000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:43:03.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:43:03.242945 systemd[1]: Started kubelet.service. Oct 2 19:43:03.318227 kubelet[2231]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:43:03.318904 kubelet[2231]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:43:03.319011 kubelet[2231]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:43:03.319152 kubelet[2231]: I1002 19:43:03.319120 2231 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:43:03.825830 kubelet[2231]: I1002 19:43:03.825793 2231 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Oct 2 19:43:03.825830 kubelet[2231]: I1002 19:43:03.825823 2231 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:43:03.826161 kubelet[2231]: I1002 19:43:03.826138 2231 server.go:895] "Client rotation is on, will bootstrap in background" Oct 2 19:43:03.831698 kubelet[2231]: E1002 19:43:03.831671 2231 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.21.168:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.21.168:6443: connect: connection refused Oct 2 19:43:03.831882 kubelet[2231]: I1002 19:43:03.831742 2231 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:43:03.840302 kubelet[2231]: I1002 19:43:03.840264 2231 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:43:03.840554 kubelet[2231]: I1002 19:43:03.840529 2231 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:43:03.841096 kubelet[2231]: I1002 19:43:03.840872 2231 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Oct 2 19:43:03.843353 kubelet[2231]: I1002 19:43:03.843172 2231 topology_manager.go:138] "Creating topology manager with none policy" Oct 2 19:43:03.843353 kubelet[2231]: I1002 19:43:03.843196 2231 container_manager_linux.go:301] "Creating device plugin manager" Oct 2 19:43:03.843353 kubelet[2231]: I1002 19:43:03.843340 2231 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:43:03.843494 kubelet[2231]: I1002 19:43:03.843476 2231 kubelet.go:393] "Attempting to sync node with API server" Oct 2 19:43:03.843536 kubelet[2231]: I1002 19:43:03.843497 2231 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:43:03.844011 kubelet[2231]: I1002 19:43:03.843897 2231 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:43:03.844162 kubelet[2231]: I1002 19:43:03.844086 2231 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:43:03.844331 kubelet[2231]: W1002 19:43:03.844288 2231 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.21.168:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-168&limit=500&resourceVersion=0": dial tcp 172.31.21.168:6443: connect: connection refused Oct 2 19:43:03.844433 kubelet[2231]: E1002 19:43:03.844421 2231 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.21.168:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-168&limit=500&resourceVersion=0": dial tcp 172.31.21.168:6443: connect: connection refused Oct 2 19:43:03.845097 kubelet[2231]: W1002 19:43:03.844963 2231 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.21.168:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.168:6443: connect: connection refused Oct 2 19:43:03.845225 kubelet[2231]: E1002 19:43:03.845214 2231 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.21.168:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.168:6443: connect: connection refused Oct 2 19:43:03.845412 kubelet[2231]: I1002 19:43:03.845399 2231 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:43:03.846510 kubelet[2231]: W1002 19:43:03.846428 2231 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:43:03.855793 kubelet[2231]: I1002 19:43:03.855761 2231 server.go:1232] "Started kubelet" Oct 2 19:43:03.862000 audit[2231]: AVC avc: denied { mac_admin } for pid=2231 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.862000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:43:03.862000 audit[2231]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a39470 a1=c000a46ac8 a2=c000a39440 a3=25 items=0 ppid=1 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:03.862000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:43:03.862000 audit[2231]: AVC avc: denied { mac_admin } for pid=2231 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.862000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:43:03.862000 audit[2231]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a35200 a1=c000a46ae0 a2=c000a39500 a3=25 items=0 ppid=1 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:03.862000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:43:03.864771 kubelet[2231]: I1002 19:43:03.863660 2231 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:43:03.864771 kubelet[2231]: I1002 19:43:03.863711 2231 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:43:03.864771 kubelet[2231]: I1002 19:43:03.864136 2231 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:43:03.868052 kubelet[2231]: E1002 19:43:03.866701 2231 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-21-168.178a61d691d15c4e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-21-168", UID:"ip-172-31-21-168", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-21-168"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 43, 3, 855725646, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 43, 3, 855725646, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ip-172-31-21-168"}': 'Post "https://172.31.21.168:6443/api/v1/namespaces/default/events": dial tcp 172.31.21.168:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:43:03.874598 kubelet[2231]: I1002 19:43:03.874495 2231 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:43:03.875573 kubelet[2231]: I1002 19:43:03.875549 2231 server.go:462] "Adding debug handlers to kubelet server" Oct 2 19:43:03.877295 kubelet[2231]: I1002 19:43:03.877271 2231 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:43:03.877615 kubelet[2231]: I1002 19:43:03.877596 2231 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 2 19:43:03.877709 kubelet[2231]: E1002 19:43:03.877697 2231 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:43:03.877798 kubelet[2231]: E1002 19:43:03.877789 2231 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:43:03.883783 kubelet[2231]: I1002 19:43:03.883753 2231 volume_manager.go:291] "Starting Kubelet Volume Manager" Oct 2 19:43:03.886995 kubelet[2231]: I1002 19:43:03.886968 2231 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:43:03.887294 kubelet[2231]: I1002 19:43:03.887275 2231 reconciler_new.go:29] "Reconciler: start to sync state" Oct 2 19:43:03.888977 kubelet[2231]: W1002 19:43:03.888638 2231 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.21.168:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.168:6443: connect: connection refused Oct 2 19:43:03.888977 kubelet[2231]: E1002 19:43:03.888702 2231 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.21.168:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.168:6443: connect: connection refused Oct 2 19:43:03.889238 kubelet[2231]: E1002 19:43:03.888982 2231 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.168:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-168?timeout=10s\": dial tcp 172.31.21.168:6443: connect: connection refused" interval="200ms" Oct 2 19:43:03.892000 audit[2242]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:03.892000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff5604b250 a2=0 a3=7fff5604b23c items=0 ppid=2231 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:03.892000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:43:03.894000 audit[2243]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:03.894000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7251b6f0 a2=0 a3=7fff7251b6dc items=0 ppid=2231 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:03.894000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:43:03.899000 audit[2245]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:03.899000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffb6a2a6d0 a2=0 a3=7fffb6a2a6bc items=0 ppid=2231 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:03.899000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:43:03.902000 audit[2247]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:03.902000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdf8894520 a2=0 a3=7ffdf889450c items=0 ppid=2231 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:03.902000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:43:03.938000 audit[2252]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:03.938000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff007faff0 a2=0 a3=7fff007fafdc items=0 ppid=2231 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:03.938000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:43:03.941444 kubelet[2231]: I1002 19:43:03.940031 2231 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 2 19:43:03.938000 audit[2253]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:03.938000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffa96cc100 a2=0 a3=7fffa96cc0ec items=0 ppid=2231 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:03.938000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:43:03.942716 kubelet[2231]: I1002 19:43:03.942701 2231 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 2 19:43:03.942811 kubelet[2231]: I1002 19:43:03.942804 2231 status_manager.go:217] "Starting to sync pod status with apiserver" Oct 2 19:43:03.942881 kubelet[2231]: I1002 19:43:03.942875 2231 kubelet.go:2303] "Starting kubelet main sync loop" Oct 2 19:43:03.942988 kubelet[2231]: E1002 19:43:03.942980 2231 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:43:03.938000 audit[2254]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:03.938000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd575f1590 a2=0 a3=7ffd575f157c items=0 ppid=2231 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:03.938000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:43:03.945000 audit[2255]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:03.945000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6c2abd90 a2=0 a3=7ffd6c2abd7c items=0 ppid=2231 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:03.945000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:43:03.947598 kubelet[2231]: W1002 19:43:03.947568 2231 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.21.168:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.168:6443: connect: connection refused Oct 2 19:43:03.947758 kubelet[2231]: E1002 19:43:03.947747 2231 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.21.168:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.168:6443: connect: connection refused Oct 2 19:43:03.949000 audit[2256]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:03.949000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe31c9c5b0 a2=0 a3=7ffe31c9c59c items=0 ppid=2231 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:03.949000 audit[2257]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:03.949000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeeb5701d0 a2=0 a3=7ffeeb5701bc items=0 ppid=2231 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:03.949000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:43:03.949000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:43:03.951597 kubelet[2231]: I1002 19:43:03.951570 2231 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:43:03.951597 kubelet[2231]: I1002 19:43:03.951592 2231 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:43:03.951771 kubelet[2231]: I1002 19:43:03.951613 2231 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:43:03.951000 audit[2259]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:03.951000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffda0064510 a2=0 a3=7ffda00644fc items=0 ppid=2231 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:03.951000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:43:03.952000 audit[2260]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:03.952000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeb286c640 a2=0 a3=7ffeb286c62c items=0 ppid=2231 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:03.953861 kubelet[2231]: I1002 19:43:03.953762 2231 policy_none.go:49] "None policy: Start" Oct 2 19:43:03.952000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:43:03.954522 kubelet[2231]: I1002 19:43:03.954500 2231 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:43:03.954592 kubelet[2231]: I1002 19:43:03.954525 2231 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:43:03.959869 systemd[1]: Created slice kubepods.slice. Oct 2 19:43:03.965280 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:43:03.970808 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:43:03.977946 kubelet[2231]: I1002 19:43:03.977845 2231 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:43:03.977000 audit[2231]: AVC avc: denied { mac_admin } for pid=2231 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:03.977000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:43:03.977000 audit[2231]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d72630 a1=c000f79e30 a2=c000d72600 a3=25 items=0 ppid=1 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:03.977000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:43:03.978810 kubelet[2231]: I1002 19:43:03.978785 2231 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:43:03.979215 kubelet[2231]: I1002 19:43:03.979197 2231 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:43:03.981094 kubelet[2231]: E1002 19:43:03.981075 2231 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-21-168\" not found" Oct 2 19:43:03.985358 kubelet[2231]: I1002 19:43:03.985342 2231 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-168" Oct 2 19:43:03.985863 kubelet[2231]: E1002 19:43:03.985852 2231 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.21.168:6443/api/v1/nodes\": dial tcp 172.31.21.168:6443: connect: connection refused" node="ip-172-31-21-168" Oct 2 19:43:04.043579 kubelet[2231]: I1002 19:43:04.043537 2231 topology_manager.go:215] "Topology Admit Handler" podUID="aff0cb8ac9fd9032e1b7f24b6801e5f9" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-21-168" Oct 2 19:43:04.045067 kubelet[2231]: I1002 19:43:04.045041 2231 topology_manager.go:215] "Topology Admit Handler" podUID="92f57fa553491054c73d95fbe4186ba2" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-21-168" Oct 2 19:43:04.046587 kubelet[2231]: I1002 19:43:04.046550 2231 topology_manager.go:215] "Topology Admit Handler" podUID="8b494f631e790a73faf0190342e6d917" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-21-168" Oct 2 19:43:04.052168 systemd[1]: Created slice kubepods-burstable-podaff0cb8ac9fd9032e1b7f24b6801e5f9.slice. Oct 2 19:43:04.073618 systemd[1]: Created slice kubepods-burstable-pod92f57fa553491054c73d95fbe4186ba2.slice. Oct 2 19:43:04.084402 systemd[1]: Created slice kubepods-burstable-pod8b494f631e790a73faf0190342e6d917.slice. Oct 2 19:43:04.089083 kubelet[2231]: I1002 19:43:04.088311 2231 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8b494f631e790a73faf0190342e6d917-kubeconfig\") pod \"kube-scheduler-ip-172-31-21-168\" (UID: \"8b494f631e790a73faf0190342e6d917\") " pod="kube-system/kube-scheduler-ip-172-31-21-168" Oct 2 19:43:04.089083 kubelet[2231]: I1002 19:43:04.088357 2231 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/aff0cb8ac9fd9032e1b7f24b6801e5f9-ca-certs\") pod \"kube-apiserver-ip-172-31-21-168\" (UID: \"aff0cb8ac9fd9032e1b7f24b6801e5f9\") " pod="kube-system/kube-apiserver-ip-172-31-21-168" Oct 2 19:43:04.089083 kubelet[2231]: I1002 19:43:04.088420 2231 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/aff0cb8ac9fd9032e1b7f24b6801e5f9-k8s-certs\") pod \"kube-apiserver-ip-172-31-21-168\" (UID: \"aff0cb8ac9fd9032e1b7f24b6801e5f9\") " pod="kube-system/kube-apiserver-ip-172-31-21-168" Oct 2 19:43:04.089083 kubelet[2231]: I1002 19:43:04.088471 2231 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/92f57fa553491054c73d95fbe4186ba2-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-21-168\" (UID: \"92f57fa553491054c73d95fbe4186ba2\") " pod="kube-system/kube-controller-manager-ip-172-31-21-168" Oct 2 19:43:04.089083 kubelet[2231]: I1002 19:43:04.088512 2231 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/92f57fa553491054c73d95fbe4186ba2-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-21-168\" (UID: \"92f57fa553491054c73d95fbe4186ba2\") " pod="kube-system/kube-controller-manager-ip-172-31-21-168" Oct 2 19:43:04.089389 kubelet[2231]: I1002 19:43:04.088565 2231 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/aff0cb8ac9fd9032e1b7f24b6801e5f9-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-21-168\" (UID: \"aff0cb8ac9fd9032e1b7f24b6801e5f9\") " pod="kube-system/kube-apiserver-ip-172-31-21-168" Oct 2 19:43:04.089389 kubelet[2231]: I1002 19:43:04.088597 2231 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/92f57fa553491054c73d95fbe4186ba2-ca-certs\") pod \"kube-controller-manager-ip-172-31-21-168\" (UID: \"92f57fa553491054c73d95fbe4186ba2\") " pod="kube-system/kube-controller-manager-ip-172-31-21-168" Oct 2 19:43:04.089389 kubelet[2231]: I1002 19:43:04.088640 2231 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/92f57fa553491054c73d95fbe4186ba2-k8s-certs\") pod \"kube-controller-manager-ip-172-31-21-168\" (UID: \"92f57fa553491054c73d95fbe4186ba2\") " pod="kube-system/kube-controller-manager-ip-172-31-21-168" Oct 2 19:43:04.089389 kubelet[2231]: I1002 19:43:04.088670 2231 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/92f57fa553491054c73d95fbe4186ba2-kubeconfig\") pod \"kube-controller-manager-ip-172-31-21-168\" (UID: \"92f57fa553491054c73d95fbe4186ba2\") " pod="kube-system/kube-controller-manager-ip-172-31-21-168" Oct 2 19:43:04.090418 kubelet[2231]: E1002 19:43:04.089974 2231 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.168:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-168?timeout=10s\": dial tcp 172.31.21.168:6443: connect: connection refused" interval="400ms" Oct 2 19:43:04.188791 kubelet[2231]: I1002 19:43:04.188762 2231 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-168" Oct 2 19:43:04.189632 kubelet[2231]: E1002 19:43:04.189607 2231 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.21.168:6443/api/v1/nodes\": dial tcp 172.31.21.168:6443: connect: connection refused" node="ip-172-31-21-168" Oct 2 19:43:04.371847 env[1565]: time="2023-10-02T19:43:04.371194445Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-21-168,Uid:aff0cb8ac9fd9032e1b7f24b6801e5f9,Namespace:kube-system,Attempt:0,}" Oct 2 19:43:04.383934 env[1565]: time="2023-10-02T19:43:04.383870777Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-21-168,Uid:92f57fa553491054c73d95fbe4186ba2,Namespace:kube-system,Attempt:0,}" Oct 2 19:43:04.392814 env[1565]: time="2023-10-02T19:43:04.392473414Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-21-168,Uid:8b494f631e790a73faf0190342e6d917,Namespace:kube-system,Attempt:0,}" Oct 2 19:43:04.491215 kubelet[2231]: E1002 19:43:04.491171 2231 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.168:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-168?timeout=10s\": dial tcp 172.31.21.168:6443: connect: connection refused" interval="800ms" Oct 2 19:43:04.592152 kubelet[2231]: I1002 19:43:04.592111 2231 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-168" Oct 2 19:43:04.592467 kubelet[2231]: E1002 19:43:04.592446 2231 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.21.168:6443/api/v1/nodes\": dial tcp 172.31.21.168:6443: connect: connection refused" node="ip-172-31-21-168" Oct 2 19:43:04.881622 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount816705706.mount: Deactivated successfully. Oct 2 19:43:04.891425 env[1565]: time="2023-10-02T19:43:04.891374858Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:43:04.892692 env[1565]: time="2023-10-02T19:43:04.892658181Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:43:04.896461 env[1565]: time="2023-10-02T19:43:04.896338777Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:43:04.898167 env[1565]: time="2023-10-02T19:43:04.898132308Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:43:04.899155 env[1565]: time="2023-10-02T19:43:04.899125357Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:43:04.908049 env[1565]: time="2023-10-02T19:43:04.907991700Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:43:04.910388 env[1565]: time="2023-10-02T19:43:04.910345518Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:43:04.912747 env[1565]: time="2023-10-02T19:43:04.912634804Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:43:04.915808 env[1565]: time="2023-10-02T19:43:04.915775173Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:43:04.917638 env[1565]: time="2023-10-02T19:43:04.917604937Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:43:04.919063 env[1565]: time="2023-10-02T19:43:04.919033118Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:43:04.923212 env[1565]: time="2023-10-02T19:43:04.923176401Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:43:04.962542 env[1565]: time="2023-10-02T19:43:04.961358052Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:43:04.962542 env[1565]: time="2023-10-02T19:43:04.961405161Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:43:04.962542 env[1565]: time="2023-10-02T19:43:04.961419215Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:43:04.962542 env[1565]: time="2023-10-02T19:43:04.961593487Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5e111b7a5be12d24998f40c3c2e8ab8d85737f5bd488191757fca486867e632c pid=2268 runtime=io.containerd.runc.v2 Oct 2 19:43:04.984548 env[1565]: time="2023-10-02T19:43:04.984473243Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:43:04.984760 env[1565]: time="2023-10-02T19:43:04.984729837Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:43:04.984882 env[1565]: time="2023-10-02T19:43:04.984858055Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:43:04.985461 env[1565]: time="2023-10-02T19:43:04.985414620Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8f3e7e327cc02af4cdeaace2fb406aa70e449a1cc3fff21d09405b37725002f7 pid=2288 runtime=io.containerd.runc.v2 Oct 2 19:43:04.987929 kubelet[2231]: W1002 19:43:04.987884 2231 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.21.168:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.168:6443: connect: connection refused Oct 2 19:43:04.988243 kubelet[2231]: E1002 19:43:04.988187 2231 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.21.168:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.168:6443: connect: connection refused Oct 2 19:43:04.993889 systemd[1]: Started cri-containerd-5e111b7a5be12d24998f40c3c2e8ab8d85737f5bd488191757fca486867e632c.scope. Oct 2 19:43:05.002454 kubelet[2231]: W1002 19:43:05.002414 2231 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.21.168:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.168:6443: connect: connection refused Oct 2 19:43:05.002632 kubelet[2231]: E1002 19:43:05.002478 2231 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.21.168:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.168:6443: connect: connection refused Oct 2 19:43:05.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.019000 audit: BPF prog-id=67 op=LOAD Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2268 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313131623761356265313264323439393866343063336332653861 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2268 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313131623761356265313264323439393866343063336332653861 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit: BPF prog-id=68 op=LOAD Oct 2 19:43:05.020000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000216340 items=0 ppid=2268 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313131623761356265313264323439393866343063336332653861 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit: BPF prog-id=69 op=LOAD Oct 2 19:43:05.020000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000216388 items=0 ppid=2268 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313131623761356265313264323439393866343063336332653861 Oct 2 19:43:05.020000 audit: BPF prog-id=69 op=UNLOAD Oct 2 19:43:05.020000 audit: BPF prog-id=68 op=UNLOAD Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.020000 audit: BPF prog-id=70 op=LOAD Oct 2 19:43:05.020000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000216798 items=0 ppid=2268 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313131623761356265313264323439393866343063336332653861 Oct 2 19:43:05.035104 env[1565]: time="2023-10-02T19:43:05.034386002Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:43:05.035273 env[1565]: time="2023-10-02T19:43:05.035090926Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:43:05.035273 env[1565]: time="2023-10-02T19:43:05.035111954Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:43:05.035696 env[1565]: time="2023-10-02T19:43:05.035642940Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1f69c220992c0c62a8677bbb8f2879d1353531f5b6dd99ded8a4d6b17d07f3c7 pid=2321 runtime=io.containerd.runc.v2 Oct 2 19:43:05.050108 systemd[1]: Started cri-containerd-8f3e7e327cc02af4cdeaace2fb406aa70e449a1cc3fff21d09405b37725002f7.scope. Oct 2 19:43:05.102642 systemd[1]: Started cri-containerd-1f69c220992c0c62a8677bbb8f2879d1353531f5b6dd99ded8a4d6b17d07f3c7.scope. Oct 2 19:43:05.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.108000 audit: BPF prog-id=71 op=LOAD Oct 2 19:43:05.109000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.109000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2288 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866336537653332376363303261663463646561616365326662343036 Oct 2 19:43:05.109000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.109000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2288 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866336537653332376363303261663463646561616365326662343036 Oct 2 19:43:05.110000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.110000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.110000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.110000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.110000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.110000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.110000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.110000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.110000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.110000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.110000 audit: BPF prog-id=72 op=LOAD Oct 2 19:43:05.110000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000298870 items=0 ppid=2288 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866336537653332376363303261663463646561616365326662343036 Oct 2 19:43:05.110000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.110000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.110000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.110000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.110000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.110000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.110000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.110000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.110000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.110000 audit: BPF prog-id=73 op=LOAD Oct 2 19:43:05.110000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002988b8 items=0 ppid=2288 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866336537653332376363303261663463646561616365326662343036 Oct 2 19:43:05.111000 audit: BPF prog-id=73 op=UNLOAD Oct 2 19:43:05.111000 audit: BPF prog-id=72 op=UNLOAD Oct 2 19:43:05.111000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.111000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.111000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.111000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.111000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.111000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.111000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.111000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.111000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.111000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.111000 audit: BPF prog-id=74 op=LOAD Oct 2 19:43:05.111000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000298cc8 items=0 ppid=2288 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866336537653332376363303261663463646561616365326662343036 Oct 2 19:43:05.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.133000 audit: BPF prog-id=75 op=LOAD Oct 2 19:43:05.133000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.133000 audit[2339]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2321 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166363963323230393932633063363261383637376262623866323837 Oct 2 19:43:05.134000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.134000 audit[2339]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2321 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166363963323230393932633063363261383637376262623866323837 Oct 2 19:43:05.134000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.134000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.134000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.134000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.134000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.134000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.134000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.134000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.134000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.134000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.134000 audit: BPF prog-id=76 op=LOAD Oct 2 19:43:05.134000 audit[2339]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000307180 items=0 ppid=2321 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166363963323230393932633063363261383637376262623866323837 Oct 2 19:43:05.134000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.134000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.134000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.134000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.134000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.134000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.134000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.134000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.134000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.134000 audit: BPF prog-id=77 op=LOAD Oct 2 19:43:05.134000 audit[2339]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003071c8 items=0 ppid=2321 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166363963323230393932633063363261383637376262623866323837 Oct 2 19:43:05.135000 audit: BPF prog-id=77 op=UNLOAD Oct 2 19:43:05.135000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:43:05.135000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.135000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.135000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.135000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.135000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.135000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.135000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.135000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.135000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.135000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.135000 audit: BPF prog-id=78 op=LOAD Oct 2 19:43:05.135000 audit[2339]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003075d8 items=0 ppid=2321 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166363963323230393932633063363261383637376262623866323837 Oct 2 19:43:05.155344 env[1565]: time="2023-10-02T19:43:05.154887431Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-21-168,Uid:aff0cb8ac9fd9032e1b7f24b6801e5f9,Namespace:kube-system,Attempt:0,} returns sandbox id \"5e111b7a5be12d24998f40c3c2e8ab8d85737f5bd488191757fca486867e632c\"" Oct 2 19:43:05.168495 env[1565]: time="2023-10-02T19:43:05.168445905Z" level=info msg="CreateContainer within sandbox \"5e111b7a5be12d24998f40c3c2e8ab8d85737f5bd488191757fca486867e632c\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 19:43:05.196955 env[1565]: time="2023-10-02T19:43:05.196218554Z" level=info msg="CreateContainer within sandbox \"5e111b7a5be12d24998f40c3c2e8ab8d85737f5bd488191757fca486867e632c\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"d2029ba73d5d4bad5cbb5fb7d80ce07853a4b3cbbc888e8043c761501272ce35\"" Oct 2 19:43:05.202778 env[1565]: time="2023-10-02T19:43:05.202737079Z" level=info msg="StartContainer for \"d2029ba73d5d4bad5cbb5fb7d80ce07853a4b3cbbc888e8043c761501272ce35\"" Oct 2 19:43:05.205059 env[1565]: time="2023-10-02T19:43:05.205003325Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-21-168,Uid:8b494f631e790a73faf0190342e6d917,Namespace:kube-system,Attempt:0,} returns sandbox id \"8f3e7e327cc02af4cdeaace2fb406aa70e449a1cc3fff21d09405b37725002f7\"" Oct 2 19:43:05.210032 env[1565]: time="2023-10-02T19:43:05.209935777Z" level=info msg="CreateContainer within sandbox \"8f3e7e327cc02af4cdeaace2fb406aa70e449a1cc3fff21d09405b37725002f7\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 19:43:05.214399 kubelet[2231]: E1002 19:43:05.214257 2231 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-21-168.178a61d691d15c4e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-21-168", UID:"ip-172-31-21-168", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-21-168"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 43, 3, 855725646, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 43, 3, 855725646, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ip-172-31-21-168"}': 'Post "https://172.31.21.168:6443/api/v1/namespaces/default/events": dial tcp 172.31.21.168:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:43:05.233678 env[1565]: time="2023-10-02T19:43:05.233621727Z" level=info msg="CreateContainer within sandbox \"8f3e7e327cc02af4cdeaace2fb406aa70e449a1cc3fff21d09405b37725002f7\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"481cf3e4956d754320c4cd01dec0bd7fd59d37b826a89a80aa3219b50450da4b\"" Oct 2 19:43:05.235212 env[1565]: time="2023-10-02T19:43:05.235121011Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-21-168,Uid:92f57fa553491054c73d95fbe4186ba2,Namespace:kube-system,Attempt:0,} returns sandbox id \"1f69c220992c0c62a8677bbb8f2879d1353531f5b6dd99ded8a4d6b17d07f3c7\"" Oct 2 19:43:05.235775 env[1565]: time="2023-10-02T19:43:05.235517578Z" level=info msg="StartContainer for \"481cf3e4956d754320c4cd01dec0bd7fd59d37b826a89a80aa3219b50450da4b\"" Oct 2 19:43:05.246050 systemd[1]: Started cri-containerd-d2029ba73d5d4bad5cbb5fb7d80ce07853a4b3cbbc888e8043c761501272ce35.scope. Oct 2 19:43:05.253695 env[1565]: time="2023-10-02T19:43:05.253563468Z" level=info msg="CreateContainer within sandbox \"1f69c220992c0c62a8677bbb8f2879d1353531f5b6dd99ded8a4d6b17d07f3c7\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 19:43:05.286850 env[1565]: time="2023-10-02T19:43:05.286138612Z" level=info msg="CreateContainer within sandbox \"1f69c220992c0c62a8677bbb8f2879d1353531f5b6dd99ded8a4d6b17d07f3c7\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"2be947a7e139f8331f68170a532f82a114b579e93a5dfea462f101aec64bfe72\"" Oct 2 19:43:05.290952 env[1565]: time="2023-10-02T19:43:05.290893079Z" level=info msg="StartContainer for \"2be947a7e139f8331f68170a532f82a114b579e93a5dfea462f101aec64bfe72\"" Oct 2 19:43:05.292522 kubelet[2231]: E1002 19:43:05.292499 2231 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.168:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-168?timeout=10s\": dial tcp 172.31.21.168:6443: connect: connection refused" interval="1.6s" Oct 2 19:43:05.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.301000 audit: BPF prog-id=79 op=LOAD Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { bpf } for pid=2386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2268 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432303239626137336435643462616435636262356662376438306365 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { perfmon } for pid=2386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2268 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432303239626137336435643462616435636262356662376438306365 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { bpf } for pid=2386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { bpf } for pid=2386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { bpf } for pid=2386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { perfmon } for pid=2386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { perfmon } for pid=2386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { perfmon } for pid=2386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { perfmon } for pid=2386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { perfmon } for pid=2386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { bpf } for pid=2386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { bpf } for pid=2386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit: BPF prog-id=80 op=LOAD Oct 2 19:43:05.303000 audit[2386]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009d780 items=0 ppid=2268 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432303239626137336435643462616435636262356662376438306365 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { bpf } for pid=2386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { bpf } for pid=2386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { perfmon } for pid=2386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { perfmon } for pid=2386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { perfmon } for pid=2386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { perfmon } for pid=2386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { perfmon } for pid=2386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { bpf } for pid=2386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { bpf } for pid=2386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit: BPF prog-id=81 op=LOAD Oct 2 19:43:05.303000 audit[2386]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009d7c8 items=0 ppid=2268 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432303239626137336435643462616435636262356662376438306365 Oct 2 19:43:05.303000 audit: BPF prog-id=81 op=UNLOAD Oct 2 19:43:05.303000 audit: BPF prog-id=80 op=UNLOAD Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { bpf } for pid=2386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { bpf } for pid=2386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { bpf } for pid=2386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { perfmon } for pid=2386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { perfmon } for pid=2386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { perfmon } for pid=2386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { perfmon } for pid=2386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { perfmon } for pid=2386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { bpf } for pid=2386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit[2386]: AVC avc: denied { bpf } for pid=2386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.303000 audit: BPF prog-id=82 op=LOAD Oct 2 19:43:05.303000 audit[2386]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009dbd8 items=0 ppid=2268 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432303239626137336435643462616435636262356662376438306365 Oct 2 19:43:05.330810 systemd[1]: Started cri-containerd-481cf3e4956d754320c4cd01dec0bd7fd59d37b826a89a80aa3219b50450da4b.scope. Oct 2 19:43:05.344109 kubelet[2231]: W1002 19:43:05.343998 2231 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.21.168:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-168&limit=500&resourceVersion=0": dial tcp 172.31.21.168:6443: connect: connection refused Oct 2 19:43:05.344109 kubelet[2231]: E1002 19:43:05.344084 2231 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.21.168:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-168&limit=500&resourceVersion=0": dial tcp 172.31.21.168:6443: connect: connection refused Oct 2 19:43:05.345677 systemd[1]: Started cri-containerd-2be947a7e139f8331f68170a532f82a114b579e93a5dfea462f101aec64bfe72.scope. Oct 2 19:43:05.374448 kubelet[2231]: W1002 19:43:05.374368 2231 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.21.168:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.168:6443: connect: connection refused Oct 2 19:43:05.374594 kubelet[2231]: E1002 19:43:05.374475 2231 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.21.168:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.168:6443: connect: connection refused Oct 2 19:43:05.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.379000 audit: BPF prog-id=83 op=LOAD Oct 2 19:43:05.382000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.382000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2321 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262653934376137653133396638333331663638313730613533326638 Oct 2 19:43:05.382000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.382000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2321 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262653934376137653133396638333331663638313730613533326638 Oct 2 19:43:05.383000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.383000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.383000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.383000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.383000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.383000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.383000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.383000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.383000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.383000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.383000 audit: BPF prog-id=84 op=LOAD Oct 2 19:43:05.383000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00039e640 items=0 ppid=2321 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262653934376137653133396638333331663638313730613533326638 Oct 2 19:43:05.384000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.384000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.384000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.384000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.384000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.384000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.384000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.384000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.384000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.384000 audit: BPF prog-id=85 op=LOAD Oct 2 19:43:05.384000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00039e688 items=0 ppid=2321 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262653934376137653133396638333331663638313730613533326638 Oct 2 19:43:05.385000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:43:05.385000 audit: BPF prog-id=84 op=UNLOAD Oct 2 19:43:05.385000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.385000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.385000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.385000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.385000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.385000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.385000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.385000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.385000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.385000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.385000 audit: BPF prog-id=86 op=LOAD Oct 2 19:43:05.385000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00039ea98 items=0 ppid=2321 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262653934376137653133396638333331663638313730613533326638 Oct 2 19:43:05.409409 kubelet[2231]: I1002 19:43:05.404647 2231 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-168" Oct 2 19:43:05.414745 kubelet[2231]: E1002 19:43:05.414407 2231 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.21.168:6443/api/v1/nodes\": dial tcp 172.31.21.168:6443: connect: connection refused" node="ip-172-31-21-168" Oct 2 19:43:05.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.416000 audit: BPF prog-id=87 op=LOAD Oct 2 19:43:05.420000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.420000 audit[2411]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2288 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438316366336534393536643735343332306334636430316465633062 Oct 2 19:43:05.420000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.420000 audit[2411]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2288 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438316366336534393536643735343332306334636430316465633062 Oct 2 19:43:05.420000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.420000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.420000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.420000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.420000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.420000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.420000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.420000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.420000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.420000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.420000 audit: BPF prog-id=88 op=LOAD Oct 2 19:43:05.420000 audit[2411]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000210e80 items=0 ppid=2288 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438316366336534393536643735343332306334636430316465633062 Oct 2 19:43:05.422000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.422000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.422000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.422000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.422000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.422000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.422000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.422000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.422000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.422000 audit: BPF prog-id=89 op=LOAD Oct 2 19:43:05.422000 audit[2411]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000210ec8 items=0 ppid=2288 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438316366336534393536643735343332306334636430316465633062 Oct 2 19:43:05.422000 audit: BPF prog-id=89 op=UNLOAD Oct 2 19:43:05.422000 audit: BPF prog-id=88 op=UNLOAD Oct 2 19:43:05.423000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.423000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.423000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.423000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.423000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.423000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.423000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.423000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.423000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.423000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:05.423000 audit: BPF prog-id=90 op=LOAD Oct 2 19:43:05.423000 audit[2411]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002112d8 items=0 ppid=2288 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:05.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438316366336534393536643735343332306334636430316465633062 Oct 2 19:43:05.457353 env[1565]: time="2023-10-02T19:43:05.457301882Z" level=info msg="StartContainer for \"d2029ba73d5d4bad5cbb5fb7d80ce07853a4b3cbbc888e8043c761501272ce35\" returns successfully" Oct 2 19:43:05.517774 env[1565]: time="2023-10-02T19:43:05.517658851Z" level=info msg="StartContainer for \"2be947a7e139f8331f68170a532f82a114b579e93a5dfea462f101aec64bfe72\" returns successfully" Oct 2 19:43:05.519678 env[1565]: time="2023-10-02T19:43:05.519625899Z" level=info msg="StartContainer for \"481cf3e4956d754320c4cd01dec0bd7fd59d37b826a89a80aa3219b50450da4b\" returns successfully" Oct 2 19:43:05.999581 update_engine[1556]: I1002 19:43:05.998965 1556 update_attempter.cc:505] Updating boot flags... Oct 2 19:43:06.045411 kubelet[2231]: E1002 19:43:06.043581 2231 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.21.168:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.21.168:6443: connect: connection refused Oct 2 19:43:07.016276 kubelet[2231]: I1002 19:43:07.016247 2231 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-168" Oct 2 19:43:07.515000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:43:07.515000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0002dc0c0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:43:07.515000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:43:07.515000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:43:07.515000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000956040 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:43:07.515000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:43:08.076500 kernel: kauditd_printk_skb: 567 callbacks suppressed Oct 2 19:43:08.076731 kernel: audit: type=1400 audit(1696275788.073:716): avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:43:08.073000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:43:08.090702 kernel: audit: type=1400 audit(1696275788.074:717): avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:43:08.074000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:43:08.074000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0064b27e0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:43:08.101396 kernel: audit: type=1300 audit(1696275788.074:717): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0064b27e0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:43:08.074000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:43:08.112939 kernel: audit: type=1327 audit(1696275788.074:717): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:43:08.073000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0048fb7d0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:43:08.130993 kernel: audit: type=1300 audit(1696275788.073:716): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0048fb7d0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:43:08.073000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:43:08.143238 kernel: audit: type=1327 audit(1696275788.073:716): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:43:08.076000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:43:08.156091 kernel: audit: type=1400 audit(1696275788.076:718): avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:43:08.076000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0060ee800 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:43:08.166431 kernel: audit: type=1300 audit(1696275788.076:718): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0060ee800 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:43:08.076000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:43:08.181705 kernel: audit: type=1327 audit(1696275788.076:718): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:43:08.181822 kernel: audit: type=1400 audit(1696275788.089:719): avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:43:08.089000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:43:08.089000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0048fb8f0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:43:08.089000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:43:08.208000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:43:08.208000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=54 a1=c003df8da0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:43:08.208000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:43:08.209000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:43:08.209000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=54 a1=c0064b3830 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:43:08.209000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:43:08.295116 kubelet[2231]: E1002 19:43:08.295086 2231 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-21-168\" not found" node="ip-172-31-21-168" Oct 2 19:43:08.395942 kubelet[2231]: I1002 19:43:08.395817 2231 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-21-168" Oct 2 19:43:08.848601 kubelet[2231]: I1002 19:43:08.848555 2231 apiserver.go:52] "Watching apiserver" Oct 2 19:43:08.887839 kubelet[2231]: I1002 19:43:08.887798 2231 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:43:10.907629 systemd[1]: Reloading. Oct 2 19:43:10.997927 /usr/lib/systemd/system-generators/torcx-generator[2616]: time="2023-10-02T19:43:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:43:10.998427 /usr/lib/systemd/system-generators/torcx-generator[2616]: time="2023-10-02T19:43:10Z" level=info msg="torcx already run" Oct 2 19:43:11.144129 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:43:11.144152 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:43:11.184426 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:43:11.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.379000 audit: BPF prog-id=91 op=LOAD Oct 2 19:43:11.379000 audit: BPF prog-id=52 op=UNLOAD Oct 2 19:43:11.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.381000 audit: BPF prog-id=92 op=LOAD Oct 2 19:43:11.382000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:43:11.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.383000 audit: BPF prog-id=93 op=LOAD Oct 2 19:43:11.384000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:43:11.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.385000 audit: BPF prog-id=94 op=LOAD Oct 2 19:43:11.386000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:43:11.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.388000 audit: BPF prog-id=95 op=LOAD Oct 2 19:43:11.388000 audit: BPF prog-id=67 op=UNLOAD Oct 2 19:43:11.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.389000 audit: BPF prog-id=96 op=LOAD Oct 2 19:43:11.390000 audit: BPF prog-id=55 op=UNLOAD Oct 2 19:43:11.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.391000 audit: BPF prog-id=97 op=LOAD Oct 2 19:43:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.391000 audit: BPF prog-id=98 op=LOAD Oct 2 19:43:11.391000 audit: BPF prog-id=56 op=UNLOAD Oct 2 19:43:11.391000 audit: BPF prog-id=57 op=UNLOAD Oct 2 19:43:11.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.393000 audit: BPF prog-id=99 op=LOAD Oct 2 19:43:11.393000 audit: BPF prog-id=58 op=UNLOAD Oct 2 19:43:11.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.394000 audit: BPF prog-id=100 op=LOAD Oct 2 19:43:11.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.395000 audit: BPF prog-id=101 op=LOAD Oct 2 19:43:11.395000 audit: BPF prog-id=59 op=UNLOAD Oct 2 19:43:11.395000 audit: BPF prog-id=60 op=UNLOAD Oct 2 19:43:11.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.397000 audit: BPF prog-id=102 op=LOAD Oct 2 19:43:11.397000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:43:11.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.399000 audit: BPF prog-id=103 op=LOAD Oct 2 19:43:11.399000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:43:11.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.403000 audit: BPF prog-id=104 op=LOAD Oct 2 19:43:11.403000 audit: BPF prog-id=61 op=UNLOAD Oct 2 19:43:11.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.403000 audit: BPF prog-id=105 op=LOAD Oct 2 19:43:11.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.404000 audit: BPF prog-id=106 op=LOAD Oct 2 19:43:11.404000 audit: BPF prog-id=62 op=UNLOAD Oct 2 19:43:11.404000 audit: BPF prog-id=63 op=UNLOAD Oct 2 19:43:11.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.406000 audit: BPF prog-id=107 op=LOAD Oct 2 19:43:11.406000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:43:11.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.407000 audit: BPF prog-id=108 op=LOAD Oct 2 19:43:11.407000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:43:11.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.409000 audit: BPF prog-id=109 op=LOAD Oct 2 19:43:11.409000 audit: BPF prog-id=64 op=UNLOAD Oct 2 19:43:11.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.410000 audit: BPF prog-id=110 op=LOAD Oct 2 19:43:11.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.411000 audit: BPF prog-id=111 op=LOAD Oct 2 19:43:11.411000 audit: BPF prog-id=65 op=UNLOAD Oct 2 19:43:11.411000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:43:11.433571 kubelet[2231]: I1002 19:43:11.433537 2231 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:43:11.434121 systemd[1]: Stopping kubelet.service... Oct 2 19:43:11.449000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521038 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:43:11.449000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e477c0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:43:11.449000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:43:11.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:43:11.461538 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 19:43:11.461800 systemd[1]: Stopped kubelet.service. Oct 2 19:43:11.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:43:11.464634 systemd[1]: Started kubelet.service. Oct 2 19:43:11.563282 kubelet[2670]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:43:11.563776 kubelet[2670]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:43:11.563850 kubelet[2670]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:43:11.564213 kubelet[2670]: I1002 19:43:11.564171 2670 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:43:11.581370 kubelet[2670]: I1002 19:43:11.581335 2670 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Oct 2 19:43:11.581370 kubelet[2670]: I1002 19:43:11.581364 2670 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:43:11.582650 kubelet[2670]: I1002 19:43:11.581980 2670 server.go:895] "Client rotation is on, will bootstrap in background" Oct 2 19:43:11.585285 kubelet[2670]: I1002 19:43:11.585253 2670 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 19:43:11.588817 kubelet[2670]: I1002 19:43:11.588275 2670 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:43:11.596461 kubelet[2670]: I1002 19:43:11.596439 2670 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:43:11.597544 kubelet[2670]: I1002 19:43:11.597527 2670 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:43:11.597815 kubelet[2670]: I1002 19:43:11.597799 2670 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Oct 2 19:43:11.598883 kubelet[2670]: I1002 19:43:11.598872 2670 topology_manager.go:138] "Creating topology manager with none policy" Oct 2 19:43:11.599068 kubelet[2670]: I1002 19:43:11.598948 2670 container_manager_linux.go:301] "Creating device plugin manager" Oct 2 19:43:11.599068 kubelet[2670]: I1002 19:43:11.599001 2670 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:43:11.599941 kubelet[2670]: I1002 19:43:11.599119 2670 kubelet.go:393] "Attempting to sync node with API server" Oct 2 19:43:11.600987 kubelet[2670]: I1002 19:43:11.600971 2670 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:43:11.601135 kubelet[2670]: I1002 19:43:11.601126 2670 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:43:11.601264 kubelet[2670]: I1002 19:43:11.601256 2670 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:43:11.602000 audit[2681]: USER_ACCT pid=2681 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:43:11.602000 audit[2681]: CRED_REFR pid=2681 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:43:11.603272 sudo[2681]: root : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/tar -xf /opt/bin/cilium.tar.gz -C /opt/bin Oct 2 19:43:11.603552 sudo[2681]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 2 19:43:11.605439 kubelet[2670]: I1002 19:43:11.604381 2670 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:43:11.605000 audit[2681]: USER_START pid=2681 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:43:11.607249 kubelet[2670]: I1002 19:43:11.606750 2670 server.go:1232] "Started kubelet" Oct 2 19:43:11.611000 audit[2670]: AVC avc: denied { mac_admin } for pid=2670 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.611000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:43:11.611000 audit[2670]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c1b050 a1=c0004916b0 a2=c000c1b020 a3=25 items=0 ppid=1 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:11.611000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:43:11.611000 audit[2670]: AVC avc: denied { mac_admin } for pid=2670 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.611000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:43:11.611000 audit[2670]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000aaf520 a1=c0004916c8 a2=c000c1b0e0 a3=25 items=0 ppid=1 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:11.611000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:43:11.613524 kubelet[2670]: I1002 19:43:11.612766 2670 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:43:11.613524 kubelet[2670]: I1002 19:43:11.612824 2670 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:43:11.613524 kubelet[2670]: I1002 19:43:11.612859 2670 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:43:11.625317 kubelet[2670]: I1002 19:43:11.625289 2670 volume_manager.go:291] "Starting Kubelet Volume Manager" Oct 2 19:43:11.625479 kubelet[2670]: I1002 19:43:11.625421 2670 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:43:11.626334 kubelet[2670]: I1002 19:43:11.626313 2670 server.go:462] "Adding debug handlers to kubelet server" Oct 2 19:43:11.629063 kubelet[2670]: E1002 19:43:11.629044 2670 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:43:11.629205 kubelet[2670]: E1002 19:43:11.629196 2670 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:43:11.638060 kubelet[2670]: I1002 19:43:11.638032 2670 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:43:11.638418 kubelet[2670]: I1002 19:43:11.638405 2670 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 2 19:43:11.645903 kubelet[2670]: I1002 19:43:11.645872 2670 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:43:11.646499 kubelet[2670]: I1002 19:43:11.646478 2670 reconciler_new.go:29] "Reconciler: start to sync state" Oct 2 19:43:11.689279 kubelet[2670]: I1002 19:43:11.689250 2670 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 2 19:43:11.705835 kubelet[2670]: I1002 19:43:11.705746 2670 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 2 19:43:11.708849 kubelet[2670]: I1002 19:43:11.708827 2670 status_manager.go:217] "Starting to sync pod status with apiserver" Oct 2 19:43:11.709085 kubelet[2670]: I1002 19:43:11.709041 2670 kubelet.go:2303] "Starting kubelet main sync loop" Oct 2 19:43:11.709311 kubelet[2670]: E1002 19:43:11.709299 2670 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:43:11.758329 kubelet[2670]: I1002 19:43:11.758304 2670 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-168" Oct 2 19:43:11.784435 kubelet[2670]: I1002 19:43:11.784347 2670 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-21-168" Oct 2 19:43:11.786941 kubelet[2670]: I1002 19:43:11.786902 2670 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-21-168" Oct 2 19:43:11.811027 kubelet[2670]: E1002 19:43:11.810998 2670 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Oct 2 19:43:11.856837 kubelet[2670]: I1002 19:43:11.856812 2670 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:43:11.857050 kubelet[2670]: I1002 19:43:11.857037 2670 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:43:11.857151 kubelet[2670]: I1002 19:43:11.857142 2670 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:43:11.858190 kubelet[2670]: I1002 19:43:11.858173 2670 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 19:43:11.860319 kubelet[2670]: I1002 19:43:11.860282 2670 state_mem.go:96] "Updated CPUSet assignments" assignments={} Oct 2 19:43:11.860452 kubelet[2670]: I1002 19:43:11.860441 2670 policy_none.go:49] "None policy: Start" Oct 2 19:43:11.863228 kubelet[2670]: I1002 19:43:11.863211 2670 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:43:11.863367 kubelet[2670]: I1002 19:43:11.863358 2670 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:43:11.863851 kubelet[2670]: I1002 19:43:11.863835 2670 state_mem.go:75] "Updated machine memory state" Oct 2 19:43:11.876847 kubelet[2670]: I1002 19:43:11.876823 2670 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:43:11.876000 audit[2670]: AVC avc: denied { mac_admin } for pid=2670 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:11.876000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:43:11.876000 audit[2670]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dcdd10 a1=c00118c510 a2=c000dcdce0 a3=25 items=0 ppid=1 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:11.876000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:43:11.877898 kubelet[2670]: I1002 19:43:11.877883 2670 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:43:11.878732 kubelet[2670]: I1002 19:43:11.878713 2670 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:43:12.012874 kubelet[2670]: I1002 19:43:12.012755 2670 topology_manager.go:215] "Topology Admit Handler" podUID="aff0cb8ac9fd9032e1b7f24b6801e5f9" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-21-168" Oct 2 19:43:12.013288 kubelet[2670]: I1002 19:43:12.013274 2670 topology_manager.go:215] "Topology Admit Handler" podUID="92f57fa553491054c73d95fbe4186ba2" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-21-168" Oct 2 19:43:12.013717 kubelet[2670]: I1002 19:43:12.013699 2670 topology_manager.go:215] "Topology Admit Handler" podUID="8b494f631e790a73faf0190342e6d917" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-21-168" Oct 2 19:43:12.025768 kubelet[2670]: E1002 19:43:12.025731 2670 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ip-172-31-21-168\" already exists" pod="kube-system/kube-controller-manager-ip-172-31-21-168" Oct 2 19:43:12.041206 kubelet[2670]: E1002 19:43:12.041166 2670 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-21-168\" already exists" pod="kube-system/kube-apiserver-ip-172-31-21-168" Oct 2 19:43:12.148359 kubelet[2670]: I1002 19:43:12.148328 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/aff0cb8ac9fd9032e1b7f24b6801e5f9-k8s-certs\") pod \"kube-apiserver-ip-172-31-21-168\" (UID: \"aff0cb8ac9fd9032e1b7f24b6801e5f9\") " pod="kube-system/kube-apiserver-ip-172-31-21-168" Oct 2 19:43:12.148796 kubelet[2670]: I1002 19:43:12.148661 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/92f57fa553491054c73d95fbe4186ba2-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-21-168\" (UID: \"92f57fa553491054c73d95fbe4186ba2\") " pod="kube-system/kube-controller-manager-ip-172-31-21-168" Oct 2 19:43:12.148995 kubelet[2670]: I1002 19:43:12.148828 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/92f57fa553491054c73d95fbe4186ba2-k8s-certs\") pod \"kube-controller-manager-ip-172-31-21-168\" (UID: \"92f57fa553491054c73d95fbe4186ba2\") " pod="kube-system/kube-controller-manager-ip-172-31-21-168" Oct 2 19:43:12.149376 kubelet[2670]: I1002 19:43:12.149358 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/92f57fa553491054c73d95fbe4186ba2-kubeconfig\") pod \"kube-controller-manager-ip-172-31-21-168\" (UID: \"92f57fa553491054c73d95fbe4186ba2\") " pod="kube-system/kube-controller-manager-ip-172-31-21-168" Oct 2 19:43:12.149450 kubelet[2670]: I1002 19:43:12.149403 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/92f57fa553491054c73d95fbe4186ba2-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-21-168\" (UID: \"92f57fa553491054c73d95fbe4186ba2\") " pod="kube-system/kube-controller-manager-ip-172-31-21-168" Oct 2 19:43:12.149450 kubelet[2670]: I1002 19:43:12.149435 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/aff0cb8ac9fd9032e1b7f24b6801e5f9-ca-certs\") pod \"kube-apiserver-ip-172-31-21-168\" (UID: \"aff0cb8ac9fd9032e1b7f24b6801e5f9\") " pod="kube-system/kube-apiserver-ip-172-31-21-168" Oct 2 19:43:12.149544 kubelet[2670]: I1002 19:43:12.149466 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/aff0cb8ac9fd9032e1b7f24b6801e5f9-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-21-168\" (UID: \"aff0cb8ac9fd9032e1b7f24b6801e5f9\") " pod="kube-system/kube-apiserver-ip-172-31-21-168" Oct 2 19:43:12.149544 kubelet[2670]: I1002 19:43:12.149510 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/92f57fa553491054c73d95fbe4186ba2-ca-certs\") pod \"kube-controller-manager-ip-172-31-21-168\" (UID: \"92f57fa553491054c73d95fbe4186ba2\") " pod="kube-system/kube-controller-manager-ip-172-31-21-168" Oct 2 19:43:12.149544 kubelet[2670]: I1002 19:43:12.149543 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8b494f631e790a73faf0190342e6d917-kubeconfig\") pod \"kube-scheduler-ip-172-31-21-168\" (UID: \"8b494f631e790a73faf0190342e6d917\") " pod="kube-system/kube-scheduler-ip-172-31-21-168" Oct 2 19:43:12.592715 sudo[2681]: pam_unix(sudo:session): session closed for user root Oct 2 19:43:12.591000 audit[2681]: USER_END pid=2681 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:43:12.591000 audit[2681]: CRED_DISP pid=2681 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:43:12.613659 kubelet[2670]: I1002 19:43:12.613620 2670 apiserver.go:52] "Watching apiserver" Oct 2 19:43:12.647104 kubelet[2670]: I1002 19:43:12.646968 2670 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:43:12.670000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:43:12.670000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0001d15e0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:43:12.670000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:43:12.676000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:43:12.676000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0001d1720 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:43:12.676000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:43:12.679000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:43:12.679000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc3a80 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:43:12.679000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:43:12.681000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:43:12.681000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0001d1bc0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:43:12.681000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:43:12.776187 kubelet[2670]: I1002 19:43:12.776156 2670 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-21-168" podStartSLOduration=0.77609038 podCreationTimestamp="2023-10-02 19:43:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:43:12.761954509 +0000 UTC m=+1.284072359" watchObservedRunningTime="2023-10-02 19:43:12.77609038 +0000 UTC m=+1.298208228" Oct 2 19:43:12.790195 kubelet[2670]: I1002 19:43:12.790162 2670 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-21-168" podStartSLOduration=3.790095838 podCreationTimestamp="2023-10-02 19:43:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:43:12.777531492 +0000 UTC m=+1.299649341" watchObservedRunningTime="2023-10-02 19:43:12.790095838 +0000 UTC m=+1.312213681" Oct 2 19:43:12.790622 kubelet[2670]: I1002 19:43:12.790606 2670 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-21-168" podStartSLOduration=2.79057175 podCreationTimestamp="2023-10-02 19:43:10 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:43:12.787924246 +0000 UTC m=+1.310042088" watchObservedRunningTime="2023-10-02 19:43:12.79057175 +0000 UTC m=+1.312689602" Oct 2 19:43:14.628444 sudo[1827]: pam_unix(sudo:session): session closed for user root Oct 2 19:43:14.632990 kernel: kauditd_printk_skb: 286 callbacks suppressed Oct 2 19:43:14.633132 kernel: audit: type=1106 audit(1696275794.627:981): pid=1827 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:43:14.627000 audit[1827]: USER_END pid=1827 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:43:14.627000 audit[1827]: CRED_DISP pid=1827 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:43:14.643047 kernel: audit: type=1104 audit(1696275794.627:982): pid=1827 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:43:14.660398 sshd[1824]: pam_unix(sshd:session): session closed for user core Oct 2 19:43:14.661000 audit[1824]: USER_END pid=1824 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:43:14.665624 systemd[1]: sshd@6-172.31.21.168:22-139.178.89.65:44674.service: Deactivated successfully. Oct 2 19:43:14.667108 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:43:14.667363 systemd[1]: session-7.scope: Consumed 5.012s CPU time. Oct 2 19:43:14.669535 systemd-logind[1555]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:43:14.661000 audit[1824]: CRED_DISP pid=1824 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:43:14.671759 systemd-logind[1555]: Removed session 7. Oct 2 19:43:14.676417 kernel: audit: type=1106 audit(1696275794.661:983): pid=1824 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:43:14.676485 kernel: audit: type=1104 audit(1696275794.661:984): pid=1824 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:43:14.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.168:22-139.178.89.65:44674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:43:14.682209 kernel: audit: type=1131 audit(1696275794.665:985): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.168:22-139.178.89.65:44674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:43:24.709155 kubelet[2670]: I1002 19:43:24.709121 2670 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 19:43:24.710187 env[1565]: time="2023-10-02T19:43:24.710039372Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:43:24.711012 kubelet[2670]: I1002 19:43:24.710994 2670 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 19:43:24.869702 kubelet[2670]: I1002 19:43:24.869453 2670 topology_manager.go:215] "Topology Admit Handler" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" podNamespace="kube-system" podName="cilium-d2h4s" Oct 2 19:43:24.891382 kubelet[2670]: I1002 19:43:24.891355 2670 topology_manager.go:215] "Topology Admit Handler" podUID="715814ad-303c-4fa1-8e60-569d0bef7c04" podNamespace="kube-system" podName="kube-proxy-4rhtr" Oct 2 19:43:24.912714 systemd[1]: Created slice kubepods-burstable-pod590c1673_f0de_46f7_8d5d_aea6ef7a5e8c.slice. Oct 2 19:43:24.936160 systemd[1]: Created slice kubepods-besteffort-pod715814ad_303c_4fa1_8e60_569d0bef7c04.slice. Oct 2 19:43:24.944156 kubelet[2670]: I1002 19:43:24.944128 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-cgroup\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-cilium-cgroup\") pod \"cilium-d2h4s\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " pod="kube-system/cilium-d2h4s" Oct 2 19:43:24.944378 kubelet[2670]: I1002 19:43:24.944364 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"host-proc-sys-kernel\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-host-proc-sys-kernel\") pod \"cilium-d2h4s\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " pod="kube-system/cilium-d2h4s" Oct 2 19:43:24.944477 kubelet[2670]: I1002 19:43:24.944468 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"hubble-tls\" (UniqueName: \"kubernetes.io/projected/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-hubble-tls\") pod \"cilium-d2h4s\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " pod="kube-system/cilium-d2h4s" Oct 2 19:43:24.944831 kubelet[2670]: I1002 19:43:24.944818 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"bpf-maps\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-bpf-maps\") pod \"cilium-d2h4s\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " pod="kube-system/cilium-d2h4s" Oct 2 19:43:24.945730 kubelet[2670]: I1002 19:43:24.945710 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/715814ad-303c-4fa1-8e60-569d0bef7c04-xtables-lock\") pod \"kube-proxy-4rhtr\" (UID: \"715814ad-303c-4fa1-8e60-569d0bef7c04\") " pod="kube-system/kube-proxy-4rhtr" Oct 2 19:43:24.946032 kubelet[2670]: I1002 19:43:24.946017 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etc-cni-netd\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-etc-cni-netd\") pod \"cilium-d2h4s\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " pod="kube-system/cilium-d2h4s" Oct 2 19:43:24.946148 kubelet[2670]: I1002 19:43:24.946137 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tk56z\" (UniqueName: \"kubernetes.io/projected/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-kube-api-access-tk56z\") pod \"cilium-d2h4s\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " pod="kube-system/cilium-d2h4s" Oct 2 19:43:24.946238 kubelet[2670]: I1002 19:43:24.946229 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"hostproc\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-hostproc\") pod \"cilium-d2h4s\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " pod="kube-system/cilium-d2h4s" Oct 2 19:43:24.946340 kubelet[2670]: I1002 19:43:24.946331 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-lib-modules\") pod \"cilium-d2h4s\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " pod="kube-system/cilium-d2h4s" Oct 2 19:43:24.946454 kubelet[2670]: I1002 19:43:24.946437 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-xtables-lock\") pod \"cilium-d2h4s\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " pod="kube-system/cilium-d2h4s" Oct 2 19:43:24.946550 kubelet[2670]: I1002 19:43:24.946539 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"clustermesh-secrets\" (UniqueName: \"kubernetes.io/secret/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-clustermesh-secrets\") pod \"cilium-d2h4s\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " pod="kube-system/cilium-d2h4s" Oct 2 19:43:24.946730 kubelet[2670]: I1002 19:43:24.946717 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/715814ad-303c-4fa1-8e60-569d0bef7c04-kube-proxy\") pod \"kube-proxy-4rhtr\" (UID: \"715814ad-303c-4fa1-8e60-569d0bef7c04\") " pod="kube-system/kube-proxy-4rhtr" Oct 2 19:43:24.947261 kubelet[2670]: I1002 19:43:24.947244 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/715814ad-303c-4fa1-8e60-569d0bef7c04-lib-modules\") pod \"kube-proxy-4rhtr\" (UID: \"715814ad-303c-4fa1-8e60-569d0bef7c04\") " pod="kube-system/kube-proxy-4rhtr" Oct 2 19:43:24.947638 kubelet[2670]: I1002 19:43:24.947597 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z6xpv\" (UniqueName: \"kubernetes.io/projected/715814ad-303c-4fa1-8e60-569d0bef7c04-kube-api-access-z6xpv\") pod \"kube-proxy-4rhtr\" (UID: \"715814ad-303c-4fa1-8e60-569d0bef7c04\") " pod="kube-system/kube-proxy-4rhtr" Oct 2 19:43:24.947930 kubelet[2670]: I1002 19:43:24.947862 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-run\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-cilium-run\") pod \"cilium-d2h4s\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " pod="kube-system/cilium-d2h4s" Oct 2 19:43:24.948054 kubelet[2670]: I1002 19:43:24.948042 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-path\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-cni-path\") pod \"cilium-d2h4s\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " pod="kube-system/cilium-d2h4s" Oct 2 19:43:24.948197 kubelet[2670]: I1002 19:43:24.948186 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-cilium-config-path\") pod \"cilium-d2h4s\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " pod="kube-system/cilium-d2h4s" Oct 2 19:43:24.948374 kubelet[2670]: I1002 19:43:24.948361 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"host-proc-sys-net\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-host-proc-sys-net\") pod \"cilium-d2h4s\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " pod="kube-system/cilium-d2h4s" Oct 2 19:43:25.169570 kubelet[2670]: I1002 19:43:25.169530 2670 topology_manager.go:215] "Topology Admit Handler" podUID="fc440f41-4c85-48d1-8250-3b3bb7ff1587" podNamespace="kube-system" podName="cilium-operator-6bc8ccdb58-dhl7j" Oct 2 19:43:25.179818 systemd[1]: Created slice kubepods-besteffort-podfc440f41_4c85_48d1_8250_3b3bb7ff1587.slice. Oct 2 19:43:25.230880 env[1565]: time="2023-10-02T19:43:25.230404461Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:cilium-d2h4s,Uid:590c1673-f0de-46f7-8d5d-aea6ef7a5e8c,Namespace:kube-system,Attempt:0,}" Oct 2 19:43:25.253415 kubelet[2670]: I1002 19:43:25.253377 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8vx5x\" (UniqueName: \"kubernetes.io/projected/fc440f41-4c85-48d1-8250-3b3bb7ff1587-kube-api-access-8vx5x\") pod \"cilium-operator-6bc8ccdb58-dhl7j\" (UID: \"fc440f41-4c85-48d1-8250-3b3bb7ff1587\") " pod="kube-system/cilium-operator-6bc8ccdb58-dhl7j" Oct 2 19:43:25.253799 kubelet[2670]: I1002 19:43:25.253722 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/fc440f41-4c85-48d1-8250-3b3bb7ff1587-cilium-config-path\") pod \"cilium-operator-6bc8ccdb58-dhl7j\" (UID: \"fc440f41-4c85-48d1-8250-3b3bb7ff1587\") " pod="kube-system/cilium-operator-6bc8ccdb58-dhl7j" Oct 2 19:43:25.254395 env[1565]: time="2023-10-02T19:43:25.254338955Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-4rhtr,Uid:715814ad-303c-4fa1-8e60-569d0bef7c04,Namespace:kube-system,Attempt:0,}" Oct 2 19:43:25.262518 env[1565]: time="2023-10-02T19:43:25.262304481Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:43:25.262518 env[1565]: time="2023-10-02T19:43:25.262356121Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:43:25.262518 env[1565]: time="2023-10-02T19:43:25.262373989Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:43:25.263068 env[1565]: time="2023-10-02T19:43:25.262991031Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028 pid=2745 runtime=io.containerd.runc.v2 Oct 2 19:43:25.290929 env[1565]: time="2023-10-02T19:43:25.286461073Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:43:25.290929 env[1565]: time="2023-10-02T19:43:25.286589717Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:43:25.290929 env[1565]: time="2023-10-02T19:43:25.286621612Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:43:25.290929 env[1565]: time="2023-10-02T19:43:25.286835303Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/db9b9fdb0fdef5014d42773824055a42993ce15303692b6f026715b4bd6f2aa6 pid=2767 runtime=io.containerd.runc.v2 Oct 2 19:43:25.315584 systemd[1]: Started cri-containerd-db9b9fdb0fdef5014d42773824055a42993ce15303692b6f026715b4bd6f2aa6.scope. Oct 2 19:43:25.322461 systemd[1]: Started cri-containerd-ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028.scope. Oct 2 19:43:25.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.356268 kernel: audit: type=1400 audit(1696275805.346:986): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.356521 kernel: audit: type=1400 audit(1696275805.346:987): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.369998 kernel: audit: type=1400 audit(1696275805.346:988): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.382993 kernel: audit: type=1400 audit(1696275805.346:989): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.383133 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:43:25.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.391299 kernel: audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:43:25.391546 kernel: audit: type=1400 audit(1696275805.346:990): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.391592 kernel: audit: backlog limit exceeded Oct 2 19:43:25.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.398575 kernel: audit: type=1400 audit(1696275805.346:991): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.398695 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:43:25.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.351000 audit: BPF prog-id=112 op=LOAD Oct 2 19:43:25.351000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.351000 audit[2777]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2767 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:25.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462396239666462306664656635303134643432373733383234303535 Oct 2 19:43:25.351000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.351000 audit[2777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2767 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:25.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462396239666462306664656635303134643432373733383234303535 Oct 2 19:43:25.351000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.351000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.351000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.351000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.351000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.351000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.351000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.351000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.351000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.351000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.351000 audit: BPF prog-id=113 op=LOAD Oct 2 19:43:25.351000 audit[2777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000319a60 items=0 ppid=2767 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:25.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462396239666462306664656635303134643432373733383234303535 Oct 2 19:43:25.355000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.355000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.355000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.355000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.355000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.355000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.355000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.355000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.355000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.355000 audit: BPF prog-id=114 op=LOAD Oct 2 19:43:25.355000 audit[2777]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000319aa8 items=0 ppid=2767 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:25.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462396239666462306664656635303134643432373733383234303535 Oct 2 19:43:25.355000 audit: BPF prog-id=114 op=UNLOAD Oct 2 19:43:25.356000 audit: BPF prog-id=113 op=UNLOAD Oct 2 19:43:25.356000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.356000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.356000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.356000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.356000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.356000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.356000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.356000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.356000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.356000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.356000 audit: BPF prog-id=115 op=LOAD Oct 2 19:43:25.356000 audit[2777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000319eb8 items=0 ppid=2767 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:25.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462396239666462306664656635303134643432373733383234303535 Oct 2 19:43:25.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.397000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.404478 env[1565]: time="2023-10-02T19:43:25.404392595Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-4rhtr,Uid:715814ad-303c-4fa1-8e60-569d0bef7c04,Namespace:kube-system,Attempt:0,} returns sandbox id \"db9b9fdb0fdef5014d42773824055a42993ce15303692b6f026715b4bd6f2aa6\"" Oct 2 19:43:25.397000 audit[2755]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2745 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:25.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361393239336431616232356334366166633134333533643265656434 Oct 2 19:43:25.404000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.404000 audit[2755]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2745 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:25.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361393239336431616232356334366166633134333533643265656434 Oct 2 19:43:25.404000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.404000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.404000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.404000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.404000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.404000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.404000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.404000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.404000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.404000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.404000 audit: BPF prog-id=117 op=LOAD Oct 2 19:43:25.404000 audit[2755]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000288d20 items=0 ppid=2745 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:25.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361393239336431616232356334366166633134333533643265656434 Oct 2 19:43:25.406000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.406000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.406000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.406000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.406000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.406000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.406000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.406000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.406000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.406000 audit: BPF prog-id=118 op=LOAD Oct 2 19:43:25.406000 audit[2755]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000288d68 items=0 ppid=2745 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:25.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361393239336431616232356334366166633134333533643265656434 Oct 2 19:43:25.410324 env[1565]: time="2023-10-02T19:43:25.409278061Z" level=info msg="CreateContainer within sandbox \"db9b9fdb0fdef5014d42773824055a42993ce15303692b6f026715b4bd6f2aa6\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:43:25.413000 audit: BPF prog-id=118 op=UNLOAD Oct 2 19:43:25.413000 audit: BPF prog-id=117 op=UNLOAD Oct 2 19:43:25.413000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.413000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.413000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.413000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.413000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.413000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.413000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.413000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.413000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.413000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.413000 audit: BPF prog-id=119 op=LOAD Oct 2 19:43:25.413000 audit[2755]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000289178 items=0 ppid=2745 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:25.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361393239336431616232356334366166633134333533643265656434 Oct 2 19:43:25.448240 env[1565]: time="2023-10-02T19:43:25.444606636Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:cilium-d2h4s,Uid:590c1673-f0de-46f7-8d5d-aea6ef7a5e8c,Namespace:kube-system,Attempt:0,} returns sandbox id \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\"" Oct 2 19:43:25.451988 env[1565]: time="2023-10-02T19:43:25.450933101Z" level=info msg="PullImage \"quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\"" Oct 2 19:43:25.453848 env[1565]: time="2023-10-02T19:43:25.453815151Z" level=info msg="CreateContainer within sandbox \"db9b9fdb0fdef5014d42773824055a42993ce15303692b6f026715b4bd6f2aa6\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9357669903204c39f03ecb4a5448a3f78b83d2ee5c0baf97ccd5834e885c2586\"" Oct 2 19:43:25.456366 env[1565]: time="2023-10-02T19:43:25.454899250Z" level=info msg="StartContainer for \"9357669903204c39f03ecb4a5448a3f78b83d2ee5c0baf97ccd5834e885c2586\"" Oct 2 19:43:25.478755 systemd[1]: Started cri-containerd-9357669903204c39f03ecb4a5448a3f78b83d2ee5c0baf97ccd5834e885c2586.scope. Oct 2 19:43:25.495015 env[1565]: time="2023-10-02T19:43:25.494951942Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:cilium-operator-6bc8ccdb58-dhl7j,Uid:fc440f41-4c85-48d1-8250-3b3bb7ff1587,Namespace:kube-system,Attempt:0,}" Oct 2 19:43:25.509000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.509000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2767 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:25.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933353736363939303332303463333966303365636234613534343861 Oct 2 19:43:25.509000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.509000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.509000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.509000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.509000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.509000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.509000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.509000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.509000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.509000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.509000 audit: BPF prog-id=120 op=LOAD Oct 2 19:43:25.509000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00034dbe0 items=0 ppid=2767 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:25.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933353736363939303332303463333966303365636234613534343861 Oct 2 19:43:25.509000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.509000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.509000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.509000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.509000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.509000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.509000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.509000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.509000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.509000 audit: BPF prog-id=121 op=LOAD Oct 2 19:43:25.509000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00034dc28 items=0 ppid=2767 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:25.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933353736363939303332303463333966303365636234613534343861 Oct 2 19:43:25.510000 audit: BPF prog-id=121 op=UNLOAD Oct 2 19:43:25.510000 audit: BPF prog-id=120 op=UNLOAD Oct 2 19:43:25.510000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.510000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.510000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.510000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.510000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.510000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.510000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.510000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.510000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.510000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.510000 audit: BPF prog-id=122 op=LOAD Oct 2 19:43:25.510000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00034dcb8 items=0 ppid=2767 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:25.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933353736363939303332303463333966303365636234613534343861 Oct 2 19:43:25.533035 env[1565]: time="2023-10-02T19:43:25.532149185Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:43:25.533035 env[1565]: time="2023-10-02T19:43:25.532257602Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:43:25.533035 env[1565]: time="2023-10-02T19:43:25.532289098Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:43:25.533035 env[1565]: time="2023-10-02T19:43:25.532622397Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c09fbca7d440b84bcd92793e3b907a75236773b5d1d3417c62df066f03f34837 pid=2851 runtime=io.containerd.runc.v2 Oct 2 19:43:25.538685 env[1565]: time="2023-10-02T19:43:25.538577888Z" level=info msg="StartContainer for \"9357669903204c39f03ecb4a5448a3f78b83d2ee5c0baf97ccd5834e885c2586\" returns successfully" Oct 2 19:43:25.553361 systemd[1]: Started cri-containerd-c09fbca7d440b84bcd92793e3b907a75236773b5d1d3417c62df066f03f34837.scope. Oct 2 19:43:25.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.571000 audit: BPF prog-id=123 op=LOAD Oct 2 19:43:25.571000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.571000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2851 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:25.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330396662636137643434306238346263643932373933653362393037 Oct 2 19:43:25.571000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.571000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2851 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:25.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330396662636137643434306238346263643932373933653362393037 Oct 2 19:43:25.571000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.571000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.571000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.571000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.571000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.571000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.571000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.571000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.571000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.571000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.571000 audit: BPF prog-id=124 op=LOAD Oct 2 19:43:25.571000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0003aa5b0 items=0 ppid=2851 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:25.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330396662636137643434306238346263643932373933653362393037 Oct 2 19:43:25.572000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.572000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.572000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.572000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.572000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.572000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.572000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.572000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.572000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.572000 audit: BPF prog-id=125 op=LOAD Oct 2 19:43:25.572000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0003aa5f8 items=0 ppid=2851 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:25.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330396662636137643434306238346263643932373933653362393037 Oct 2 19:43:25.572000 audit: BPF prog-id=125 op=UNLOAD Oct 2 19:43:25.572000 audit: BPF prog-id=124 op=UNLOAD Oct 2 19:43:25.572000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.572000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.572000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.572000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.572000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.572000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.572000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.572000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.572000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.572000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:25.572000 audit: BPF prog-id=126 op=LOAD Oct 2 19:43:25.572000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003aaa08 items=0 ppid=2851 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:25.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330396662636137643434306238346263643932373933653362393037 Oct 2 19:43:25.611399 env[1565]: time="2023-10-02T19:43:25.611359583Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:cilium-operator-6bc8ccdb58-dhl7j,Uid:fc440f41-4c85-48d1-8250-3b3bb7ff1587,Namespace:kube-system,Attempt:0,} returns sandbox id \"c09fbca7d440b84bcd92793e3b907a75236773b5d1d3417c62df066f03f34837\"" Oct 2 19:43:25.852632 kubelet[2670]: I1002 19:43:25.852424 2670 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-4rhtr" podStartSLOduration=1.852368005 podCreationTimestamp="2023-10-02 19:43:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:43:25.851801944 +0000 UTC m=+14.373919794" watchObservedRunningTime="2023-10-02 19:43:25.852368005 +0000 UTC m=+14.374485856" Oct 2 19:43:26.111000 audit[2921]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2921 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.111000 audit[2921]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd91c01d90 a2=0 a3=7ffd91c01d7c items=0 ppid=2838 pid=2921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.111000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:43:26.114000 audit[2922]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.114000 audit[2922]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff12349110 a2=0 a3=7fff123490fc items=0 ppid=2838 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:43:26.115000 audit[2923]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=2923 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.115000 audit[2923]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe68267380 a2=0 a3=7ffe6826736c items=0 ppid=2838 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.115000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:43:26.117000 audit[2924]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2924 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.117000 audit[2924]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc23545370 a2=0 a3=7ffc2354535c items=0 ppid=2838 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.117000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:43:26.118000 audit[2925]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2925 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.118000 audit[2925]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc21e23d0 a2=0 a3=7fffc21e23bc items=0 ppid=2838 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.118000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:43:26.120000 audit[2926]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.120000 audit[2926]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca0689020 a2=0 a3=7ffca068900c items=0 ppid=2838 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.120000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:43:26.221000 audit[2927]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2927 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.221000 audit[2927]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffff1c712f0 a2=0 a3=7ffff1c712dc items=0 ppid=2838 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.221000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:43:26.228000 audit[2929]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2929 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.228000 audit[2929]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe8322d920 a2=0 a3=7ffe8322d90c items=0 ppid=2838 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:43:26.237000 audit[2932]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.237000 audit[2932]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcc0467360 a2=0 a3=7ffcc046734c items=0 ppid=2838 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.237000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:43:26.238000 audit[2933]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2933 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.238000 audit[2933]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff57927050 a2=0 a3=7fff5792703c items=0 ppid=2838 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.238000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:43:26.242000 audit[2935]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2935 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.242000 audit[2935]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe9c11c3e0 a2=0 a3=7ffe9c11c3cc items=0 ppid=2838 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.242000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:43:26.244000 audit[2936]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2936 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.244000 audit[2936]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef049afc0 a2=0 a3=7ffef049afac items=0 ppid=2838 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.244000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:43:26.249000 audit[2938]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2938 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.249000 audit[2938]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffda70d94e0 a2=0 a3=7ffda70d94cc items=0 ppid=2838 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.249000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:43:26.254000 audit[2941]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2941 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.254000 audit[2941]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd7db3bb40 a2=0 a3=7ffd7db3bb2c items=0 ppid=2838 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.254000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:43:26.255000 audit[2942]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2942 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.255000 audit[2942]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc8cadf20 a2=0 a3=7fffc8cadf0c items=0 ppid=2838 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.255000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:43:26.267000 audit[2944]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2944 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.267000 audit[2944]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff1320e910 a2=0 a3=7fff1320e8fc items=0 ppid=2838 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.267000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:43:26.271000 audit[2945]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2945 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.271000 audit[2945]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda1d25390 a2=0 a3=7ffda1d2537c items=0 ppid=2838 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.271000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:43:26.275000 audit[2947]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2947 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.275000 audit[2947]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeaeedcf50 a2=0 a3=7ffeaeedcf3c items=0 ppid=2838 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.275000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:43:26.279000 audit[2950]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2950 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.279000 audit[2950]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc7a400940 a2=0 a3=7ffc7a40092c items=0 ppid=2838 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.279000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:43:26.284000 audit[2953]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2953 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.284000 audit[2953]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe7786a990 a2=0 a3=7ffe7786a97c items=0 ppid=2838 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.284000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:43:26.285000 audit[2954]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2954 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.285000 audit[2954]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffefe6f2ce0 a2=0 a3=7ffefe6f2ccc items=0 ppid=2838 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.285000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:43:26.288000 audit[2956]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2956 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.288000 audit[2956]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe5d3fcc60 a2=0 a3=7ffe5d3fcc4c items=0 ppid=2838 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.288000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:43:26.292000 audit[2959]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.292000 audit[2959]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc06da08c0 a2=0 a3=7ffc06da08ac items=0 ppid=2838 pid=2959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.292000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:43:26.294000 audit[2960]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2960 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.294000 audit[2960]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5eef4620 a2=0 a3=7ffd5eef460c items=0 ppid=2838 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.294000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:43:26.297000 audit[2962]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2962 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:43:26.297000 audit[2962]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffcc2cfec10 a2=0 a3=7ffcc2cfebfc items=0 ppid=2838 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.297000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:43:26.327000 audit[2968]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2968 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:43:26.327000 audit[2968]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd5d452130 a2=0 a3=7ffd5d45211c items=0 ppid=2838 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.327000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:43:26.337000 audit[2968]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2968 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:43:26.337000 audit[2968]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffd5d452130 a2=0 a3=7ffd5d45211c items=0 ppid=2838 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.337000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:43:26.339000 audit[2974]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2974 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.339000 audit[2974]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd67335aa0 a2=0 a3=7ffd67335a8c items=0 ppid=2838 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.339000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:43:26.342000 audit[2976]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2976 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.342000 audit[2976]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeec1706a0 a2=0 a3=7ffeec17068c items=0 ppid=2838 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.342000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:43:26.347000 audit[2979]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2979 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.347000 audit[2979]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe3cc24410 a2=0 a3=7ffe3cc243fc items=0 ppid=2838 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.347000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:43:26.349000 audit[2980]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2980 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.349000 audit[2980]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff08d4450 a2=0 a3=7ffff08d443c items=0 ppid=2838 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.349000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:43:26.352000 audit[2982]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2982 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.352000 audit[2982]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffed9ca7f70 a2=0 a3=7ffed9ca7f5c items=0 ppid=2838 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.352000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:43:26.353000 audit[2983]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2983 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.353000 audit[2983]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc677a2340 a2=0 a3=7ffc677a232c items=0 ppid=2838 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.353000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:43:26.356000 audit[2985]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2985 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.356000 audit[2985]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffddedf9bc0 a2=0 a3=7ffddedf9bac items=0 ppid=2838 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.356000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:43:26.360000 audit[2988]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2988 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.360000 audit[2988]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc375f47c0 a2=0 a3=7ffc375f47ac items=0 ppid=2838 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.360000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:43:26.362000 audit[2989]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2989 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.362000 audit[2989]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea67aa810 a2=0 a3=7ffea67aa7fc items=0 ppid=2838 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.362000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:43:26.365000 audit[2991]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2991 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.365000 audit[2991]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdff6e99b0 a2=0 a3=7ffdff6e999c items=0 ppid=2838 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.365000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:43:26.367000 audit[2992]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2992 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.367000 audit[2992]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcfd749de0 a2=0 a3=7ffcfd749dcc items=0 ppid=2838 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.367000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:43:26.371000 audit[2994]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2994 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.371000 audit[2994]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd1669c570 a2=0 a3=7ffd1669c55c items=0 ppid=2838 pid=2994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.371000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:43:26.375000 audit[2997]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2997 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.375000 audit[2997]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff70110c00 a2=0 a3=7fff70110bec items=0 ppid=2838 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.375000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:43:26.380000 audit[3000]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3000 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.380000 audit[3000]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe80e17ca0 a2=0 a3=7ffe80e17c8c items=0 ppid=2838 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.380000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:43:26.381000 audit[3001]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3001 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.381000 audit[3001]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdf203e9d0 a2=0 a3=7ffdf203e9bc items=0 ppid=2838 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.381000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:43:26.384000 audit[3003]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3003 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.384000 audit[3003]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd93b04b60 a2=0 a3=7ffd93b04b4c items=0 ppid=2838 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.384000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:43:26.388000 audit[3006]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3006 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.388000 audit[3006]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff48d02de0 a2=0 a3=7fff48d02dcc items=0 ppid=2838 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.388000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:43:26.390000 audit[3007]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3007 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.390000 audit[3007]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffddd4e7f60 a2=0 a3=7ffddd4e7f4c items=0 ppid=2838 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.390000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:43:26.393000 audit[3009]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3009 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.393000 audit[3009]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffceead75f0 a2=0 a3=7ffceead75dc items=0 ppid=2838 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.393000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:43:26.394000 audit[3010]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3010 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.394000 audit[3010]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed179b430 a2=0 a3=7ffed179b41c items=0 ppid=2838 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.394000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:43:26.397000 audit[3012]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3012 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.397000 audit[3012]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffef0ab6c60 a2=0 a3=7ffef0ab6c4c items=0 ppid=2838 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.397000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:43:26.402000 audit[3015]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3015 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:43:26.402000 audit[3015]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcc76ee270 a2=0 a3=7ffcc76ee25c items=0 ppid=2838 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.402000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:43:26.405000 audit[3017]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3017 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:43:26.405000 audit[3017]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc1aac21a0 a2=0 a3=7ffc1aac218c items=0 ppid=2838 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.405000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:43:26.406000 audit[3017]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3017 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:43:26.406000 audit[3017]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffc1aac21a0 a2=0 a3=7ffc1aac218c items=0 ppid=2838 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:26.406000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:43:31.124750 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount509931680.mount: Deactivated successfully. Oct 2 19:43:35.197291 env[1565]: time="2023-10-02T19:43:35.197237306Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/cilium/cilium@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:43:35.199948 env[1565]: time="2023-10-02T19:43:35.199889496Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3e35b3e9f295e7748482d40ed499b0ff7961f1f128d479d8e6682b3245bba69b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:43:35.202582 env[1565]: time="2023-10-02T19:43:35.202540318Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/cilium/cilium@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:43:35.203224 env[1565]: time="2023-10-02T19:43:35.203186943Z" level=info msg="PullImage \"quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\" returns image reference \"sha256:3e35b3e9f295e7748482d40ed499b0ff7961f1f128d479d8e6682b3245bba69b\"" Oct 2 19:43:35.206771 env[1565]: time="2023-10-02T19:43:35.206597253Z" level=info msg="PullImage \"quay.io/cilium/operator-generic:v1.12.5@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e\"" Oct 2 19:43:35.208529 env[1565]: time="2023-10-02T19:43:35.208088719Z" level=info msg="CreateContainer within sandbox \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:0,}" Oct 2 19:43:35.246365 env[1565]: time="2023-10-02T19:43:35.246317529Z" level=info msg="CreateContainer within sandbox \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\" for &ContainerMetadata{Name:mount-cgroup,Attempt:0,} returns container id \"e03b1adb811b915ceb732f2dcba67b74e6a881daf17f3d51b2a595d2bc97b1ca\"" Oct 2 19:43:35.250416 env[1565]: time="2023-10-02T19:43:35.250377111Z" level=info msg="StartContainer for \"e03b1adb811b915ceb732f2dcba67b74e6a881daf17f3d51b2a595d2bc97b1ca\"" Oct 2 19:43:35.315264 systemd[1]: Started cri-containerd-e03b1adb811b915ceb732f2dcba67b74e6a881daf17f3d51b2a595d2bc97b1ca.scope. Oct 2 19:43:35.329280 systemd[1]: cri-containerd-e03b1adb811b915ceb732f2dcba67b74e6a881daf17f3d51b2a595d2bc97b1ca.scope: Deactivated successfully. Oct 2 19:43:35.512033 env[1565]: time="2023-10-02T19:43:35.511265699Z" level=info msg="shim disconnected" id=e03b1adb811b915ceb732f2dcba67b74e6a881daf17f3d51b2a595d2bc97b1ca Oct 2 19:43:35.512033 env[1565]: time="2023-10-02T19:43:35.511320486Z" level=warning msg="cleaning up after shim disconnected" id=e03b1adb811b915ceb732f2dcba67b74e6a881daf17f3d51b2a595d2bc97b1ca namespace=k8s.io Oct 2 19:43:35.512033 env[1565]: time="2023-10-02T19:43:35.511334181Z" level=info msg="cleaning up dead shim" Oct 2 19:43:35.524376 env[1565]: time="2023-10-02T19:43:35.524079031Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:43:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3044 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:43:35Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/e03b1adb811b915ceb732f2dcba67b74e6a881daf17f3d51b2a595d2bc97b1ca/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:43:35.524687 env[1565]: time="2023-10-02T19:43:35.524510979Z" level=error msg="copy shim log" error="read /proc/self/fd/44: file already closed" Oct 2 19:43:35.526001 env[1565]: time="2023-10-02T19:43:35.525956202Z" level=error msg="Failed to pipe stdout of container \"e03b1adb811b915ceb732f2dcba67b74e6a881daf17f3d51b2a595d2bc97b1ca\"" error="reading from a closed fifo" Oct 2 19:43:35.526247 env[1565]: time="2023-10-02T19:43:35.525995297Z" level=error msg="Failed to pipe stderr of container \"e03b1adb811b915ceb732f2dcba67b74e6a881daf17f3d51b2a595d2bc97b1ca\"" error="reading from a closed fifo" Oct 2 19:43:35.527899 env[1565]: time="2023-10-02T19:43:35.527842867Z" level=error msg="StartContainer for \"e03b1adb811b915ceb732f2dcba67b74e6a881daf17f3d51b2a595d2bc97b1ca\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:43:35.528223 kubelet[2670]: E1002 19:43:35.528199 2670 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="e03b1adb811b915ceb732f2dcba67b74e6a881daf17f3d51b2a595d2bc97b1ca" Oct 2 19:43:35.529419 kubelet[2670]: E1002 19:43:35.529240 2670 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:43:35.529419 kubelet[2670]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:43:35.529419 kubelet[2670]: rm /hostbin/cilium-mount Oct 2 19:43:35.529585 kubelet[2670]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-tk56z,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:43:35.529585 kubelet[2670]: E1002 19:43:35.529374 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:43:35.914199 env[1565]: time="2023-10-02T19:43:35.914152722Z" level=info msg="CreateContainer within sandbox \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:1,}" Oct 2 19:43:35.942320 env[1565]: time="2023-10-02T19:43:35.942266296Z" level=info msg="CreateContainer within sandbox \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\" for &ContainerMetadata{Name:mount-cgroup,Attempt:1,} returns container id \"4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f\"" Oct 2 19:43:35.943846 env[1565]: time="2023-10-02T19:43:35.943808468Z" level=info msg="StartContainer for \"4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f\"" Oct 2 19:43:35.977528 systemd[1]: Started cri-containerd-4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f.scope. Oct 2 19:43:35.993190 systemd[1]: cri-containerd-4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f.scope: Deactivated successfully. Oct 2 19:43:36.011134 env[1565]: time="2023-10-02T19:43:36.011063700Z" level=info msg="shim disconnected" id=4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f Oct 2 19:43:36.011134 env[1565]: time="2023-10-02T19:43:36.011132177Z" level=warning msg="cleaning up after shim disconnected" id=4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f namespace=k8s.io Oct 2 19:43:36.011134 env[1565]: time="2023-10-02T19:43:36.011144304Z" level=info msg="cleaning up dead shim" Oct 2 19:43:36.023901 env[1565]: time="2023-10-02T19:43:36.023700025Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:43:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3081 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:43:36Z\" level=warning msg=\"failed to remove runc container\" error=\"runc did not terminate successfully: exit status 255: \" runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:43:36Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:43:36.025106 env[1565]: time="2023-10-02T19:43:36.024593085Z" level=error msg="copy shim log" error="read /proc/self/fd/49: file already closed" Oct 2 19:43:36.025321 env[1565]: time="2023-10-02T19:43:36.025272866Z" level=error msg="Failed to pipe stderr of container \"4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f\"" error="reading from a closed fifo" Oct 2 19:43:36.025584 env[1565]: time="2023-10-02T19:43:36.025433381Z" level=error msg="Failed to pipe stdout of container \"4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f\"" error="reading from a closed fifo" Oct 2 19:43:36.027946 env[1565]: time="2023-10-02T19:43:36.027864034Z" level=error msg="StartContainer for \"4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:43:36.028240 kubelet[2670]: E1002 19:43:36.028215 2670 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f" Oct 2 19:43:36.028364 kubelet[2670]: E1002 19:43:36.028337 2670 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:43:36.028364 kubelet[2670]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:43:36.028364 kubelet[2670]: rm /hostbin/cilium-mount Oct 2 19:43:36.028364 kubelet[2670]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-tk56z,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:43:36.028831 kubelet[2670]: E1002 19:43:36.028387 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:43:36.228841 systemd[1]: run-containerd-runc-k8s.io-e03b1adb811b915ceb732f2dcba67b74e6a881daf17f3d51b2a595d2bc97b1ca-runc.hHMrlR.mount: Deactivated successfully. Oct 2 19:43:36.228981 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e03b1adb811b915ceb732f2dcba67b74e6a881daf17f3d51b2a595d2bc97b1ca-rootfs.mount: Deactivated successfully. Oct 2 19:43:36.480258 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount801400583.mount: Deactivated successfully. Oct 2 19:43:36.916307 kubelet[2670]: I1002 19:43:36.916281 2670 scope.go:117] "RemoveContainer" containerID="e03b1adb811b915ceb732f2dcba67b74e6a881daf17f3d51b2a595d2bc97b1ca" Oct 2 19:43:36.918484 kubelet[2670]: I1002 19:43:36.918436 2670 scope.go:117] "RemoveContainer" containerID="e03b1adb811b915ceb732f2dcba67b74e6a881daf17f3d51b2a595d2bc97b1ca" Oct 2 19:43:36.933874 env[1565]: time="2023-10-02T19:43:36.933830028Z" level=info msg="RemoveContainer for \"e03b1adb811b915ceb732f2dcba67b74e6a881daf17f3d51b2a595d2bc97b1ca\"" Oct 2 19:43:36.942028 env[1565]: time="2023-10-02T19:43:36.941983230Z" level=info msg="RemoveContainer for \"e03b1adb811b915ceb732f2dcba67b74e6a881daf17f3d51b2a595d2bc97b1ca\" returns successfully" Oct 2 19:43:36.949321 env[1565]: time="2023-10-02T19:43:36.949281552Z" level=info msg="RemoveContainer for \"e03b1adb811b915ceb732f2dcba67b74e6a881daf17f3d51b2a595d2bc97b1ca\"" Oct 2 19:43:36.949513 env[1565]: time="2023-10-02T19:43:36.949492142Z" level=info msg="RemoveContainer for \"e03b1adb811b915ceb732f2dcba67b74e6a881daf17f3d51b2a595d2bc97b1ca\" returns successfully" Oct 2 19:43:36.953250 kubelet[2670]: E1002 19:43:36.953212 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 10s restarting failed container=mount-cgroup pod=cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c)\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:43:37.578762 env[1565]: time="2023-10-02T19:43:37.578674693Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/cilium/operator-generic@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:43:37.581445 env[1565]: time="2023-10-02T19:43:37.581400470Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed355de9f59fe391dbe53f3c7c7a60baab3c3a9b7549aa54d10b87fff7dacf7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:43:37.583500 env[1565]: time="2023-10-02T19:43:37.583459966Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/cilium/operator-generic@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:43:37.584257 env[1565]: time="2023-10-02T19:43:37.584124319Z" level=info msg="PullImage \"quay.io/cilium/operator-generic:v1.12.5@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e\" returns image reference \"sha256:ed355de9f59fe391dbe53f3c7c7a60baab3c3a9b7549aa54d10b87fff7dacf7c\"" Oct 2 19:43:37.592582 env[1565]: time="2023-10-02T19:43:37.592542813Z" level=info msg="CreateContainer within sandbox \"c09fbca7d440b84bcd92793e3b907a75236773b5d1d3417c62df066f03f34837\" for container &ContainerMetadata{Name:cilium-operator,Attempt:0,}" Oct 2 19:43:37.615572 env[1565]: time="2023-10-02T19:43:37.615514031Z" level=info msg="CreateContainer within sandbox \"c09fbca7d440b84bcd92793e3b907a75236773b5d1d3417c62df066f03f34837\" for &ContainerMetadata{Name:cilium-operator,Attempt:0,} returns container id \"5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc\"" Oct 2 19:43:37.619326 env[1565]: time="2023-10-02T19:43:37.618060966Z" level=info msg="StartContainer for \"5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc\"" Oct 2 19:43:37.647620 systemd[1]: Started cri-containerd-5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc.scope. Oct 2 19:43:37.667182 systemd[1]: run-containerd-runc-k8s.io-5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc-runc.0Nilbi.mount: Deactivated successfully. Oct 2 19:43:37.697241 kernel: kauditd_printk_skb: 361 callbacks suppressed Oct 2 19:43:37.697413 kernel: audit: type=1400 audit(1696275817.688:1095): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.697453 kernel: audit: type=1400 audit(1696275817.688:1096): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.708928 kernel: audit: type=1400 audit(1696275817.688:1097): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.735975 kernel: audit: type=1400 audit(1696275817.688:1098): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.749072 kernel: audit: type=1400 audit(1696275817.688:1099): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.749195 kernel: audit: type=1400 audit(1696275817.688:1100): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.755558 kernel: audit: type=1400 audit(1696275817.688:1101): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.779259 kernel: audit: type=1400 audit(1696275817.688:1102): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.779417 kernel: audit: type=1400 audit(1696275817.688:1103): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.781455 kernel: audit: type=1400 audit(1696275817.704:1104): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.704000 audit: BPF prog-id=127 op=LOAD Oct 2 19:43:37.707000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.707000 audit[3102]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2851 pid=3102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:37.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563303033316334346565313532373137623865386230306361343635 Oct 2 19:43:37.707000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.707000 audit[3102]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2851 pid=3102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:37.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563303033316334346565313532373137623865386230306361343635 Oct 2 19:43:37.707000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.707000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.707000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.707000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.707000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.707000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.707000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.707000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.707000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.707000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.707000 audit: BPF prog-id=128 op=LOAD Oct 2 19:43:37.707000 audit[3102]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00026f300 items=0 ppid=2851 pid=3102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:37.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563303033316334346565313532373137623865386230306361343635 Oct 2 19:43:37.708000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.708000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.708000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.708000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.708000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.708000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.708000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.708000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.708000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.708000 audit: BPF prog-id=129 op=LOAD Oct 2 19:43:37.708000 audit[3102]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00026f348 items=0 ppid=2851 pid=3102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:37.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563303033316334346565313532373137623865386230306361343635 Oct 2 19:43:37.708000 audit: BPF prog-id=129 op=UNLOAD Oct 2 19:43:37.708000 audit: BPF prog-id=128 op=UNLOAD Oct 2 19:43:37.708000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.708000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.708000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.708000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.708000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.708000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.708000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.708000 audit[3102]: AVC avc: denied { perfmon } for pid=3102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.708000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.708000 audit[3102]: AVC avc: denied { bpf } for pid=3102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:43:37.708000 audit: BPF prog-id=130 op=LOAD Oct 2 19:43:37.708000 audit[3102]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00026f758 items=0 ppid=2851 pid=3102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:37.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563303033316334346565313532373137623865386230306361343635 Oct 2 19:43:37.798776 env[1565]: time="2023-10-02T19:43:37.798685265Z" level=info msg="StartContainer for \"5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc\" returns successfully" Oct 2 19:43:37.829000 audit[3113]: AVC avc: denied { map_create } for pid=3113 comm="cilium-operator" scontext=system_u:system_r:svirt_lxc_net_t:s0:c10,c18 tcontext=system_u:system_r:svirt_lxc_net_t:s0:c10,c18 tclass=bpf permissive=0 Oct 2 19:43:37.829000 audit[3113]: SYSCALL arch=c000003e syscall=321 success=no exit=-13 a0=0 a1=c0003f97d0 a2=48 a3=0 items=0 ppid=2851 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cilium-operator" exe="/usr/bin/cilium-operator-generic" subj=system_u:system_r:svirt_lxc_net_t:s0:c10,c18 key=(null) Oct 2 19:43:37.829000 audit: PROCTITLE proctitle=63696C69756D2D6F70657261746F722D67656E65726963002D2D636F6E6669672D6469723D2F746D702F63696C69756D2F636F6E6669672D6D6170002D2D64656275673D66616C7365 Oct 2 19:43:37.941998 kubelet[2670]: E1002 19:43:37.941974 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 10s restarting failed container=mount-cgroup pod=cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c)\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:43:38.027356 kubelet[2670]: I1002 19:43:38.027318 2670 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/cilium-operator-6bc8ccdb58-dhl7j" podStartSLOduration=1.055329176 podCreationTimestamp="2023-10-02 19:43:25 +0000 UTC" firstStartedPulling="2023-10-02 19:43:25.612678724 +0000 UTC m=+14.134796556" lastFinishedPulling="2023-10-02 19:43:37.584602953 +0000 UTC m=+26.106720789" observedRunningTime="2023-10-02 19:43:37.963486696 +0000 UTC m=+26.485604546" watchObservedRunningTime="2023-10-02 19:43:38.027253409 +0000 UTC m=+26.549371346" Oct 2 19:43:38.618207 kubelet[2670]: W1002 19:43:38.618158 2670 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod590c1673_f0de_46f7_8d5d_aea6ef7a5e8c.slice/cri-containerd-e03b1adb811b915ceb732f2dcba67b74e6a881daf17f3d51b2a595d2bc97b1ca.scope WatchSource:0}: container "e03b1adb811b915ceb732f2dcba67b74e6a881daf17f3d51b2a595d2bc97b1ca" in namespace "k8s.io": not found Oct 2 19:43:41.725796 kubelet[2670]: W1002 19:43:41.725258 2670 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod590c1673_f0de_46f7_8d5d_aea6ef7a5e8c.slice/cri-containerd-4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f.scope WatchSource:0}: task 4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f not found: not found Oct 2 19:43:51.713984 env[1565]: time="2023-10-02T19:43:51.713806947Z" level=info msg="CreateContainer within sandbox \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:2,}" Oct 2 19:43:51.733529 env[1565]: time="2023-10-02T19:43:51.733473934Z" level=info msg="CreateContainer within sandbox \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\" for &ContainerMetadata{Name:mount-cgroup,Attempt:2,} returns container id \"dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33\"" Oct 2 19:43:51.734446 env[1565]: time="2023-10-02T19:43:51.734352146Z" level=info msg="StartContainer for \"dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33\"" Oct 2 19:43:51.768025 systemd[1]: Started cri-containerd-dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33.scope. Oct 2 19:43:51.786667 systemd[1]: cri-containerd-dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33.scope: Deactivated successfully. Oct 2 19:43:51.793798 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33-rootfs.mount: Deactivated successfully. Oct 2 19:43:51.807276 env[1565]: time="2023-10-02T19:43:51.807219402Z" level=info msg="shim disconnected" id=dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33 Oct 2 19:43:51.807276 env[1565]: time="2023-10-02T19:43:51.807274475Z" level=warning msg="cleaning up after shim disconnected" id=dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33 namespace=k8s.io Oct 2 19:43:51.807588 env[1565]: time="2023-10-02T19:43:51.807285947Z" level=info msg="cleaning up dead shim" Oct 2 19:43:51.823061 env[1565]: time="2023-10-02T19:43:51.823012886Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:43:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3159 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:43:51Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:43:51.823334 env[1565]: time="2023-10-02T19:43:51.823279469Z" level=error msg="copy shim log" error="read /proc/self/fd/98: file already closed" Oct 2 19:43:51.823555 env[1565]: time="2023-10-02T19:43:51.823519501Z" level=error msg="Failed to pipe stdout of container \"dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33\"" error="reading from a closed fifo" Oct 2 19:43:51.823637 env[1565]: time="2023-10-02T19:43:51.823600679Z" level=error msg="Failed to pipe stderr of container \"dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33\"" error="reading from a closed fifo" Oct 2 19:43:51.825829 env[1565]: time="2023-10-02T19:43:51.825782673Z" level=error msg="StartContainer for \"dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:43:51.826136 kubelet[2670]: E1002 19:43:51.826113 2670 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33" Oct 2 19:43:51.826683 kubelet[2670]: E1002 19:43:51.826362 2670 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:43:51.826683 kubelet[2670]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:43:51.826683 kubelet[2670]: rm /hostbin/cilium-mount Oct 2 19:43:51.826683 kubelet[2670]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-tk56z,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:43:51.826683 kubelet[2670]: E1002 19:43:51.826421 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:43:51.976546 kubelet[2670]: I1002 19:43:51.975132 2670 scope.go:117] "RemoveContainer" containerID="4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f" Oct 2 19:43:51.976546 kubelet[2670]: I1002 19:43:51.975578 2670 scope.go:117] "RemoveContainer" containerID="4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f" Oct 2 19:43:51.978474 env[1565]: time="2023-10-02T19:43:51.978441055Z" level=info msg="RemoveContainer for \"4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f\"" Oct 2 19:43:51.980188 env[1565]: time="2023-10-02T19:43:51.980078963Z" level=info msg="RemoveContainer for \"4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f\"" Oct 2 19:43:51.981107 env[1565]: time="2023-10-02T19:43:51.981052052Z" level=error msg="RemoveContainer for \"4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f\" failed" error="failed to set removing state for container \"4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f\": container is already in removing state" Oct 2 19:43:51.981424 kubelet[2670]: E1002 19:43:51.981409 2670 remote_runtime.go:385] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f\": container is already in removing state" containerID="4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f" Oct 2 19:43:51.981579 kubelet[2670]: E1002 19:43:51.981567 2670 kuberuntime_container.go:820] failed to remove pod init container "mount-cgroup": rpc error: code = Unknown desc = failed to set removing state for container "4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f": container is already in removing state; Skipping pod "cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c)" Oct 2 19:43:51.982784 kubelet[2670]: E1002 19:43:51.982767 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 20s restarting failed container=mount-cgroup pod=cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c)\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:43:51.992617 env[1565]: time="2023-10-02T19:43:51.992570411Z" level=info msg="RemoveContainer for \"4dd2b74750e46e9e6e6894eed57122cb13aec2a4df44b7c89b0b38f1bf4e854f\" returns successfully" Oct 2 19:43:54.913785 kubelet[2670]: W1002 19:43:54.913732 2670 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod590c1673_f0de_46f7_8d5d_aea6ef7a5e8c.slice/cri-containerd-dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33.scope WatchSource:0}: task dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33 not found: not found Oct 2 19:43:56.837771 systemd[1]: Started sshd@7-172.31.21.168:22-139.178.89.65:51384.service. Oct 2 19:43:56.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.21.168:22-139.178.89.65:51384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:43:56.839855 kernel: kauditd_printk_skb: 50 callbacks suppressed Oct 2 19:43:56.839951 kernel: audit: type=1130 audit(1696275836.837:1114): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.21.168:22-139.178.89.65:51384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:43:57.041000 audit[3177]: USER_ACCT pid=3177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:43:57.042902 sshd[3177]: Accepted publickey for core from 139.178.89.65 port 51384 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:43:57.048939 kernel: audit: type=1101 audit(1696275837.041:1115): pid=3177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:43:57.048000 audit[3177]: CRED_ACQ pid=3177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:43:57.050068 sshd[3177]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:43:57.057328 systemd[1]: Started session-8.scope. Oct 2 19:43:57.059176 kernel: audit: type=1103 audit(1696275837.048:1116): pid=3177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:43:57.059264 kernel: audit: type=1006 audit(1696275837.048:1117): pid=3177 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Oct 2 19:43:57.059100 systemd-logind[1555]: New session 8 of user core. Oct 2 19:43:57.048000 audit[3177]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe146668f0 a2=3 a3=0 items=0 ppid=1 pid=3177 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:57.065769 kernel: audit: type=1300 audit(1696275837.048:1117): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe146668f0 a2=3 a3=0 items=0 ppid=1 pid=3177 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:43:57.048000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:43:57.071264 kernel: audit: type=1327 audit(1696275837.048:1117): proctitle=737368643A20636F7265205B707269765D Oct 2 19:43:57.071378 kernel: audit: type=1105 audit(1696275837.067:1118): pid=3177 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:43:57.067000 audit[3177]: USER_START pid=3177 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:43:57.075000 audit[3179]: CRED_ACQ pid=3179 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:43:57.083051 kernel: audit: type=1103 audit(1696275837.075:1119): pid=3179 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:43:57.471031 sshd[3177]: pam_unix(sshd:session): session closed for user core Oct 2 19:43:57.472000 audit[3177]: USER_END pid=3177 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:43:57.472000 audit[3177]: CRED_DISP pid=3177 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:43:57.481046 systemd[1]: sshd@7-172.31.21.168:22-139.178.89.65:51384.service: Deactivated successfully. Oct 2 19:43:57.482304 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 19:43:57.484659 systemd-logind[1555]: Session 8 logged out. Waiting for processes to exit. Oct 2 19:43:57.486039 kernel: audit: type=1106 audit(1696275837.472:1120): pid=3177 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:43:57.486154 kernel: audit: type=1104 audit(1696275837.472:1121): pid=3177 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:43:57.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.21.168:22-139.178.89.65:51384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:43:57.486133 systemd-logind[1555]: Removed session 8. Oct 2 19:44:03.711318 kubelet[2670]: E1002 19:44:03.711283 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 20s restarting failed container=mount-cgroup pod=cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c)\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:44:07.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.21.168:22-139.178.89.65:59132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:07.501659 systemd[1]: Started sshd@8-172.31.21.168:22-139.178.89.65:59132.service. Oct 2 19:44:07.505348 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:44:07.505483 kernel: audit: type=1130 audit(1696275847.501:1123): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.21.168:22-139.178.89.65:59132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:07.519000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:44:07.537654 kernel: audit: type=1400 audit(1696275847.519:1124): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:44:07.537837 kernel: audit: type=1400 audit(1696275847.526:1125): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:44:07.539524 kernel: audit: type=1300 audit(1696275847.526:1125): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d00940 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:44:07.526000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:44:07.526000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d00940 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:44:07.526000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:44:07.563713 kernel: audit: type=1327 audit(1696275847.526:1125): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:44:07.563952 kernel: audit: type=1300 audit(1696275847.519:1124): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001427380 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:44:07.519000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001427380 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:44:07.581936 kernel: audit: type=1327 audit(1696275847.519:1124): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:44:07.519000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:44:07.688000 audit[3190]: USER_ACCT pid=3190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:07.689974 sshd[3190]: Accepted publickey for core from 139.178.89.65 port 59132 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:44:07.695000 audit[3190]: CRED_ACQ pid=3190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:07.697764 sshd[3190]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:44:07.706891 kernel: audit: type=1101 audit(1696275847.688:1126): pid=3190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:07.707004 kernel: audit: type=1103 audit(1696275847.695:1127): pid=3190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:07.707059 kernel: audit: type=1006 audit(1696275847.696:1128): pid=3190 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Oct 2 19:44:07.696000 audit[3190]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdee4f4600 a2=3 a3=0 items=0 ppid=1 pid=3190 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:44:07.696000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:44:07.709061 systemd[1]: Started session-9.scope. Oct 2 19:44:07.715003 systemd-logind[1555]: New session 9 of user core. Oct 2 19:44:07.732000 audit[3190]: USER_START pid=3190 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:07.735000 audit[3192]: CRED_ACQ pid=3192 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:07.968036 sshd[3190]: pam_unix(sshd:session): session closed for user core Oct 2 19:44:07.969000 audit[3190]: USER_END pid=3190 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:07.970000 audit[3190]: CRED_DISP pid=3190 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:07.972897 systemd[1]: sshd@8-172.31.21.168:22-139.178.89.65:59132.service: Deactivated successfully. Oct 2 19:44:07.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.21.168:22-139.178.89.65:59132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:07.974269 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 19:44:07.975428 systemd-logind[1555]: Session 9 logged out. Waiting for processes to exit. Oct 2 19:44:07.976870 systemd-logind[1555]: Removed session 9. Oct 2 19:44:08.075000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:44:08.075000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c005832de0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:44:08.075000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:44:08.076000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:44:08.076000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c005832f00 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:44:08.076000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:44:08.076000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:44:08.076000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c008d4c900 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:44:08.076000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:44:08.090000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:44:08.090000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c0059fea50 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:44:08.090000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:44:08.212000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:44:08.212000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:44:08.212000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c0058334a0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:44:08.212000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:44:08.212000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c008932ac0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:44:08.212000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:44:12.676003 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 2 19:44:12.676212 kernel: audit: type=1400 audit(1696275852.671:1140): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:44:12.671000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:44:12.683004 kernel: audit: type=1300 audit(1696275852.671:1140): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d016a0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:44:12.671000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d016a0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:44:12.671000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:44:12.696711 kernel: audit: type=1327 audit(1696275852.671:1140): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:44:12.696933 kernel: audit: type=1400 audit(1696275852.677:1141): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:44:12.677000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:44:12.677000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d017c0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:44:12.710543 kernel: audit: type=1300 audit(1696275852.677:1141): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d017c0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:44:12.710681 kernel: audit: type=1327 audit(1696275852.677:1141): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:44:12.677000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:44:12.681000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:44:12.723489 kernel: audit: type=1400 audit(1696275852.681:1142): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:44:12.723692 kernel: audit: type=1300 audit(1696275852.681:1142): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ec29a0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:44:12.681000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ec29a0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:44:12.732595 kernel: audit: type=1327 audit(1696275852.681:1142): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:44:12.681000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:44:12.683000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:44:12.747624 kernel: audit: type=1400 audit(1696275852.683:1143): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:44:12.683000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d01dc0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:44:12.683000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:44:17.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.21.168:22-139.178.89.65:42074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:17.995561 systemd[1]: Started sshd@9-172.31.21.168:22-139.178.89.65:42074.service. Oct 2 19:44:17.997127 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 19:44:17.997168 kernel: audit: type=1130 audit(1696275857.994:1144): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.21.168:22-139.178.89.65:42074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:18.180000 audit[3205]: USER_ACCT pid=3205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:18.181698 sshd[3205]: Accepted publickey for core from 139.178.89.65 port 42074 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:44:18.186000 audit[3205]: CRED_ACQ pid=3205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:18.188208 sshd[3205]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:44:18.193379 kernel: audit: type=1101 audit(1696275858.180:1145): pid=3205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:18.193621 kernel: audit: type=1103 audit(1696275858.186:1146): pid=3205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:18.193674 kernel: audit: type=1006 audit(1696275858.186:1147): pid=3205 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 2 19:44:18.198813 kernel: audit: type=1300 audit(1696275858.186:1147): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcccee2330 a2=3 a3=0 items=0 ppid=1 pid=3205 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:44:18.186000 audit[3205]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcccee2330 a2=3 a3=0 items=0 ppid=1 pid=3205 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:44:18.197970 systemd[1]: Started session-10.scope. Oct 2 19:44:18.200734 systemd-logind[1555]: New session 10 of user core. Oct 2 19:44:18.186000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:44:18.208422 kernel: audit: type=1327 audit(1696275858.186:1147): proctitle=737368643A20636F7265205B707269765D Oct 2 19:44:18.207000 audit[3205]: USER_START pid=3205 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:18.212000 audit[3207]: CRED_ACQ pid=3207 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:18.222521 kernel: audit: type=1105 audit(1696275858.207:1148): pid=3205 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:18.222665 kernel: audit: type=1103 audit(1696275858.212:1149): pid=3207 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:18.400615 sshd[3205]: pam_unix(sshd:session): session closed for user core Oct 2 19:44:18.401000 audit[3205]: USER_END pid=3205 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:18.401000 audit[3205]: CRED_DISP pid=3205 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:18.410022 systemd-logind[1555]: Session 10 logged out. Waiting for processes to exit. Oct 2 19:44:18.412200 systemd[1]: sshd@9-172.31.21.168:22-139.178.89.65:42074.service: Deactivated successfully. Oct 2 19:44:18.413283 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 19:44:18.414449 kernel: audit: type=1106 audit(1696275858.401:1150): pid=3205 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:18.414524 kernel: audit: type=1104 audit(1696275858.401:1151): pid=3205 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:18.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.21.168:22-139.178.89.65:42074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:18.415681 systemd-logind[1555]: Removed session 10. Oct 2 19:44:18.716298 env[1565]: time="2023-10-02T19:44:18.716181457Z" level=info msg="CreateContainer within sandbox \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:3,}" Oct 2 19:44:18.739023 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1998847355.mount: Deactivated successfully. Oct 2 19:44:18.752292 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1623108571.mount: Deactivated successfully. Oct 2 19:44:18.760098 env[1565]: time="2023-10-02T19:44:18.760048514Z" level=info msg="CreateContainer within sandbox \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\" for &ContainerMetadata{Name:mount-cgroup,Attempt:3,} returns container id \"69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0\"" Oct 2 19:44:18.762569 env[1565]: time="2023-10-02T19:44:18.760732206Z" level=info msg="StartContainer for \"69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0\"" Oct 2 19:44:18.795468 systemd[1]: Started cri-containerd-69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0.scope. Oct 2 19:44:18.815222 systemd[1]: cri-containerd-69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0.scope: Deactivated successfully. Oct 2 19:44:18.842091 env[1565]: time="2023-10-02T19:44:18.842040837Z" level=info msg="shim disconnected" id=69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0 Oct 2 19:44:18.842091 env[1565]: time="2023-10-02T19:44:18.842088422Z" level=warning msg="cleaning up after shim disconnected" id=69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0 namespace=k8s.io Oct 2 19:44:18.842091 env[1565]: time="2023-10-02T19:44:18.842099779Z" level=info msg="cleaning up dead shim" Oct 2 19:44:18.856723 env[1565]: time="2023-10-02T19:44:18.856675360Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:44:18Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3242 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:44:18Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:44:18.857045 env[1565]: time="2023-10-02T19:44:18.856984672Z" level=error msg="copy shim log" error="read /proc/self/fd/49: file already closed" Oct 2 19:44:18.858129 env[1565]: time="2023-10-02T19:44:18.858075733Z" level=error msg="Failed to pipe stdout of container \"69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0\"" error="reading from a closed fifo" Oct 2 19:44:18.859067 env[1565]: time="2023-10-02T19:44:18.859021988Z" level=error msg="Failed to pipe stderr of container \"69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0\"" error="reading from a closed fifo" Oct 2 19:44:18.861279 env[1565]: time="2023-10-02T19:44:18.861233219Z" level=error msg="StartContainer for \"69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:44:18.861509 kubelet[2670]: E1002 19:44:18.861485 2670 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0" Oct 2 19:44:18.861870 kubelet[2670]: E1002 19:44:18.861619 2670 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:44:18.861870 kubelet[2670]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:44:18.861870 kubelet[2670]: rm /hostbin/cilium-mount Oct 2 19:44:18.861870 kubelet[2670]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-tk56z,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:44:18.861870 kubelet[2670]: E1002 19:44:18.861672 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:44:19.044967 kubelet[2670]: I1002 19:44:19.044840 2670 scope.go:117] "RemoveContainer" containerID="dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33" Oct 2 19:44:19.045536 kubelet[2670]: I1002 19:44:19.045318 2670 scope.go:117] "RemoveContainer" containerID="dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33" Oct 2 19:44:19.049178 env[1565]: time="2023-10-02T19:44:19.049131050Z" level=info msg="RemoveContainer for \"dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33\"" Oct 2 19:44:19.051234 env[1565]: time="2023-10-02T19:44:19.051196609Z" level=info msg="RemoveContainer for \"dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33\"" Oct 2 19:44:19.052028 env[1565]: time="2023-10-02T19:44:19.051978071Z" level=error msg="RemoveContainer for \"dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33\" failed" error="failed to set removing state for container \"dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33\": container is already in removing state" Oct 2 19:44:19.052941 kubelet[2670]: E1002 19:44:19.052901 2670 remote_runtime.go:385] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33\": container is already in removing state" containerID="dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33" Oct 2 19:44:19.053525 kubelet[2670]: E1002 19:44:19.053508 2670 kuberuntime_container.go:820] failed to remove pod init container "mount-cgroup": rpc error: code = Unknown desc = failed to set removing state for container "dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33": container is already in removing state; Skipping pod "cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c)" Oct 2 19:44:19.054509 kubelet[2670]: E1002 19:44:19.054491 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 40s restarting failed container=mount-cgroup pod=cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c)\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:44:19.058336 env[1565]: time="2023-10-02T19:44:19.058285044Z" level=info msg="RemoveContainer for \"dd5ddfd7c317c1671ac7f1ffb54b3880f8697633df20d16ca1d38fc781be1a33\" returns successfully" Oct 2 19:44:19.731887 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0-rootfs.mount: Deactivated successfully. Oct 2 19:44:21.947977 kubelet[2670]: W1002 19:44:21.947938 2670 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod590c1673_f0de_46f7_8d5d_aea6ef7a5e8c.slice/cri-containerd-69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0.scope WatchSource:0}: task 69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0 not found: not found Oct 2 19:44:28.436644 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:44:28.436786 kernel: audit: type=1130 audit(1696275868.426:1153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.21.168:22-139.178.89.65:47892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:28.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.21.168:22-139.178.89.65:47892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:28.428501 systemd[1]: Started sshd@10-172.31.21.168:22-139.178.89.65:47892.service. Oct 2 19:44:28.594000 audit[3258]: USER_ACCT pid=3258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:28.595922 sshd[3258]: Accepted publickey for core from 139.178.89.65 port 47892 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:44:28.601971 kernel: audit: type=1101 audit(1696275868.594:1154): pid=3258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:28.600000 audit[3258]: CRED_ACQ pid=3258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:28.603459 sshd[3258]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:44:28.611838 kernel: audit: type=1103 audit(1696275868.600:1155): pid=3258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:28.611997 kernel: audit: type=1006 audit(1696275868.600:1156): pid=3258 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Oct 2 19:44:28.616022 kernel: audit: type=1300 audit(1696275868.600:1156): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3ee6e930 a2=3 a3=0 items=0 ppid=1 pid=3258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:44:28.600000 audit[3258]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3ee6e930 a2=3 a3=0 items=0 ppid=1 pid=3258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:44:28.620850 systemd[1]: Started session-11.scope. Oct 2 19:44:28.621831 systemd-logind[1555]: New session 11 of user core. Oct 2 19:44:28.600000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:44:28.625344 kernel: audit: type=1327 audit(1696275868.600:1156): proctitle=737368643A20636F7265205B707269765D Oct 2 19:44:28.628000 audit[3258]: USER_START pid=3258 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:28.630000 audit[3260]: CRED_ACQ pid=3260 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:28.642433 kernel: audit: type=1105 audit(1696275868.628:1157): pid=3258 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:28.642533 kernel: audit: type=1103 audit(1696275868.630:1158): pid=3260 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:28.833460 sshd[3258]: pam_unix(sshd:session): session closed for user core Oct 2 19:44:28.832000 audit[3258]: USER_END pid=3258 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:28.833000 audit[3258]: CRED_DISP pid=3258 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:28.843563 systemd[1]: sshd@10-172.31.21.168:22-139.178.89.65:47892.service: Deactivated successfully. Oct 2 19:44:28.844598 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 19:44:28.847283 systemd-logind[1555]: Session 11 logged out. Waiting for processes to exit. Oct 2 19:44:28.848757 kernel: audit: type=1106 audit(1696275868.832:1159): pid=3258 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:28.848833 kernel: audit: type=1104 audit(1696275868.833:1160): pid=3258 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:28.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.21.168:22-139.178.89.65:47892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:28.849433 systemd-logind[1555]: Removed session 11. Oct 2 19:44:31.711822 kubelet[2670]: E1002 19:44:31.711775 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 40s restarting failed container=mount-cgroup pod=cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c)\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:44:38.859790 systemd[1]: Started sshd@11-172.31.21.168:22-139.178.89.65:54600.service. Oct 2 19:44:38.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.21.168:22-139.178.89.65:54600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:38.862927 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:44:38.863029 kernel: audit: type=1130 audit(1696275878.859:1162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.21.168:22-139.178.89.65:54600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:39.019000 audit[3271]: USER_ACCT pid=3271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:39.026742 sshd[3271]: Accepted publickey for core from 139.178.89.65 port 54600 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:44:39.027117 kernel: audit: type=1101 audit(1696275879.019:1163): pid=3271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:39.026000 audit[3271]: CRED_ACQ pid=3271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:39.027949 sshd[3271]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:44:39.037045 systemd[1]: Started session-12.scope. Oct 2 19:44:39.039399 kernel: audit: type=1103 audit(1696275879.026:1164): pid=3271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:39.039498 kernel: audit: type=1006 audit(1696275879.026:1165): pid=3271 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Oct 2 19:44:39.038704 systemd-logind[1555]: New session 12 of user core. Oct 2 19:44:39.026000 audit[3271]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4565a3e0 a2=3 a3=0 items=0 ppid=1 pid=3271 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:44:39.026000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:44:39.051505 kernel: audit: type=1300 audit(1696275879.026:1165): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4565a3e0 a2=3 a3=0 items=0 ppid=1 pid=3271 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:44:39.051707 kernel: audit: type=1327 audit(1696275879.026:1165): proctitle=737368643A20636F7265205B707269765D Oct 2 19:44:39.051761 kernel: audit: type=1105 audit(1696275879.047:1166): pid=3271 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:39.047000 audit[3271]: USER_START pid=3271 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:39.063610 kernel: audit: type=1103 audit(1696275879.050:1167): pid=3273 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:39.050000 audit[3273]: CRED_ACQ pid=3273 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:39.253806 sshd[3271]: pam_unix(sshd:session): session closed for user core Oct 2 19:44:39.254000 audit[3271]: USER_END pid=3271 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:39.258900 systemd-logind[1555]: Session 12 logged out. Waiting for processes to exit. Oct 2 19:44:39.260609 systemd[1]: sshd@11-172.31.21.168:22-139.178.89.65:54600.service: Deactivated successfully. Oct 2 19:44:39.261653 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 19:44:39.262969 kernel: audit: type=1106 audit(1696275879.254:1168): pid=3271 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:39.255000 audit[3271]: CRED_DISP pid=3271 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:39.263608 systemd-logind[1555]: Removed session 12. Oct 2 19:44:39.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.21.168:22-139.178.89.65:54600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:39.269308 kernel: audit: type=1104 audit(1696275879.255:1169): pid=3271 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:46.711309 kubelet[2670]: E1002 19:44:46.711253 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 40s restarting failed container=mount-cgroup pod=cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c)\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:44:49.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.21.168:22-139.178.89.65:57280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:49.280661 systemd[1]: Started sshd@12-172.31.21.168:22-139.178.89.65:57280.service. Oct 2 19:44:49.282605 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:44:49.282645 kernel: audit: type=1130 audit(1696275889.280:1171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.21.168:22-139.178.89.65:57280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:49.443000 audit[3284]: USER_ACCT pid=3284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:49.454666 kernel: audit: type=1101 audit(1696275889.443:1172): pid=3284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:49.454741 sshd[3284]: Accepted publickey for core from 139.178.89.65 port 57280 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:44:49.456000 audit[3284]: CRED_ACQ pid=3284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:49.459131 sshd[3284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:44:49.469402 kernel: audit: type=1103 audit(1696275889.456:1173): pid=3284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:49.469505 kernel: audit: type=1006 audit(1696275889.456:1174): pid=3284 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Oct 2 19:44:49.468875 systemd[1]: Started session-13.scope. Oct 2 19:44:49.456000 audit[3284]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec8d362e0 a2=3 a3=0 items=0 ppid=1 pid=3284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:44:49.471363 systemd-logind[1555]: New session 13 of user core. Oct 2 19:44:49.477165 kernel: audit: type=1300 audit(1696275889.456:1174): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec8d362e0 a2=3 a3=0 items=0 ppid=1 pid=3284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:44:49.456000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:44:49.481031 kernel: audit: type=1327 audit(1696275889.456:1174): proctitle=737368643A20636F7265205B707269765D Oct 2 19:44:49.481000 audit[3284]: USER_START pid=3284 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:49.481000 audit[3286]: CRED_ACQ pid=3286 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:49.495587 kernel: audit: type=1105 audit(1696275889.481:1175): pid=3284 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:49.495698 kernel: audit: type=1103 audit(1696275889.481:1176): pid=3286 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:49.725343 sshd[3284]: pam_unix(sshd:session): session closed for user core Oct 2 19:44:49.728000 audit[3284]: USER_END pid=3284 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:49.738229 kernel: audit: type=1106 audit(1696275889.728:1177): pid=3284 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:49.738537 kernel: audit: type=1104 audit(1696275889.728:1178): pid=3284 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:49.728000 audit[3284]: CRED_DISP pid=3284 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:49.739508 systemd[1]: sshd@12-172.31.21.168:22-139.178.89.65:57280.service: Deactivated successfully. Oct 2 19:44:49.740724 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 19:44:49.743257 systemd-logind[1555]: Session 13 logged out. Waiting for processes to exit. Oct 2 19:44:49.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.21.168:22-139.178.89.65:57280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:49.745375 systemd-logind[1555]: Removed session 13. Oct 2 19:44:58.710770 kubelet[2670]: E1002 19:44:58.710734 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 40s restarting failed container=mount-cgroup pod=cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c)\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:44:59.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.21.168:22-139.178.89.65:45484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:59.753013 systemd[1]: Started sshd@13-172.31.21.168:22-139.178.89.65:45484.service. Oct 2 19:44:59.754716 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:44:59.754762 kernel: audit: type=1130 audit(1696275899.752:1180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.21.168:22-139.178.89.65:45484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:59.923000 audit[3299]: USER_ACCT pid=3299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:59.925395 sshd[3299]: Accepted publickey for core from 139.178.89.65 port 45484 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:44:59.934048 kernel: audit: type=1101 audit(1696275899.923:1181): pid=3299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:59.934000 audit[3299]: CRED_ACQ pid=3299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:59.937961 sshd[3299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:44:59.948640 kernel: audit: type=1103 audit(1696275899.934:1182): pid=3299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:59.948751 kernel: audit: type=1006 audit(1696275899.934:1183): pid=3299 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Oct 2 19:44:59.948785 kernel: audit: type=1300 audit(1696275899.934:1183): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8f6f0f10 a2=3 a3=0 items=0 ppid=1 pid=3299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:44:59.934000 audit[3299]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8f6f0f10 a2=3 a3=0 items=0 ppid=1 pid=3299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:44:59.947987 systemd[1]: Started session-14.scope. Oct 2 19:44:59.950973 systemd-logind[1555]: New session 14 of user core. Oct 2 19:44:59.934000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:44:59.958045 kernel: audit: type=1327 audit(1696275899.934:1183): proctitle=737368643A20636F7265205B707269765D Oct 2 19:44:59.958000 audit[3299]: USER_START pid=3299 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:59.961000 audit[3301]: CRED_ACQ pid=3301 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:59.985754 kernel: audit: type=1105 audit(1696275899.958:1184): pid=3299 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:44:59.985891 kernel: audit: type=1103 audit(1696275899.961:1185): pid=3301 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:00.206317 sshd[3299]: pam_unix(sshd:session): session closed for user core Oct 2 19:45:00.207000 audit[3299]: USER_END pid=3299 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:00.210722 systemd[1]: sshd@13-172.31.21.168:22-139.178.89.65:45484.service: Deactivated successfully. Oct 2 19:45:00.211720 systemd[1]: session-14.scope: Deactivated successfully. Oct 2 19:45:00.213789 systemd-logind[1555]: Session 14 logged out. Waiting for processes to exit. Oct 2 19:45:00.207000 audit[3299]: CRED_DISP pid=3299 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:00.215447 systemd-logind[1555]: Removed session 14. Oct 2 19:45:00.221232 kernel: audit: type=1106 audit(1696275900.207:1186): pid=3299 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:00.221645 kernel: audit: type=1104 audit(1696275900.207:1187): pid=3299 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:00.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.21.168:22-139.178.89.65:45484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:07.533275 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:45:07.533593 kernel: audit: type=1400 audit(1696275907.527:1189): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:07.527000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:07.527000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028efda0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:45:07.564453 kernel: audit: type=1300 audit(1696275907.527:1189): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028efda0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:45:07.564602 kernel: audit: type=1327 audit(1696275907.527:1189): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:45:07.527000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:45:07.527000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:07.576659 kernel: audit: type=1400 audit(1696275907.527:1190): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:07.577261 kernel: audit: type=1300 audit(1696275907.527:1190): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002342300 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:45:07.527000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002342300 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:45:07.527000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:45:07.594091 kernel: audit: type=1327 audit(1696275907.527:1190): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:45:08.075000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:08.075000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c0068890e0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:45:08.091724 kernel: audit: type=1400 audit(1696275908.075:1191): avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:08.091867 kernel: audit: type=1300 audit(1696275908.075:1191): arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c0068890e0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:45:08.091901 kernel: audit: type=1327 audit(1696275908.075:1191): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:45:08.075000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:45:08.077000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:08.105247 kernel: audit: type=1400 audit(1696275908.077:1192): avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:08.077000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c0062cc720 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:45:08.077000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:45:08.077000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:08.077000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c006692320 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:45:08.077000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:45:08.090000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:08.090000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c0062cc7e0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:45:08.090000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:45:08.213000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:08.213000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c006889350 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:45:08.213000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:45:08.213000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:08.213000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c006692360 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:45:08.213000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:45:10.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.21.168:22-139.178.89.65:51780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:10.232658 systemd[1]: Started sshd@14-172.31.21.168:22-139.178.89.65:51780.service. Oct 2 19:45:10.408000 audit[3313]: USER_ACCT pid=3313 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:10.410159 sshd[3313]: Accepted publickey for core from 139.178.89.65 port 51780 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:45:10.410000 audit[3313]: CRED_ACQ pid=3313 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:10.410000 audit[3313]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff854148d0 a2=3 a3=0 items=0 ppid=1 pid=3313 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:10.410000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:45:10.411834 sshd[3313]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:45:10.419934 systemd[1]: Started session-15.scope. Oct 2 19:45:10.420438 systemd-logind[1555]: New session 15 of user core. Oct 2 19:45:10.426000 audit[3313]: USER_START pid=3313 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:10.428000 audit[3315]: CRED_ACQ pid=3315 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:10.645497 sshd[3313]: pam_unix(sshd:session): session closed for user core Oct 2 19:45:10.649000 audit[3313]: USER_END pid=3313 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:10.649000 audit[3313]: CRED_DISP pid=3313 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:10.653340 systemd[1]: sshd@14-172.31.21.168:22-139.178.89.65:51780.service: Deactivated successfully. Oct 2 19:45:10.654625 systemd[1]: session-15.scope: Deactivated successfully. Oct 2 19:45:10.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.21.168:22-139.178.89.65:51780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:10.656642 systemd-logind[1555]: Session 15 logged out. Waiting for processes to exit. Oct 2 19:45:10.658608 systemd-logind[1555]: Removed session 15. Oct 2 19:45:10.713865 env[1565]: time="2023-10-02T19:45:10.713456198Z" level=info msg="CreateContainer within sandbox \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:4,}" Oct 2 19:45:10.733188 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1100081890.mount: Deactivated successfully. Oct 2 19:45:10.742109 env[1565]: time="2023-10-02T19:45:10.742059237Z" level=info msg="CreateContainer within sandbox \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\" for &ContainerMetadata{Name:mount-cgroup,Attempt:4,} returns container id \"754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a\"" Oct 2 19:45:10.746005 env[1565]: time="2023-10-02T19:45:10.744795309Z" level=info msg="StartContainer for \"754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a\"" Oct 2 19:45:10.781773 systemd[1]: Started cri-containerd-754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a.scope. Oct 2 19:45:10.795300 systemd[1]: cri-containerd-754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a.scope: Deactivated successfully. Oct 2 19:45:10.823196 env[1565]: time="2023-10-02T19:45:10.823130106Z" level=info msg="shim disconnected" id=754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a Oct 2 19:45:10.823196 env[1565]: time="2023-10-02T19:45:10.823194206Z" level=warning msg="cleaning up after shim disconnected" id=754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a namespace=k8s.io Oct 2 19:45:10.823196 env[1565]: time="2023-10-02T19:45:10.823206011Z" level=info msg="cleaning up dead shim" Oct 2 19:45:10.836729 env[1565]: time="2023-10-02T19:45:10.836675601Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:45:10Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3350 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:45:10Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:45:10.837055 env[1565]: time="2023-10-02T19:45:10.836991564Z" level=error msg="copy shim log" error="read /proc/self/fd/49: file already closed" Oct 2 19:45:10.837956 env[1565]: time="2023-10-02T19:45:10.837886409Z" level=error msg="Failed to pipe stderr of container \"754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a\"" error="reading from a closed fifo" Oct 2 19:45:10.838096 env[1565]: time="2023-10-02T19:45:10.837886413Z" level=error msg="Failed to pipe stdout of container \"754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a\"" error="reading from a closed fifo" Oct 2 19:45:10.839776 env[1565]: time="2023-10-02T19:45:10.839729797Z" level=error msg="StartContainer for \"754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:45:10.840115 kubelet[2670]: E1002 19:45:10.840091 2670 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a" Oct 2 19:45:10.840487 kubelet[2670]: E1002 19:45:10.840227 2670 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:45:10.840487 kubelet[2670]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:45:10.840487 kubelet[2670]: rm /hostbin/cilium-mount Oct 2 19:45:10.840487 kubelet[2670]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-tk56z,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:45:10.840487 kubelet[2670]: E1002 19:45:10.840283 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:45:11.175230 kubelet[2670]: I1002 19:45:11.175123 2670 scope.go:117] "RemoveContainer" containerID="69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0" Oct 2 19:45:11.176026 kubelet[2670]: I1002 19:45:11.176007 2670 scope.go:117] "RemoveContainer" containerID="69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0" Oct 2 19:45:11.177677 env[1565]: time="2023-10-02T19:45:11.177170805Z" level=info msg="RemoveContainer for \"69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0\"" Oct 2 19:45:11.180050 env[1565]: time="2023-10-02T19:45:11.180017097Z" level=info msg="RemoveContainer for \"69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0\"" Oct 2 19:45:11.180580 env[1565]: time="2023-10-02T19:45:11.180538789Z" level=error msg="RemoveContainer for \"69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0\" failed" error="failed to set removing state for container \"69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0\": container is already in removing state" Oct 2 19:45:11.181005 kubelet[2670]: E1002 19:45:11.180986 2670 remote_runtime.go:385] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0\": container is already in removing state" containerID="69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0" Oct 2 19:45:11.186645 kubelet[2670]: E1002 19:45:11.181396 2670 kuberuntime_container.go:820] failed to remove pod init container "mount-cgroup": rpc error: code = Unknown desc = failed to set removing state for container "69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0": container is already in removing state; Skipping pod "cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c)" Oct 2 19:45:11.186645 kubelet[2670]: E1002 19:45:11.186284 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 1m20s restarting failed container=mount-cgroup pod=cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c)\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:45:11.186886 env[1565]: time="2023-10-02T19:45:11.183724064Z" level=info msg="RemoveContainer for \"69d48ae312173cc33b124dc8f89085da21ebbbc8fa2ef6996a5e3149389001d0\" returns successfully" Oct 2 19:45:11.724429 kubelet[2670]: E1002 19:45:11.724393 2670 kubelet_node_status.go:452] "Node not becoming ready in time after startup" Oct 2 19:45:11.729192 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a-rootfs.mount: Deactivated successfully. Oct 2 19:45:11.956786 kubelet[2670]: E1002 19:45:11.956758 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:45:12.680306 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 2 19:45:12.680484 kernel: audit: type=1400 audit(1696275912.672:1206): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:12.672000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:12.672000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00233e2e0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:45:12.694876 kernel: audit: type=1300 audit(1696275912.672:1206): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00233e2e0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:45:12.695182 kernel: audit: type=1327 audit(1696275912.672:1206): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:45:12.672000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:45:12.678000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:12.709217 kernel: audit: type=1400 audit(1696275912.678:1207): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:12.709363 kernel: audit: type=1300 audit(1696275912.678:1207): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00233e300 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:45:12.678000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00233e300 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:45:12.678000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:45:12.723521 kernel: audit: type=1327 audit(1696275912.678:1207): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:45:12.723684 kernel: audit: type=1400 audit(1696275912.682:1208): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:12.682000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:12.682000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00233e320 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:45:12.749902 kernel: audit: type=1300 audit(1696275912.682:1208): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00233e320 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:45:12.750119 kernel: audit: type=1327 audit(1696275912.682:1208): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:45:12.682000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:45:12.684000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:12.762100 kernel: audit: type=1400 audit(1696275912.684:1209): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:12.684000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002492f20 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:45:12.684000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:45:13.929801 kubelet[2670]: W1002 19:45:13.929756 2670 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod590c1673_f0de_46f7_8d5d_aea6ef7a5e8c.slice/cri-containerd-754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a.scope WatchSource:0}: task 754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a not found: not found Oct 2 19:45:16.957770 kubelet[2670]: E1002 19:45:16.957671 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:45:20.678010 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 19:45:20.678138 kernel: audit: type=1130 audit(1696275920.674:1210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.21.168:22-139.178.89.65:38582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:20.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.21.168:22-139.178.89.65:38582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:20.675360 systemd[1]: Started sshd@15-172.31.21.168:22-139.178.89.65:38582.service. Oct 2 19:45:20.839000 audit[3366]: USER_ACCT pid=3366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:20.840723 sshd[3366]: Accepted publickey for core from 139.178.89.65 port 38582 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:45:20.845000 audit[3366]: CRED_ACQ pid=3366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:20.847369 sshd[3366]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:45:20.852596 kernel: audit: type=1101 audit(1696275920.839:1211): pid=3366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:20.852695 kernel: audit: type=1103 audit(1696275920.845:1212): pid=3366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:20.852933 kernel: audit: type=1006 audit(1696275920.846:1213): pid=3366 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Oct 2 19:45:20.854433 systemd[1]: Started session-16.scope. Oct 2 19:45:20.856869 kernel: audit: type=1300 audit(1696275920.846:1213): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa8190210 a2=3 a3=0 items=0 ppid=1 pid=3366 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:20.846000 audit[3366]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa8190210 a2=3 a3=0 items=0 ppid=1 pid=3366 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:20.856201 systemd-logind[1555]: New session 16 of user core. Oct 2 19:45:20.865430 kernel: audit: type=1327 audit(1696275920.846:1213): proctitle=737368643A20636F7265205B707269765D Oct 2 19:45:20.865509 kernel: audit: type=1105 audit(1696275920.863:1214): pid=3366 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:20.846000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:45:20.863000 audit[3366]: USER_START pid=3366 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:20.872295 kernel: audit: type=1103 audit(1696275920.865:1215): pid=3368 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:20.865000 audit[3368]: CRED_ACQ pid=3368 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:21.108429 sshd[3366]: pam_unix(sshd:session): session closed for user core Oct 2 19:45:21.109000 audit[3366]: USER_END pid=3366 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:21.124846 kernel: audit: type=1106 audit(1696275921.109:1216): pid=3366 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:21.125059 kernel: audit: type=1104 audit(1696275921.109:1217): pid=3366 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:21.109000 audit[3366]: CRED_DISP pid=3366 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:21.118383 systemd-logind[1555]: Session 16 logged out. Waiting for processes to exit. Oct 2 19:45:21.120449 systemd[1]: sshd@15-172.31.21.168:22-139.178.89.65:38582.service: Deactivated successfully. Oct 2 19:45:21.121403 systemd[1]: session-16.scope: Deactivated successfully. Oct 2 19:45:21.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.21.168:22-139.178.89.65:38582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:21.126230 systemd-logind[1555]: Removed session 16. Oct 2 19:45:21.961348 kubelet[2670]: E1002 19:45:21.961248 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:45:22.710315 kubelet[2670]: E1002 19:45:22.710280 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 1m20s restarting failed container=mount-cgroup pod=cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c)\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:45:26.964017 kubelet[2670]: E1002 19:45:26.963880 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:45:31.148938 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:45:31.149086 kernel: audit: type=1130 audit(1696275931.138:1219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.21.168:22-139.178.89.65:42404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:31.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.21.168:22-139.178.89.65:42404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:31.139611 systemd[1]: Started sshd@16-172.31.21.168:22-139.178.89.65:42404.service. Oct 2 19:45:31.309000 audit[3381]: USER_ACCT pid=3381 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:31.311511 sshd[3381]: Accepted publickey for core from 139.178.89.65 port 42404 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:45:31.319943 kernel: audit: type=1101 audit(1696275931.309:1220): pid=3381 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:31.319000 audit[3381]: CRED_ACQ pid=3381 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:31.320580 sshd[3381]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:45:31.327077 kernel: audit: type=1103 audit(1696275931.319:1221): pid=3381 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:31.329618 systemd[1]: Started session-17.scope. Oct 2 19:45:31.331856 systemd-logind[1555]: New session 17 of user core. Oct 2 19:45:31.333929 kernel: audit: type=1006 audit(1696275931.319:1222): pid=3381 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Oct 2 19:45:31.319000 audit[3381]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe56221680 a2=3 a3=0 items=0 ppid=1 pid=3381 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:31.319000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:45:31.344686 kernel: audit: type=1300 audit(1696275931.319:1222): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe56221680 a2=3 a3=0 items=0 ppid=1 pid=3381 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:31.344760 kernel: audit: type=1327 audit(1696275931.319:1222): proctitle=737368643A20636F7265205B707269765D Oct 2 19:45:31.334000 audit[3381]: USER_START pid=3381 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:31.344960 kernel: audit: type=1105 audit(1696275931.334:1223): pid=3381 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:31.340000 audit[3383]: CRED_ACQ pid=3383 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:31.352038 kernel: audit: type=1103 audit(1696275931.340:1224): pid=3383 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:31.540200 sshd[3381]: pam_unix(sshd:session): session closed for user core Oct 2 19:45:31.541000 audit[3381]: USER_END pid=3381 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:31.541000 audit[3381]: CRED_DISP pid=3381 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:31.550829 systemd[1]: sshd@16-172.31.21.168:22-139.178.89.65:42404.service: Deactivated successfully. Oct 2 19:45:31.552519 systemd[1]: session-17.scope: Deactivated successfully. Oct 2 19:45:31.555566 kernel: audit: type=1106 audit(1696275931.541:1225): pid=3381 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:31.555693 kernel: audit: type=1104 audit(1696275931.541:1226): pid=3381 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:31.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.21.168:22-139.178.89.65:42404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:31.554985 systemd-logind[1555]: Session 17 logged out. Waiting for processes to exit. Oct 2 19:45:31.556433 systemd-logind[1555]: Removed session 17. Oct 2 19:45:31.567071 systemd[1]: Started sshd@17-172.31.21.168:22-139.178.89.65:42414.service. Oct 2 19:45:31.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.21.168:22-139.178.89.65:42414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:31.741000 audit[3394]: USER_ACCT pid=3394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:31.744649 sshd[3394]: Accepted publickey for core from 139.178.89.65 port 42414 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:45:31.746000 audit[3394]: CRED_ACQ pid=3394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:31.746000 audit[3394]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5fb96810 a2=3 a3=0 items=0 ppid=1 pid=3394 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:31.746000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:45:31.748325 sshd[3394]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:45:31.755152 systemd[1]: Started session-18.scope. Oct 2 19:45:31.755671 systemd-logind[1555]: New session 18 of user core. Oct 2 19:45:31.777000 audit[3394]: USER_START pid=3394 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:31.779000 audit[3396]: CRED_ACQ pid=3396 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:31.967677 kubelet[2670]: E1002 19:45:31.967314 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:45:33.072285 sshd[3394]: pam_unix(sshd:session): session closed for user core Oct 2 19:45:33.073000 audit[3394]: USER_END pid=3394 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:33.073000 audit[3394]: CRED_DISP pid=3394 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:33.085677 systemd[1]: sshd@17-172.31.21.168:22-139.178.89.65:42414.service: Deactivated successfully. Oct 2 19:45:33.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.21.168:22-139.178.89.65:42414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:33.087453 systemd[1]: session-18.scope: Deactivated successfully. Oct 2 19:45:33.087485 systemd-logind[1555]: Session 18 logged out. Waiting for processes to exit. Oct 2 19:45:33.089395 systemd-logind[1555]: Removed session 18. Oct 2 19:45:33.107069 systemd[1]: Started sshd@18-172.31.21.168:22-139.178.89.65:42426.service. Oct 2 19:45:33.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.21.168:22-139.178.89.65:42426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:33.285000 audit[3404]: USER_ACCT pid=3404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:33.286607 sshd[3404]: Accepted publickey for core from 139.178.89.65 port 42426 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:45:33.286000 audit[3404]: CRED_ACQ pid=3404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:33.286000 audit[3404]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc543dc960 a2=3 a3=0 items=0 ppid=1 pid=3404 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:33.286000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:45:33.288197 sshd[3404]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:45:33.294009 systemd-logind[1555]: New session 19 of user core. Oct 2 19:45:33.294408 systemd[1]: Started session-19.scope. Oct 2 19:45:33.300000 audit[3404]: USER_START pid=3404 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:33.302000 audit[3406]: CRED_ACQ pid=3406 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:33.510571 sshd[3404]: pam_unix(sshd:session): session closed for user core Oct 2 19:45:33.512000 audit[3404]: USER_END pid=3404 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:33.512000 audit[3404]: CRED_DISP pid=3404 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:33.515795 systemd-logind[1555]: Session 19 logged out. Waiting for processes to exit. Oct 2 19:45:33.516090 systemd[1]: sshd@18-172.31.21.168:22-139.178.89.65:42426.service: Deactivated successfully. Oct 2 19:45:33.517104 systemd[1]: session-19.scope: Deactivated successfully. Oct 2 19:45:33.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.21.168:22-139.178.89.65:42426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:33.518613 systemd-logind[1555]: Removed session 19. Oct 2 19:45:35.711145 kubelet[2670]: E1002 19:45:35.711113 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 1m20s restarting failed container=mount-cgroup pod=cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c)\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:45:36.969039 kubelet[2670]: E1002 19:45:36.969005 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:45:41.972236 kubelet[2670]: E1002 19:45:41.972198 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:45:43.550275 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 19:45:43.550412 kernel: audit: type=1130 audit(1696275943.538:1246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.21.168:22-139.178.89.65:53718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:43.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.21.168:22-139.178.89.65:53718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:43.539187 systemd[1]: Started sshd@19-172.31.21.168:22-139.178.89.65:53718.service. Oct 2 19:45:43.704000 audit[3417]: USER_ACCT pid=3417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:43.705945 sshd[3417]: Accepted publickey for core from 139.178.89.65 port 53718 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:45:43.713968 kernel: audit: type=1101 audit(1696275943.704:1247): pid=3417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:43.715000 audit[3417]: CRED_ACQ pid=3417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:43.718224 sshd[3417]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:45:43.733299 kernel: audit: type=1103 audit(1696275943.715:1248): pid=3417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:43.738313 systemd[1]: Started session-20.scope. Oct 2 19:45:43.742277 systemd-logind[1555]: New session 20 of user core. Oct 2 19:45:43.757940 kernel: audit: type=1006 audit(1696275943.716:1249): pid=3417 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Oct 2 19:45:43.716000 audit[3417]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa35c9720 a2=3 a3=0 items=0 ppid=1 pid=3417 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:43.778270 kernel: audit: type=1300 audit(1696275943.716:1249): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa35c9720 a2=3 a3=0 items=0 ppid=1 pid=3417 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:43.778440 kernel: audit: type=1327 audit(1696275943.716:1249): proctitle=737368643A20636F7265205B707269765D Oct 2 19:45:43.716000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:45:43.763000 audit[3417]: USER_START pid=3417 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:43.785242 kernel: audit: type=1105 audit(1696275943.763:1250): pid=3417 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:43.769000 audit[3419]: CRED_ACQ pid=3419 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:43.792077 kernel: audit: type=1103 audit(1696275943.769:1251): pid=3419 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:43.995042 sshd[3417]: pam_unix(sshd:session): session closed for user core Oct 2 19:45:44.000000 audit[3417]: USER_END pid=3417 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:44.004996 systemd[1]: sshd@19-172.31.21.168:22-139.178.89.65:53718.service: Deactivated successfully. Oct 2 19:45:44.009824 systemd[1]: session-20.scope: Deactivated successfully. Oct 2 19:45:44.011816 systemd-logind[1555]: Session 20 logged out. Waiting for processes to exit. Oct 2 19:45:44.013419 systemd-logind[1555]: Removed session 20. Oct 2 19:45:44.013955 kernel: audit: type=1106 audit(1696275944.000:1252): pid=3417 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:44.001000 audit[3417]: CRED_DISP pid=3417 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:44.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.21.168:22-139.178.89.65:53718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:44.021931 kernel: audit: type=1104 audit(1696275944.001:1253): pid=3417 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:46.973655 kubelet[2670]: E1002 19:45:46.973608 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:45:47.711393 kubelet[2670]: E1002 19:45:47.711361 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 1m20s restarting failed container=mount-cgroup pod=cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c)\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:45:51.975204 kubelet[2670]: E1002 19:45:51.975164 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:45:54.023158 systemd[1]: Started sshd@20-172.31.21.168:22-139.178.89.65:57966.service. Oct 2 19:45:54.033596 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:45:54.033735 kernel: audit: type=1130 audit(1696275954.022:1255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.21.168:22-139.178.89.65:57966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:54.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.21.168:22-139.178.89.65:57966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:54.203000 audit[3429]: USER_ACCT pid=3429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:54.204928 sshd[3429]: Accepted publickey for core from 139.178.89.65 port 57966 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:45:54.212039 kernel: audit: type=1101 audit(1696275954.203:1256): pid=3429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:54.211000 audit[3429]: CRED_ACQ pid=3429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:54.213369 sshd[3429]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:45:54.221025 systemd[1]: Started session-21.scope. Oct 2 19:45:54.223648 kernel: audit: type=1103 audit(1696275954.211:1257): pid=3429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:54.223741 kernel: audit: type=1006 audit(1696275954.211:1258): pid=3429 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Oct 2 19:45:54.223958 systemd-logind[1555]: New session 21 of user core. Oct 2 19:45:54.211000 audit[3429]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecf9e3ad0 a2=3 a3=0 items=0 ppid=1 pid=3429 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:54.211000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:45:54.240575 kernel: audit: type=1300 audit(1696275954.211:1258): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecf9e3ad0 a2=3 a3=0 items=0 ppid=1 pid=3429 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:54.240698 kernel: audit: type=1327 audit(1696275954.211:1258): proctitle=737368643A20636F7265205B707269765D Oct 2 19:45:54.240727 kernel: audit: type=1105 audit(1696275954.234:1259): pid=3429 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:54.234000 audit[3429]: USER_START pid=3429 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:54.238000 audit[3431]: CRED_ACQ pid=3431 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:54.258417 kernel: audit: type=1103 audit(1696275954.238:1260): pid=3431 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:54.488598 sshd[3429]: pam_unix(sshd:session): session closed for user core Oct 2 19:45:54.490000 audit[3429]: USER_END pid=3429 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:54.494592 systemd[1]: sshd@20-172.31.21.168:22-139.178.89.65:57966.service: Deactivated successfully. Oct 2 19:45:54.495531 systemd[1]: session-21.scope: Deactivated successfully. Oct 2 19:45:54.497619 systemd-logind[1555]: Session 21 logged out. Waiting for processes to exit. Oct 2 19:45:54.499187 systemd-logind[1555]: Removed session 21. Oct 2 19:45:54.499936 kernel: audit: type=1106 audit(1696275954.490:1261): pid=3429 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:54.500012 kernel: audit: type=1104 audit(1696275954.491:1262): pid=3429 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:54.491000 audit[3429]: CRED_DISP pid=3429 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:45:54.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.21.168:22-139.178.89.65:57966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:56.977492 kubelet[2670]: E1002 19:45:56.977457 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:46:01.711383 kubelet[2670]: E1002 19:46:01.711267 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 1m20s restarting failed container=mount-cgroup pod=cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c)\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:46:01.978754 kubelet[2670]: E1002 19:46:01.978637 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:46:04.526738 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:46:04.526941 kernel: audit: type=1130 audit(1696275964.514:1264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.21.168:22-139.178.89.65:44390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:04.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.21.168:22-139.178.89.65:44390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:04.515295 systemd[1]: Started sshd@21-172.31.21.168:22-139.178.89.65:44390.service. Oct 2 19:46:04.689000 audit[3443]: USER_ACCT pid=3443 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:04.690947 sshd[3443]: Accepted publickey for core from 139.178.89.65 port 44390 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:46:04.696992 kernel: audit: type=1101 audit(1696275964.689:1265): pid=3443 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:04.696000 audit[3443]: CRED_ACQ pid=3443 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:04.698465 sshd[3443]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:46:04.710203 kernel: audit: type=1103 audit(1696275964.696:1266): pid=3443 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:04.710326 kernel: audit: type=1006 audit(1696275964.697:1267): pid=3443 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Oct 2 19:46:04.710361 kernel: audit: type=1300 audit(1696275964.697:1267): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe836e23e0 a2=3 a3=0 items=0 ppid=1 pid=3443 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:04.697000 audit[3443]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe836e23e0 a2=3 a3=0 items=0 ppid=1 pid=3443 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:04.709732 systemd[1]: Started session-22.scope. Oct 2 19:46:04.711729 systemd-logind[1555]: New session 22 of user core. Oct 2 19:46:04.697000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:46:04.719808 kernel: audit: type=1327 audit(1696275964.697:1267): proctitle=737368643A20636F7265205B707269765D Oct 2 19:46:04.719000 audit[3443]: USER_START pid=3443 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:04.721000 audit[3445]: CRED_ACQ pid=3445 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:04.744738 kernel: audit: type=1105 audit(1696275964.719:1268): pid=3443 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:04.744887 kernel: audit: type=1103 audit(1696275964.721:1269): pid=3445 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:04.917730 sshd[3443]: pam_unix(sshd:session): session closed for user core Oct 2 19:46:04.919000 audit[3443]: USER_END pid=3443 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:04.919000 audit[3443]: CRED_DISP pid=3443 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:04.928588 systemd-logind[1555]: Session 22 logged out. Waiting for processes to exit. Oct 2 19:46:04.931233 systemd[1]: sshd@21-172.31.21.168:22-139.178.89.65:44390.service: Deactivated successfully. Oct 2 19:46:04.932417 systemd[1]: session-22.scope: Deactivated successfully. Oct 2 19:46:04.933419 kernel: audit: type=1106 audit(1696275964.919:1270): pid=3443 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:04.933498 kernel: audit: type=1104 audit(1696275964.919:1271): pid=3443 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:04.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.21.168:22-139.178.89.65:44390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:04.934937 systemd-logind[1555]: Removed session 22. Oct 2 19:46:06.980029 kubelet[2670]: E1002 19:46:06.979983 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:46:07.528000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:46:07.528000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:46:07.528000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011aa270 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:46:07.528000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:46:07.528000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d54d00 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:46:07.528000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:46:08.077000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:46:08.077000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c00fb15a70 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:46:08.077000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:46:08.077000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:46:08.077000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c00fb15aa0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:46:08.077000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:46:08.077000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:46:08.077000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c00fc562c0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:46:08.077000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:46:08.092000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:46:08.092000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c00fc388a0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:46:08.092000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:46:08.213000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:46:08.213000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c00fb15d10 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:46:08.213000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:46:08.214000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:46:08.214000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c00fc56420 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:46:08.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:46:11.980830 kubelet[2670]: E1002 19:46:11.980800 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:46:12.675000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:46:12.680513 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 2 19:46:12.680631 kernel: audit: type=1400 audit(1696275972.675:1281): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:46:12.675000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d55060 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:46:12.675000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:46:12.724619 kernel: audit: type=1300 audit(1696275972.675:1281): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d55060 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:46:12.724771 kernel: audit: type=1327 audit(1696275972.675:1281): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:46:12.724802 kernel: audit: type=1400 audit(1696275972.679:1282): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:46:12.679000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:46:12.737413 kernel: audit: type=1300 audit(1696275972.679:1282): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d55180 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:46:12.679000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d55180 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:46:12.679000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:46:12.754474 kernel: audit: type=1327 audit(1696275972.679:1282): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:46:12.754618 kernel: audit: type=1400 audit(1696275972.679:1283): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:46:12.679000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:46:12.679000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d003c0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:46:12.771338 kernel: audit: type=1300 audit(1696275972.679:1283): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d003c0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:46:12.771484 kernel: audit: type=1327 audit(1696275972.679:1283): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:46:12.679000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:46:12.687000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:46:12.788223 kernel: audit: type=1400 audit(1696275972.687:1284): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:46:12.687000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d551a0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:46:12.687000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:46:14.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.21.168:22-139.178.89.65:35258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:14.945838 systemd[1]: Started sshd@22-172.31.21.168:22-139.178.89.65:35258.service. Oct 2 19:46:15.117000 audit[3457]: USER_ACCT pid=3457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:15.118750 sshd[3457]: Accepted publickey for core from 139.178.89.65 port 35258 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:46:15.119000 audit[3457]: CRED_ACQ pid=3457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:15.119000 audit[3457]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd98351a30 a2=3 a3=0 items=0 ppid=1 pid=3457 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:15.119000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:46:15.121107 sshd[3457]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:46:15.126019 systemd-logind[1555]: New session 23 of user core. Oct 2 19:46:15.127030 systemd[1]: Started session-23.scope. Oct 2 19:46:15.134000 audit[3457]: USER_START pid=3457 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:15.136000 audit[3459]: CRED_ACQ pid=3459 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:15.345584 sshd[3457]: pam_unix(sshd:session): session closed for user core Oct 2 19:46:15.346000 audit[3457]: USER_END pid=3457 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:15.346000 audit[3457]: CRED_DISP pid=3457 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:15.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.21.168:22-139.178.89.65:35258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:15.349376 systemd[1]: sshd@22-172.31.21.168:22-139.178.89.65:35258.service: Deactivated successfully. Oct 2 19:46:15.350525 systemd[1]: session-23.scope: Deactivated successfully. Oct 2 19:46:15.351750 systemd-logind[1555]: Session 23 logged out. Waiting for processes to exit. Oct 2 19:46:15.352751 systemd-logind[1555]: Removed session 23. Oct 2 19:46:15.710965 kubelet[2670]: E1002 19:46:15.710845 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 1m20s restarting failed container=mount-cgroup pod=cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c)\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:46:16.982834 kubelet[2670]: E1002 19:46:16.982807 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:46:21.984779 kubelet[2670]: E1002 19:46:21.984745 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:46:25.384558 systemd[1]: Started sshd@23-172.31.21.168:22-139.178.89.65:43776.service. Oct 2 19:46:25.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.21.168:22-139.178.89.65:43776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:25.387055 kernel: kauditd_printk_skb: 13 callbacks suppressed Oct 2 19:46:25.387149 kernel: audit: type=1130 audit(1696275985.383:1294): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.21.168:22-139.178.89.65:43776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:25.561000 audit[3469]: USER_ACCT pid=3469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:25.568730 sshd[3469]: Accepted publickey for core from 139.178.89.65 port 43776 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:46:25.569337 kernel: audit: type=1101 audit(1696275985.561:1295): pid=3469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:25.569404 sshd[3469]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:46:25.567000 audit[3469]: CRED_ACQ pid=3469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:25.583055 kernel: audit: type=1103 audit(1696275985.567:1296): pid=3469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:25.583208 kernel: audit: type=1006 audit(1696275985.567:1297): pid=3469 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Oct 2 19:46:25.583262 kernel: audit: type=1300 audit(1696275985.567:1297): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6b11b3a0 a2=3 a3=0 items=0 ppid=1 pid=3469 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:25.567000 audit[3469]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6b11b3a0 a2=3 a3=0 items=0 ppid=1 pid=3469 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:25.582130 systemd[1]: Started session-24.scope. Oct 2 19:46:25.585509 systemd-logind[1555]: New session 24 of user core. Oct 2 19:46:25.567000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:46:25.591500 kernel: audit: type=1327 audit(1696275985.567:1297): proctitle=737368643A20636F7265205B707269765D Oct 2 19:46:25.592000 audit[3469]: USER_START pid=3469 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:25.595000 audit[3471]: CRED_ACQ pid=3471 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:25.608213 kernel: audit: type=1105 audit(1696275985.592:1298): pid=3469 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:25.608335 kernel: audit: type=1103 audit(1696275985.595:1299): pid=3471 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:25.805764 sshd[3469]: pam_unix(sshd:session): session closed for user core Oct 2 19:46:25.806000 audit[3469]: USER_END pid=3469 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:25.813930 kernel: audit: type=1106 audit(1696275985.806:1300): pid=3469 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:25.814050 kernel: audit: type=1104 audit(1696275985.806:1301): pid=3469 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:25.806000 audit[3469]: CRED_DISP pid=3469 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:25.816019 systemd[1]: sshd@23-172.31.21.168:22-139.178.89.65:43776.service: Deactivated successfully. Oct 2 19:46:25.816969 systemd[1]: session-24.scope: Deactivated successfully. Oct 2 19:46:25.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.21.168:22-139.178.89.65:43776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:25.820095 systemd-logind[1555]: Session 24 logged out. Waiting for processes to exit. Oct 2 19:46:25.821513 systemd-logind[1555]: Removed session 24. Oct 2 19:46:26.986100 kubelet[2670]: E1002 19:46:26.986072 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:46:28.711008 kubelet[2670]: E1002 19:46:28.710974 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 1m20s restarting failed container=mount-cgroup pod=cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c)\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:46:31.989446 kubelet[2670]: E1002 19:46:31.988938 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:46:35.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.21.168:22-139.178.89.65:54708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:35.842994 systemd[1]: Started sshd@24-172.31.21.168:22-139.178.89.65:54708.service. Oct 2 19:46:35.851657 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:46:35.853389 kernel: audit: type=1130 audit(1696275995.845:1303): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.21.168:22-139.178.89.65:54708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:36.018000 audit[3486]: USER_ACCT pid=3486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:36.026605 kernel: audit: type=1101 audit(1696275996.018:1304): pid=3486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:36.026706 sshd[3486]: Accepted publickey for core from 139.178.89.65 port 54708 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:46:36.027000 audit[3486]: CRED_ACQ pid=3486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:36.029547 sshd[3486]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:46:36.040324 kernel: audit: type=1103 audit(1696275996.027:1305): pid=3486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:36.040454 kernel: audit: type=1006 audit(1696275996.027:1306): pid=3486 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Oct 2 19:46:36.040491 kernel: audit: type=1300 audit(1696275996.027:1306): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5d656b30 a2=3 a3=0 items=0 ppid=1 pid=3486 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:36.027000 audit[3486]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5d656b30 a2=3 a3=0 items=0 ppid=1 pid=3486 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:36.039814 systemd[1]: Started session-25.scope. Oct 2 19:46:36.044761 systemd-logind[1555]: New session 25 of user core. Oct 2 19:46:36.027000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:46:36.050591 kernel: audit: type=1327 audit(1696275996.027:1306): proctitle=737368643A20636F7265205B707269765D Oct 2 19:46:36.052000 audit[3486]: USER_START pid=3486 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:36.059000 audit[3488]: CRED_ACQ pid=3488 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:36.066003 kernel: audit: type=1105 audit(1696275996.052:1307): pid=3486 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:36.066113 kernel: audit: type=1103 audit(1696275996.059:1308): pid=3488 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:36.255000 audit[3486]: USER_END pid=3486 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:36.254646 sshd[3486]: pam_unix(sshd:session): session closed for user core Oct 2 19:46:36.264012 kernel: audit: type=1106 audit(1696275996.255:1309): pid=3486 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:36.256000 audit[3486]: CRED_DISP pid=3486 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:36.265532 systemd[1]: sshd@24-172.31.21.168:22-139.178.89.65:54708.service: Deactivated successfully. Oct 2 19:46:36.266607 systemd[1]: session-25.scope: Deactivated successfully. Oct 2 19:46:36.268564 systemd-logind[1555]: Session 25 logged out. Waiting for processes to exit. Oct 2 19:46:36.270175 systemd-logind[1555]: Removed session 25. Oct 2 19:46:36.270964 kernel: audit: type=1104 audit(1696275996.256:1310): pid=3486 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:36.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.21.168:22-139.178.89.65:54708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:36.993863 kubelet[2670]: E1002 19:46:36.993831 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:46:41.994670 kubelet[2670]: E1002 19:46:41.994630 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:46:43.714762 env[1565]: time="2023-10-02T19:46:43.714703088Z" level=info msg="CreateContainer within sandbox \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:5,}" Oct 2 19:46:43.735444 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3497635321.mount: Deactivated successfully. Oct 2 19:46:43.748176 env[1565]: time="2023-10-02T19:46:43.748082752Z" level=info msg="CreateContainer within sandbox \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\" for &ContainerMetadata{Name:mount-cgroup,Attempt:5,} returns container id \"9f20cc285378e78649f8f01f07144fc3a998279db21e1a5e7c313f3b972ed89e\"" Oct 2 19:46:43.749883 env[1565]: time="2023-10-02T19:46:43.749844021Z" level=info msg="StartContainer for \"9f20cc285378e78649f8f01f07144fc3a998279db21e1a5e7c313f3b972ed89e\"" Oct 2 19:46:43.806078 systemd[1]: Started cri-containerd-9f20cc285378e78649f8f01f07144fc3a998279db21e1a5e7c313f3b972ed89e.scope. Oct 2 19:46:43.829764 systemd[1]: cri-containerd-9f20cc285378e78649f8f01f07144fc3a998279db21e1a5e7c313f3b972ed89e.scope: Deactivated successfully. Oct 2 19:46:43.850603 env[1565]: time="2023-10-02T19:46:43.850544202Z" level=info msg="shim disconnected" id=9f20cc285378e78649f8f01f07144fc3a998279db21e1a5e7c313f3b972ed89e Oct 2 19:46:43.850603 env[1565]: time="2023-10-02T19:46:43.850602385Z" level=warning msg="cleaning up after shim disconnected" id=9f20cc285378e78649f8f01f07144fc3a998279db21e1a5e7c313f3b972ed89e namespace=k8s.io Oct 2 19:46:43.850603 env[1565]: time="2023-10-02T19:46:43.850613993Z" level=info msg="cleaning up dead shim" Oct 2 19:46:43.873551 env[1565]: time="2023-10-02T19:46:43.873499766Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:46:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3521 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:46:43Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/9f20cc285378e78649f8f01f07144fc3a998279db21e1a5e7c313f3b972ed89e/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:46:43.873901 env[1565]: time="2023-10-02T19:46:43.873785664Z" level=error msg="copy shim log" error="read /proc/self/fd/49: file already closed" Oct 2 19:46:43.874168 env[1565]: time="2023-10-02T19:46:43.874119672Z" level=error msg="Failed to pipe stderr of container \"9f20cc285378e78649f8f01f07144fc3a998279db21e1a5e7c313f3b972ed89e\"" error="reading from a closed fifo" Oct 2 19:46:43.874479 env[1565]: time="2023-10-02T19:46:43.874402692Z" level=error msg="Failed to pipe stdout of container \"9f20cc285378e78649f8f01f07144fc3a998279db21e1a5e7c313f3b972ed89e\"" error="reading from a closed fifo" Oct 2 19:46:43.876400 env[1565]: time="2023-10-02T19:46:43.876333700Z" level=error msg="StartContainer for \"9f20cc285378e78649f8f01f07144fc3a998279db21e1a5e7c313f3b972ed89e\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:46:43.876639 kubelet[2670]: E1002 19:46:43.876615 2670 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="9f20cc285378e78649f8f01f07144fc3a998279db21e1a5e7c313f3b972ed89e" Oct 2 19:46:43.877248 kubelet[2670]: E1002 19:46:43.876752 2670 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:46:43.877248 kubelet[2670]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:46:43.877248 kubelet[2670]: rm /hostbin/cilium-mount Oct 2 19:46:43.877248 kubelet[2670]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-tk56z,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:46:43.877248 kubelet[2670]: E1002 19:46:43.876808 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:46:44.404383 kubelet[2670]: I1002 19:46:44.404353 2670 scope.go:117] "RemoveContainer" containerID="754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a" Oct 2 19:46:44.404776 kubelet[2670]: I1002 19:46:44.404757 2670 scope.go:117] "RemoveContainer" containerID="754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a" Oct 2 19:46:44.408556 env[1565]: time="2023-10-02T19:46:44.408511600Z" level=info msg="RemoveContainer for \"754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a\"" Oct 2 19:46:44.411744 env[1565]: time="2023-10-02T19:46:44.411705203Z" level=info msg="RemoveContainer for \"754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a\"" Oct 2 19:46:44.412156 env[1565]: time="2023-10-02T19:46:44.412002812Z" level=error msg="RemoveContainer for \"754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a\" failed" error="failed to set removing state for container \"754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a\": container is already in removing state" Oct 2 19:46:44.413585 kubelet[2670]: E1002 19:46:44.412473 2670 remote_runtime.go:385] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a\": container is already in removing state" containerID="754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a" Oct 2 19:46:44.413585 kubelet[2670]: E1002 19:46:44.412528 2670 kuberuntime_container.go:820] failed to remove pod init container "mount-cgroup": rpc error: code = Unknown desc = failed to set removing state for container "754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a": container is already in removing state; Skipping pod "cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c)" Oct 2 19:46:44.413585 kubelet[2670]: E1002 19:46:44.413328 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 2m40s restarting failed container=mount-cgroup pod=cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c)\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:46:44.415495 env[1565]: time="2023-10-02T19:46:44.415458844Z" level=info msg="RemoveContainer for \"754a6b2eaee9787c168eaadc481dc65c194b07eaa2ae8b206c2590c51ddefb3a\" returns successfully" Oct 2 19:46:44.728630 systemd[1]: run-containerd-runc-k8s.io-9f20cc285378e78649f8f01f07144fc3a998279db21e1a5e7c313f3b972ed89e-runc.Qgb6Vs.mount: Deactivated successfully. Oct 2 19:46:44.728790 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9f20cc285378e78649f8f01f07144fc3a998279db21e1a5e7c313f3b972ed89e-rootfs.mount: Deactivated successfully. Oct 2 19:46:46.306981 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:46:46.307152 kernel: audit: type=1130 audit(1696276006.292:1312): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.21.168:22-139.178.89.65:49994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:46.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.21.168:22-139.178.89.65:49994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:46.293345 systemd[1]: Started sshd@25-172.31.21.168:22-139.178.89.65:49994.service. Oct 2 19:46:46.469000 audit[3534]: USER_ACCT pid=3534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:46.470540 sshd[3534]: Accepted publickey for core from 139.178.89.65 port 49994 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:46:46.477005 kernel: audit: type=1101 audit(1696276006.469:1313): pid=3534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:46.476000 audit[3534]: CRED_ACQ pid=3534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:46.478240 sshd[3534]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:46:46.489940 kernel: audit: type=1103 audit(1696276006.476:1314): pid=3534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:46.490066 kernel: audit: type=1006 audit(1696276006.476:1315): pid=3534 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Oct 2 19:46:46.490099 kernel: audit: type=1300 audit(1696276006.476:1315): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff55973f20 a2=3 a3=0 items=0 ppid=1 pid=3534 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:46.476000 audit[3534]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff55973f20 a2=3 a3=0 items=0 ppid=1 pid=3534 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:46.492380 systemd[1]: Started session-26.scope. Oct 2 19:46:46.496202 kernel: audit: type=1327 audit(1696276006.476:1315): proctitle=737368643A20636F7265205B707269765D Oct 2 19:46:46.476000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:46:46.495338 systemd-logind[1555]: New session 26 of user core. Oct 2 19:46:46.501000 audit[3534]: USER_START pid=3534 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:46.507000 audit[3536]: CRED_ACQ pid=3536 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:46.519446 kernel: audit: type=1105 audit(1696276006.501:1316): pid=3534 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:46.519563 kernel: audit: type=1103 audit(1696276006.507:1317): pid=3536 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:46.724389 sshd[3534]: pam_unix(sshd:session): session closed for user core Oct 2 19:46:46.725000 audit[3534]: USER_END pid=3534 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:46.725000 audit[3534]: CRED_DISP pid=3534 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:46.736772 systemd[1]: sshd@25-172.31.21.168:22-139.178.89.65:49994.service: Deactivated successfully. Oct 2 19:46:46.739061 systemd[1]: session-26.scope: Deactivated successfully. Oct 2 19:46:46.744753 kernel: audit: type=1106 audit(1696276006.725:1318): pid=3534 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:46.744856 kernel: audit: type=1104 audit(1696276006.725:1319): pid=3534 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:46.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.21.168:22-139.178.89.65:49994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:46.750186 systemd-logind[1555]: Session 26 logged out. Waiting for processes to exit. Oct 2 19:46:46.754517 systemd-logind[1555]: Removed session 26. Oct 2 19:46:46.956835 kubelet[2670]: W1002 19:46:46.956730 2670 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod590c1673_f0de_46f7_8d5d_aea6ef7a5e8c.slice/cri-containerd-9f20cc285378e78649f8f01f07144fc3a998279db21e1a5e7c313f3b972ed89e.scope WatchSource:0}: task 9f20cc285378e78649f8f01f07144fc3a998279db21e1a5e7c313f3b972ed89e not found: not found Oct 2 19:46:46.995789 kubelet[2670]: E1002 19:46:46.995678 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:46:51.996819 kubelet[2670]: E1002 19:46:51.996788 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:46:56.749897 systemd[1]: Started sshd@26-172.31.21.168:22-139.178.89.65:33732.service. Oct 2 19:46:56.758633 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:46:56.758778 kernel: audit: type=1130 audit(1696276016.749:1321): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.21.168:22-139.178.89.65:33732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:56.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.21.168:22-139.178.89.65:33732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:56.919000 audit[3548]: USER_ACCT pid=3548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:56.920470 sshd[3548]: Accepted publickey for core from 139.178.89.65 port 33732 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:46:56.929114 kernel: audit: type=1101 audit(1696276016.919:1322): pid=3548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:56.928000 audit[3548]: CRED_ACQ pid=3548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:56.930529 sshd[3548]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:46:56.938272 kernel: audit: type=1103 audit(1696276016.928:1323): pid=3548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:56.938394 kernel: audit: type=1006 audit(1696276016.928:1324): pid=3548 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Oct 2 19:46:56.928000 audit[3548]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc84c86d0 a2=3 a3=0 items=0 ppid=1 pid=3548 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:56.951941 kernel: audit: type=1300 audit(1696276016.928:1324): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc84c86d0 a2=3 a3=0 items=0 ppid=1 pid=3548 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:56.951493 systemd[1]: Started session-27.scope. Oct 2 19:46:56.928000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:46:56.954495 systemd-logind[1555]: New session 27 of user core. Oct 2 19:46:56.955978 kernel: audit: type=1327 audit(1696276016.928:1324): proctitle=737368643A20636F7265205B707269765D Oct 2 19:46:56.960000 audit[3548]: USER_START pid=3548 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:56.961000 audit[3550]: CRED_ACQ pid=3550 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:56.975650 kernel: audit: type=1105 audit(1696276016.960:1325): pid=3548 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:56.975825 kernel: audit: type=1103 audit(1696276016.961:1326): pid=3550 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:56.998003 kubelet[2670]: E1002 19:46:56.997957 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:46:57.223568 sshd[3548]: pam_unix(sshd:session): session closed for user core Oct 2 19:46:57.224000 audit[3548]: USER_END pid=3548 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:57.232935 kernel: audit: type=1106 audit(1696276017.224:1327): pid=3548 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:57.231000 audit[3548]: CRED_DISP pid=3548 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:57.239025 kernel: audit: type=1104 audit(1696276017.231:1328): pid=3548 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:57.240416 systemd[1]: sshd@26-172.31.21.168:22-139.178.89.65:33732.service: Deactivated successfully. Oct 2 19:46:57.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.21.168:22-139.178.89.65:33732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:57.245543 systemd[1]: session-27.scope: Deactivated successfully. Oct 2 19:46:57.246344 systemd-logind[1555]: Session 27 logged out. Waiting for processes to exit. Oct 2 19:46:57.247462 systemd-logind[1555]: Removed session 27. Oct 2 19:46:59.711083 kubelet[2670]: E1002 19:46:59.711047 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 2m40s restarting failed container=mount-cgroup pod=cilium-d2h4s_kube-system(590c1673-f0de-46f7-8d5d-aea6ef7a5e8c)\"" pod="kube-system/cilium-d2h4s" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" Oct 2 19:47:01.999868 kubelet[2670]: E1002 19:47:01.999795 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:47:07.000784 kubelet[2670]: E1002 19:47:07.000738 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:47:07.254158 systemd[1]: Started sshd@27-172.31.21.168:22-139.178.89.65:49604.service. Oct 2 19:47:07.261967 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:47:07.262098 kernel: audit: type=1130 audit(1696276027.252:1330): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.21.168:22-139.178.89.65:49604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:07.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.21.168:22-139.178.89.65:49604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:07.419000 audit[3560]: USER_ACCT pid=3560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:07.430147 kernel: audit: type=1101 audit(1696276027.419:1331): pid=3560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:07.435318 kernel: audit: type=1103 audit(1696276027.428:1332): pid=3560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:07.428000 audit[3560]: CRED_ACQ pid=3560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:07.435527 sshd[3560]: Accepted publickey for core from 139.178.89.65 port 49604 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:47:07.433148 sshd[3560]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:47:07.443523 kernel: audit: type=1006 audit(1696276027.428:1333): pid=3560 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Oct 2 19:47:07.446458 systemd[1]: Started session-28.scope. Oct 2 19:47:07.448069 systemd-logind[1555]: New session 28 of user core. Oct 2 19:47:07.428000 audit[3560]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff62085a60 a2=3 a3=0 items=0 ppid=1 pid=3560 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:07.456984 kernel: audit: type=1300 audit(1696276027.428:1333): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff62085a60 a2=3 a3=0 items=0 ppid=1 pid=3560 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:07.428000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:47:07.462272 kernel: audit: type=1327 audit(1696276027.428:1333): proctitle=737368643A20636F7265205B707269765D Oct 2 19:47:07.461000 audit[3560]: USER_START pid=3560 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:07.472026 kernel: audit: type=1105 audit(1696276027.461:1334): pid=3560 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:07.485000 audit[3564]: CRED_ACQ pid=3564 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:07.494188 kernel: audit: type=1103 audit(1696276027.485:1335): pid=3564 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:07.528000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:07.528000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002842740 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:47:07.543483 kernel: audit: type=1400 audit(1696276027.528:1336): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:07.543599 kernel: audit: type=1300 audit(1696276027.528:1336): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002842740 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:47:07.528000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:47:07.529000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:07.529000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021aa240 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:47:07.529000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:47:07.714209 sshd[3560]: pam_unix(sshd:session): session closed for user core Oct 2 19:47:07.727000 audit[3560]: USER_END pid=3560 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:07.728000 audit[3560]: CRED_DISP pid=3560 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:07.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.21.168:22-139.178.89.65:49604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:07.733396 systemd[1]: sshd@27-172.31.21.168:22-139.178.89.65:49604.service: Deactivated successfully. Oct 2 19:47:07.734810 systemd[1]: session-28.scope: Deactivated successfully. Oct 2 19:47:07.742044 systemd-logind[1555]: Session 28 logged out. Waiting for processes to exit. Oct 2 19:47:07.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.21.168:22-139.178.89.65:49610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:07.743878 systemd[1]: Started sshd@28-172.31.21.168:22-139.178.89.65:49610.service. Oct 2 19:47:07.748402 systemd-logind[1555]: Removed session 28. Oct 2 19:47:07.908000 audit[3575]: USER_ACCT pid=3575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:07.911457 sshd[3575]: Accepted publickey for core from 139.178.89.65 port 49610 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:47:07.909000 audit[3575]: CRED_ACQ pid=3575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:07.910000 audit[3575]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd6b59dc0 a2=3 a3=0 items=0 ppid=1 pid=3575 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:07.910000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:47:07.912279 sshd[3575]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:47:07.919341 systemd[1]: Started session-29.scope. Oct 2 19:47:07.919980 systemd-logind[1555]: New session 29 of user core. Oct 2 19:47:07.924000 audit[3575]: USER_START pid=3575 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:07.926000 audit[3577]: CRED_ACQ pid=3577 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:08.078000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:08.078000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c00a17ac60 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:47:08.078000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:47:08.078000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:08.078000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c00560f710 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:47:08.078000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:47:08.078000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:08.078000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c00560f770 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:47:08.078000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:47:08.095000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:08.095000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c00560f8c0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:47:08.095000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:47:08.213000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:08.213000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c00572e330 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:47:08.213000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:47:08.214000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:08.214000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c0094b1e40 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:47:08.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:47:08.232471 systemd[1]: Started sshd@29-172.31.21.168:22-198.235.24.159:55226.service. Oct 2 19:47:08.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.21.168:22-198.235.24.159:55226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:08.470427 sshd[3584]: kex_exchange_identification: Connection closed by remote host Oct 2 19:47:08.470828 sshd[3584]: Connection closed by 198.235.24.159 port 55226 Oct 2 19:47:08.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.21.168:22-198.235.24.159:55226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:08.471851 systemd[1]: sshd@29-172.31.21.168:22-198.235.24.159:55226.service: Deactivated successfully. Oct 2 19:47:09.492633 env[1565]: time="2023-10-02T19:47:09.492384921Z" level=info msg="StopPodSandbox for \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\"" Oct 2 19:47:09.492633 env[1565]: time="2023-10-02T19:47:09.492472317Z" level=info msg="Container to stop \"9f20cc285378e78649f8f01f07144fc3a998279db21e1a5e7c313f3b972ed89e\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Oct 2 19:47:09.499431 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028-shm.mount: Deactivated successfully. Oct 2 19:47:09.515000 audit: BPF prog-id=116 op=UNLOAD Oct 2 19:47:09.516158 systemd[1]: cri-containerd-ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028.scope: Deactivated successfully. Oct 2 19:47:09.519000 audit: BPF prog-id=119 op=UNLOAD Oct 2 19:47:09.556290 env[1565]: time="2023-10-02T19:47:09.556244447Z" level=info msg="StopContainer for \"5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc\" with timeout 30 (s)" Oct 2 19:47:09.558740 env[1565]: time="2023-10-02T19:47:09.558606869Z" level=info msg="Stop container \"5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc\" with signal terminated" Oct 2 19:47:09.565684 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028-rootfs.mount: Deactivated successfully. Oct 2 19:47:09.580000 audit: BPF prog-id=127 op=UNLOAD Oct 2 19:47:09.582466 systemd[1]: cri-containerd-5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc.scope: Deactivated successfully. Oct 2 19:47:09.584000 audit: BPF prog-id=130 op=UNLOAD Oct 2 19:47:09.604158 env[1565]: time="2023-10-02T19:47:09.604103871Z" level=info msg="shim disconnected" id=ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028 Oct 2 19:47:09.605836 env[1565]: time="2023-10-02T19:47:09.605657491Z" level=warning msg="cleaning up after shim disconnected" id=ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028 namespace=k8s.io Oct 2 19:47:09.606253 env[1565]: time="2023-10-02T19:47:09.606077072Z" level=info msg="cleaning up dead shim" Oct 2 19:47:09.614839 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc-rootfs.mount: Deactivated successfully. Oct 2 19:47:09.629996 env[1565]: time="2023-10-02T19:47:09.626472609Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:47:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3625 runtime=io.containerd.runc.v2\n" Oct 2 19:47:09.629996 env[1565]: time="2023-10-02T19:47:09.627091838Z" level=info msg="TearDown network for sandbox \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\" successfully" Oct 2 19:47:09.629996 env[1565]: time="2023-10-02T19:47:09.627121478Z" level=info msg="StopPodSandbox for \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\" returns successfully" Oct 2 19:47:09.636900 env[1565]: time="2023-10-02T19:47:09.636851471Z" level=info msg="shim disconnected" id=5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc Oct 2 19:47:09.638277 env[1565]: time="2023-10-02T19:47:09.638248085Z" level=warning msg="cleaning up after shim disconnected" id=5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc namespace=k8s.io Oct 2 19:47:09.638437 env[1565]: time="2023-10-02T19:47:09.638419352Z" level=info msg="cleaning up dead shim" Oct 2 19:47:09.649834 env[1565]: time="2023-10-02T19:47:09.649791097Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:47:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3639 runtime=io.containerd.runc.v2\n" Oct 2 19:47:09.652269 env[1565]: time="2023-10-02T19:47:09.652221057Z" level=info msg="StopContainer for \"5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc\" returns successfully" Oct 2 19:47:09.653176 env[1565]: time="2023-10-02T19:47:09.653142302Z" level=info msg="StopPodSandbox for \"c09fbca7d440b84bcd92793e3b907a75236773b5d1d3417c62df066f03f34837\"" Oct 2 19:47:09.653371 env[1565]: time="2023-10-02T19:47:09.653205796Z" level=info msg="Container to stop \"5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Oct 2 19:47:09.656529 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c09fbca7d440b84bcd92793e3b907a75236773b5d1d3417c62df066f03f34837-shm.mount: Deactivated successfully. Oct 2 19:47:09.665579 systemd[1]: cri-containerd-c09fbca7d440b84bcd92793e3b907a75236773b5d1d3417c62df066f03f34837.scope: Deactivated successfully. Oct 2 19:47:09.663000 audit: BPF prog-id=123 op=UNLOAD Oct 2 19:47:09.667000 audit: BPF prog-id=126 op=UNLOAD Oct 2 19:47:09.697171 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c09fbca7d440b84bcd92793e3b907a75236773b5d1d3417c62df066f03f34837-rootfs.mount: Deactivated successfully. Oct 2 19:47:09.711943 env[1565]: time="2023-10-02T19:47:09.711265569Z" level=info msg="shim disconnected" id=c09fbca7d440b84bcd92793e3b907a75236773b5d1d3417c62df066f03f34837 Oct 2 19:47:09.711943 env[1565]: time="2023-10-02T19:47:09.711469551Z" level=warning msg="cleaning up after shim disconnected" id=c09fbca7d440b84bcd92793e3b907a75236773b5d1d3417c62df066f03f34837 namespace=k8s.io Oct 2 19:47:09.711943 env[1565]: time="2023-10-02T19:47:09.711484483Z" level=info msg="cleaning up dead shim" Oct 2 19:47:09.725689 env[1565]: time="2023-10-02T19:47:09.725234690Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:47:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3672 runtime=io.containerd.runc.v2\n" Oct 2 19:47:09.725689 env[1565]: time="2023-10-02T19:47:09.725674673Z" level=info msg="TearDown network for sandbox \"c09fbca7d440b84bcd92793e3b907a75236773b5d1d3417c62df066f03f34837\" successfully" Oct 2 19:47:09.725689 env[1565]: time="2023-10-02T19:47:09.725703303Z" level=info msg="StopPodSandbox for \"c09fbca7d440b84bcd92793e3b907a75236773b5d1d3417c62df066f03f34837\" returns successfully" Oct 2 19:47:09.778349 kubelet[2670]: I1002 19:47:09.778303 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-cilium-run" (OuterVolumeSpecName: "cilium-run") pod "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" (UID: "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c"). InnerVolumeSpecName "cilium-run". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:47:09.779422 kubelet[2670]: I1002 19:47:09.778310 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-run\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-cilium-run\") pod \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " Oct 2 19:47:09.779422 kubelet[2670]: I1002 19:47:09.778457 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-cgroup\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-cilium-cgroup\") pod \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " Oct 2 19:47:09.779422 kubelet[2670]: I1002 19:47:09.778488 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"etc-cni-netd\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-etc-cni-netd\") pod \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " Oct 2 19:47:09.779422 kubelet[2670]: I1002 19:47:09.778528 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-cilium-cgroup" (OuterVolumeSpecName: "cilium-cgroup") pod "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" (UID: "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c"). InnerVolumeSpecName "cilium-cgroup". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:47:09.779422 kubelet[2670]: I1002 19:47:09.778547 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-etc-cni-netd" (OuterVolumeSpecName: "etc-cni-netd") pod "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" (UID: "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c"). InnerVolumeSpecName "etc-cni-netd". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:47:09.779422 kubelet[2670]: I1002 19:47:09.778629 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"bpf-maps\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-bpf-maps\") pod \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " Oct 2 19:47:09.779422 kubelet[2670]: I1002 19:47:09.778685 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-tk56z\" (UniqueName: \"kubernetes.io/projected/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-kube-api-access-tk56z\") pod \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " Oct 2 19:47:09.779422 kubelet[2670]: I1002 19:47:09.778743 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-bpf-maps" (OuterVolumeSpecName: "bpf-maps") pod "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" (UID: "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c"). InnerVolumeSpecName "bpf-maps". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:47:09.780151 kubelet[2670]: I1002 19:47:09.780055 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"host-proc-sys-kernel\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-host-proc-sys-kernel\") pod \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " Oct 2 19:47:09.780151 kubelet[2670]: I1002 19:47:09.780122 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-cilium-config-path\") pod \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " Oct 2 19:47:09.780252 kubelet[2670]: I1002 19:47:09.780172 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"clustermesh-secrets\" (UniqueName: \"kubernetes.io/secret/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-clustermesh-secrets\") pod \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " Oct 2 19:47:09.780252 kubelet[2670]: I1002 19:47:09.780204 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-path\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-cni-path\") pod \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " Oct 2 19:47:09.780252 kubelet[2670]: I1002 19:47:09.780249 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"host-proc-sys-net\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-host-proc-sys-net\") pod \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " Oct 2 19:47:09.780390 kubelet[2670]: I1002 19:47:09.780281 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"hubble-tls\" (UniqueName: \"kubernetes.io/projected/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-hubble-tls\") pod \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " Oct 2 19:47:09.780390 kubelet[2670]: I1002 19:47:09.780322 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-xtables-lock\") pod \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " Oct 2 19:47:09.780390 kubelet[2670]: I1002 19:47:09.780351 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"hostproc\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-hostproc\") pod \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " Oct 2 19:47:09.780522 kubelet[2670]: I1002 19:47:09.780378 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-lib-modules\") pod \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\" (UID: \"590c1673-f0de-46f7-8d5d-aea6ef7a5e8c\") " Oct 2 19:47:09.780522 kubelet[2670]: I1002 19:47:09.780443 2670 reconciler_common.go:300] "Volume detached for volume \"cilium-cgroup\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-cilium-cgroup\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:47:09.780522 kubelet[2670]: I1002 19:47:09.780479 2670 reconciler_common.go:300] "Volume detached for volume \"etc-cni-netd\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-etc-cni-netd\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:47:09.780522 kubelet[2670]: I1002 19:47:09.780496 2670 reconciler_common.go:300] "Volume detached for volume \"cilium-run\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-cilium-run\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:47:09.780522 kubelet[2670]: I1002 19:47:09.780512 2670 reconciler_common.go:300] "Volume detached for volume \"bpf-maps\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-bpf-maps\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:47:09.780740 kubelet[2670]: I1002 19:47:09.780536 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" (UID: "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:47:09.780740 kubelet[2670]: I1002 19:47:09.780582 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-host-proc-sys-kernel" (OuterVolumeSpecName: "host-proc-sys-kernel") pod "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" (UID: "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c"). InnerVolumeSpecName "host-proc-sys-kernel". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:47:09.784774 kubelet[2670]: I1002 19:47:09.784739 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-cilium-config-path" (OuterVolumeSpecName: "cilium-config-path") pod "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" (UID: "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c"). InnerVolumeSpecName "cilium-config-path". PluginName "kubernetes.io/configmap", VolumeGidValue "" Oct 2 19:47:09.785287 kubelet[2670]: I1002 19:47:09.785262 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-cni-path" (OuterVolumeSpecName: "cni-path") pod "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" (UID: "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c"). InnerVolumeSpecName "cni-path". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:47:09.786360 kubelet[2670]: I1002 19:47:09.785302 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-host-proc-sys-net" (OuterVolumeSpecName: "host-proc-sys-net") pod "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" (UID: "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c"). InnerVolumeSpecName "host-proc-sys-net". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:47:09.786360 kubelet[2670]: I1002 19:47:09.786049 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" (UID: "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:47:09.786360 kubelet[2670]: I1002 19:47:09.786084 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-hostproc" (OuterVolumeSpecName: "hostproc") pod "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" (UID: "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c"). InnerVolumeSpecName "hostproc". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:47:09.790843 kubelet[2670]: I1002 19:47:09.790811 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-clustermesh-secrets" (OuterVolumeSpecName: "clustermesh-secrets") pod "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" (UID: "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c"). InnerVolumeSpecName "clustermesh-secrets". PluginName "kubernetes.io/secret", VolumeGidValue "" Oct 2 19:47:09.791010 kubelet[2670]: I1002 19:47:09.790835 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-kube-api-access-tk56z" (OuterVolumeSpecName: "kube-api-access-tk56z") pod "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" (UID: "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c"). InnerVolumeSpecName "kube-api-access-tk56z". PluginName "kubernetes.io/projected", VolumeGidValue "" Oct 2 19:47:09.794462 kubelet[2670]: I1002 19:47:09.794353 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-hubble-tls" (OuterVolumeSpecName: "hubble-tls") pod "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" (UID: "590c1673-f0de-46f7-8d5d-aea6ef7a5e8c"). InnerVolumeSpecName "hubble-tls". PluginName "kubernetes.io/projected", VolumeGidValue "" Oct 2 19:47:09.881917 kubelet[2670]: I1002 19:47:09.881857 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-8vx5x\" (UniqueName: \"kubernetes.io/projected/fc440f41-4c85-48d1-8250-3b3bb7ff1587-kube-api-access-8vx5x\") pod \"fc440f41-4c85-48d1-8250-3b3bb7ff1587\" (UID: \"fc440f41-4c85-48d1-8250-3b3bb7ff1587\") " Oct 2 19:47:09.881917 kubelet[2670]: I1002 19:47:09.881928 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/fc440f41-4c85-48d1-8250-3b3bb7ff1587-cilium-config-path\") pod \"fc440f41-4c85-48d1-8250-3b3bb7ff1587\" (UID: \"fc440f41-4c85-48d1-8250-3b3bb7ff1587\") " Oct 2 19:47:09.882262 kubelet[2670]: I1002 19:47:09.881979 2670 reconciler_common.go:300] "Volume detached for volume \"host-proc-sys-kernel\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-host-proc-sys-kernel\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:47:09.882262 kubelet[2670]: I1002 19:47:09.881998 2670 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-tk56z\" (UniqueName: \"kubernetes.io/projected/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-kube-api-access-tk56z\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:47:09.882262 kubelet[2670]: I1002 19:47:09.882016 2670 reconciler_common.go:300] "Volume detached for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-cilium-config-path\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:47:09.882262 kubelet[2670]: I1002 19:47:09.882029 2670 reconciler_common.go:300] "Volume detached for volume \"clustermesh-secrets\" (UniqueName: \"kubernetes.io/secret/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-clustermesh-secrets\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:47:09.882262 kubelet[2670]: I1002 19:47:09.882041 2670 reconciler_common.go:300] "Volume detached for volume \"host-proc-sys-net\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-host-proc-sys-net\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:47:09.882262 kubelet[2670]: I1002 19:47:09.882054 2670 reconciler_common.go:300] "Volume detached for volume \"hubble-tls\" (UniqueName: \"kubernetes.io/projected/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-hubble-tls\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:47:09.882262 kubelet[2670]: I1002 19:47:09.882127 2670 reconciler_common.go:300] "Volume detached for volume \"cni-path\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-cni-path\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:47:09.882262 kubelet[2670]: I1002 19:47:09.882143 2670 reconciler_common.go:300] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-xtables-lock\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:47:09.882262 kubelet[2670]: I1002 19:47:09.882155 2670 reconciler_common.go:300] "Volume detached for volume \"hostproc\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-hostproc\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:47:09.882262 kubelet[2670]: I1002 19:47:09.882168 2670 reconciler_common.go:300] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c-lib-modules\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:47:09.886516 kubelet[2670]: I1002 19:47:09.886470 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/fc440f41-4c85-48d1-8250-3b3bb7ff1587-cilium-config-path" (OuterVolumeSpecName: "cilium-config-path") pod "fc440f41-4c85-48d1-8250-3b3bb7ff1587" (UID: "fc440f41-4c85-48d1-8250-3b3bb7ff1587"). InnerVolumeSpecName "cilium-config-path". PluginName "kubernetes.io/configmap", VolumeGidValue "" Oct 2 19:47:09.888258 kubelet[2670]: I1002 19:47:09.888223 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/fc440f41-4c85-48d1-8250-3b3bb7ff1587-kube-api-access-8vx5x" (OuterVolumeSpecName: "kube-api-access-8vx5x") pod "fc440f41-4c85-48d1-8250-3b3bb7ff1587" (UID: "fc440f41-4c85-48d1-8250-3b3bb7ff1587"). InnerVolumeSpecName "kube-api-access-8vx5x". PluginName "kubernetes.io/projected", VolumeGidValue "" Oct 2 19:47:09.982504 kubelet[2670]: I1002 19:47:09.982460 2670 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-8vx5x\" (UniqueName: \"kubernetes.io/projected/fc440f41-4c85-48d1-8250-3b3bb7ff1587-kube-api-access-8vx5x\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:47:09.982504 kubelet[2670]: I1002 19:47:09.982498 2670 reconciler_common.go:300] "Volume detached for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/fc440f41-4c85-48d1-8250-3b3bb7ff1587-cilium-config-path\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:47:10.475454 kubelet[2670]: I1002 19:47:10.475293 2670 scope.go:117] "RemoveContainer" containerID="5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc" Oct 2 19:47:10.484891 env[1565]: time="2023-10-02T19:47:10.481309067Z" level=info msg="RemoveContainer for \"5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc\"" Oct 2 19:47:10.500463 systemd[1]: var-lib-kubelet-pods-fc440f41\x2d4c85\x2d48d1\x2d8250\x2d3b3bb7ff1587-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d8vx5x.mount: Deactivated successfully. Oct 2 19:47:10.506898 env[1565]: time="2023-10-02T19:47:10.506411694Z" level=info msg="RemoveContainer for \"5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc\" returns successfully" Oct 2 19:47:10.500614 systemd[1]: var-lib-kubelet-pods-590c1673\x2df0de\x2d46f7\x2d8d5d\x2daea6ef7a5e8c-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dtk56z.mount: Deactivated successfully. Oct 2 19:47:10.500708 systemd[1]: var-lib-kubelet-pods-590c1673\x2df0de\x2d46f7\x2d8d5d\x2daea6ef7a5e8c-volumes-kubernetes.io\x7eprojected-hubble\x2dtls.mount: Deactivated successfully. Oct 2 19:47:10.500798 systemd[1]: var-lib-kubelet-pods-590c1673\x2df0de\x2d46f7\x2d8d5d\x2daea6ef7a5e8c-volumes-kubernetes.io\x7esecret-clustermesh\x2dsecrets.mount: Deactivated successfully. Oct 2 19:47:10.505135 systemd[1]: Removed slice kubepods-besteffort-podfc440f41_4c85_48d1_8250_3b3bb7ff1587.slice. Oct 2 19:47:10.509154 kubelet[2670]: I1002 19:47:10.508058 2670 scope.go:117] "RemoveContainer" containerID="5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc" Oct 2 19:47:10.510790 systemd[1]: Removed slice kubepods-burstable-pod590c1673_f0de_46f7_8d5d_aea6ef7a5e8c.slice. Oct 2 19:47:10.511851 env[1565]: time="2023-10-02T19:47:10.511700601Z" level=error msg="ContainerStatus for \"5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc\": not found" Oct 2 19:47:10.515795 kubelet[2670]: E1002 19:47:10.515769 2670 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc\": not found" containerID="5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc" Oct 2 19:47:10.516247 kubelet[2670]: I1002 19:47:10.515853 2670 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc"} err="failed to get container status \"5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc\": rpc error: code = NotFound desc = an error occurred when try to find container \"5c0031c44ee152717b8e8b00ca46550c897bcb56aa00af82671b2da280dc8ccc\": not found" Oct 2 19:47:10.516247 kubelet[2670]: I1002 19:47:10.515871 2670 scope.go:117] "RemoveContainer" containerID="9f20cc285378e78649f8f01f07144fc3a998279db21e1a5e7c313f3b972ed89e" Oct 2 19:47:10.518426 env[1565]: time="2023-10-02T19:47:10.518050146Z" level=info msg="RemoveContainer for \"9f20cc285378e78649f8f01f07144fc3a998279db21e1a5e7c313f3b972ed89e\"" Oct 2 19:47:10.524135 env[1565]: time="2023-10-02T19:47:10.524091008Z" level=info msg="RemoveContainer for \"9f20cc285378e78649f8f01f07144fc3a998279db21e1a5e7c313f3b972ed89e\" returns successfully" Oct 2 19:47:11.448651 sshd[3575]: pam_unix(sshd:session): session closed for user core Oct 2 19:47:11.448000 audit[3575]: USER_END pid=3575 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:11.448000 audit[3575]: CRED_DISP pid=3575 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:11.453085 systemd-logind[1555]: Session 29 logged out. Waiting for processes to exit. Oct 2 19:47:11.453296 systemd[1]: sshd@28-172.31.21.168:22-139.178.89.65:49610.service: Deactivated successfully. Oct 2 19:47:11.454359 systemd[1]: session-29.scope: Deactivated successfully. Oct 2 19:47:11.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.21.168:22-139.178.89.65:49610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:11.456802 systemd-logind[1555]: Removed session 29. Oct 2 19:47:11.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-172.31.21.168:22-139.178.89.65:49618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:11.474807 systemd[1]: Started sshd@30-172.31.21.168:22-139.178.89.65:49618.service. Oct 2 19:47:11.634000 audit[3692]: USER_ACCT pid=3692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:11.636306 sshd[3692]: Accepted publickey for core from 139.178.89.65 port 49618 ssh2: RSA SHA256:2tpfHuF3vLKbRg5mH6Od9mbM0lpjrGjQfzRVUhbm/E8 Oct 2 19:47:11.635000 audit[3692]: CRED_ACQ pid=3692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:11.635000 audit[3692]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8e16bae0 a2=3 a3=0 items=0 ppid=1 pid=3692 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:11.635000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:47:11.638294 sshd[3692]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:47:11.644656 systemd[1]: Started session-30.scope. Oct 2 19:47:11.645285 systemd-logind[1555]: New session 30 of user core. Oct 2 19:47:11.650000 audit[3692]: USER_START pid=3692 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:11.652000 audit[3694]: CRED_ACQ pid=3694 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:11.721467 kubelet[2670]: I1002 19:47:11.716439 2670 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" path="/var/lib/kubelet/pods/590c1673-f0de-46f7-8d5d-aea6ef7a5e8c/volumes" Oct 2 19:47:11.725847 kubelet[2670]: I1002 19:47:11.721619 2670 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="fc440f41-4c85-48d1-8250-3b3bb7ff1587" path="/var/lib/kubelet/pods/fc440f41-4c85-48d1-8250-3b3bb7ff1587/volumes" Oct 2 19:47:11.726100 env[1565]: time="2023-10-02T19:47:11.723604534Z" level=info msg="StopPodSandbox for \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\"" Oct 2 19:47:11.726100 env[1565]: time="2023-10-02T19:47:11.723708881Z" level=info msg="TearDown network for sandbox \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\" successfully" Oct 2 19:47:11.726100 env[1565]: time="2023-10-02T19:47:11.723840640Z" level=info msg="StopPodSandbox for \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\" returns successfully" Oct 2 19:47:11.726100 env[1565]: time="2023-10-02T19:47:11.724314989Z" level=info msg="RemovePodSandbox for \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\"" Oct 2 19:47:11.726100 env[1565]: time="2023-10-02T19:47:11.724344732Z" level=info msg="Forcibly stopping sandbox \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\"" Oct 2 19:47:11.726100 env[1565]: time="2023-10-02T19:47:11.724426603Z" level=info msg="TearDown network for sandbox \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\" successfully" Oct 2 19:47:11.729442 env[1565]: time="2023-10-02T19:47:11.729398678Z" level=info msg="RemovePodSandbox \"ca9293d1ab25c46afc14353d2eed48e449e750258554cca23ea95c346790f028\" returns successfully" Oct 2 19:47:11.730743 env[1565]: time="2023-10-02T19:47:11.730496398Z" level=info msg="StopPodSandbox for \"c09fbca7d440b84bcd92793e3b907a75236773b5d1d3417c62df066f03f34837\"" Oct 2 19:47:11.730743 env[1565]: time="2023-10-02T19:47:11.730592766Z" level=info msg="TearDown network for sandbox \"c09fbca7d440b84bcd92793e3b907a75236773b5d1d3417c62df066f03f34837\" successfully" Oct 2 19:47:11.730743 env[1565]: time="2023-10-02T19:47:11.730634895Z" level=info msg="StopPodSandbox for \"c09fbca7d440b84bcd92793e3b907a75236773b5d1d3417c62df066f03f34837\" returns successfully" Oct 2 19:47:11.731520 env[1565]: time="2023-10-02T19:47:11.731488115Z" level=info msg="RemovePodSandbox for \"c09fbca7d440b84bcd92793e3b907a75236773b5d1d3417c62df066f03f34837\"" Oct 2 19:47:11.731634 env[1565]: time="2023-10-02T19:47:11.731525584Z" level=info msg="Forcibly stopping sandbox \"c09fbca7d440b84bcd92793e3b907a75236773b5d1d3417c62df066f03f34837\"" Oct 2 19:47:11.731634 env[1565]: time="2023-10-02T19:47:11.731613035Z" level=info msg="TearDown network for sandbox \"c09fbca7d440b84bcd92793e3b907a75236773b5d1d3417c62df066f03f34837\" successfully" Oct 2 19:47:11.735880 env[1565]: time="2023-10-02T19:47:11.735795055Z" level=info msg="RemovePodSandbox \"c09fbca7d440b84bcd92793e3b907a75236773b5d1d3417c62df066f03f34837\" returns successfully" Oct 2 19:47:12.002487 kubelet[2670]: E1002 19:47:12.002374 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:47:12.651818 kubelet[2670]: I1002 19:47:12.651787 2670 topology_manager.go:215] "Topology Admit Handler" podUID="d9eec7ba-6773-4622-98ec-6495c5e95fcd" podNamespace="kube-system" podName="cilium-gxmh6" Oct 2 19:47:12.652089 kubelet[2670]: E1002 19:47:12.652072 2670 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" containerName="mount-cgroup" Oct 2 19:47:12.652198 kubelet[2670]: E1002 19:47:12.652187 2670 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="fc440f41-4c85-48d1-8250-3b3bb7ff1587" containerName="cilium-operator" Oct 2 19:47:12.652385 kubelet[2670]: E1002 19:47:12.652372 2670 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" containerName="mount-cgroup" Oct 2 19:47:12.652473 kubelet[2670]: E1002 19:47:12.652464 2670 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" containerName="mount-cgroup" Oct 2 19:47:12.652551 kubelet[2670]: E1002 19:47:12.652543 2670 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" containerName="mount-cgroup" Oct 2 19:47:12.652711 kubelet[2670]: I1002 19:47:12.652698 2670 memory_manager.go:346] "RemoveStaleState removing state" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" containerName="mount-cgroup" Oct 2 19:47:12.652795 kubelet[2670]: I1002 19:47:12.652786 2670 memory_manager.go:346] "RemoveStaleState removing state" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" containerName="mount-cgroup" Oct 2 19:47:12.652862 kubelet[2670]: I1002 19:47:12.652854 2670 memory_manager.go:346] "RemoveStaleState removing state" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" containerName="mount-cgroup" Oct 2 19:47:12.652957 kubelet[2670]: I1002 19:47:12.652949 2670 memory_manager.go:346] "RemoveStaleState removing state" podUID="fc440f41-4c85-48d1-8250-3b3bb7ff1587" containerName="cilium-operator" Oct 2 19:47:12.653119 kubelet[2670]: I1002 19:47:12.653108 2670 memory_manager.go:346] "RemoveStaleState removing state" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" containerName="mount-cgroup" Oct 2 19:47:12.653200 kubelet[2670]: I1002 19:47:12.653192 2670 memory_manager.go:346] "RemoveStaleState removing state" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" containerName="mount-cgroup" Oct 2 19:47:12.653383 kubelet[2670]: E1002 19:47:12.653370 2670 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" containerName="mount-cgroup" Oct 2 19:47:12.653496 kubelet[2670]: I1002 19:47:12.653482 2670 memory_manager.go:346] "RemoveStaleState removing state" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" containerName="mount-cgroup" Oct 2 19:47:12.653583 kubelet[2670]: E1002 19:47:12.653573 2670 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="590c1673-f0de-46f7-8d5d-aea6ef7a5e8c" containerName="mount-cgroup" Oct 2 19:47:12.661987 systemd[1]: Created slice kubepods-burstable-podd9eec7ba_6773_4622_98ec_6495c5e95fcd.slice. Oct 2 19:47:12.685872 kernel: kauditd_printk_skb: 52 callbacks suppressed Oct 2 19:47:12.686049 kernel: audit: type=1400 audit(1696276032.675:1370): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:12.675000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:12.684000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:12.694937 kernel: audit: type=1400 audit(1696276032.684:1371): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:12.684000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001113c00 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:47:12.707926 kernel: audit: type=1300 audit(1696276032.684:1371): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001113c00 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:47:12.684000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:47:12.721964 kernel: audit: type=1327 audit(1696276032.684:1371): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:47:12.675000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024937c0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:47:12.734013 kernel: audit: type=1300 audit(1696276032.675:1370): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024937c0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:47:12.675000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:47:12.748171 kernel: audit: type=1327 audit(1696276032.675:1370): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:47:12.748292 kernel: audit: type=1400 audit(1696276032.684:1372): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:12.684000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:12.756266 kernel: audit: type=1300 audit(1696276032.684:1372): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024937e0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:47:12.684000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024937e0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:47:12.762992 kernel: audit: type=1327 audit(1696276032.684:1372): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:47:12.684000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:47:12.769273 kernel: audit: type=1400 audit(1696276032.688:1373): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:12.688000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:12.688000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00148cda0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:47:12.688000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:47:12.809950 kubelet[2670]: I1002 19:47:12.809894 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mr6r9\" (UniqueName: \"kubernetes.io/projected/d9eec7ba-6773-4622-98ec-6495c5e95fcd-kube-api-access-mr6r9\") pod \"cilium-gxmh6\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " pod="kube-system/cilium-gxmh6" Oct 2 19:47:12.810458 kubelet[2670]: I1002 19:47:12.810040 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/d9eec7ba-6773-4622-98ec-6495c5e95fcd-cilium-config-path\") pod \"cilium-gxmh6\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " pod="kube-system/cilium-gxmh6" Oct 2 19:47:12.810458 kubelet[2670]: I1002 19:47:12.810121 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-path\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-cni-path\") pod \"cilium-gxmh6\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " pod="kube-system/cilium-gxmh6" Oct 2 19:47:12.810458 kubelet[2670]: I1002 19:47:12.810196 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"hubble-tls\" (UniqueName: \"kubernetes.io/projected/d9eec7ba-6773-4622-98ec-6495c5e95fcd-hubble-tls\") pod \"cilium-gxmh6\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " pod="kube-system/cilium-gxmh6" Oct 2 19:47:12.810458 kubelet[2670]: I1002 19:47:12.810272 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-lib-modules\") pod \"cilium-gxmh6\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " pod="kube-system/cilium-gxmh6" Oct 2 19:47:12.810458 kubelet[2670]: I1002 19:47:12.810308 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-xtables-lock\") pod \"cilium-gxmh6\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " pod="kube-system/cilium-gxmh6" Oct 2 19:47:12.810458 kubelet[2670]: I1002 19:47:12.810375 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-run\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-cilium-run\") pod \"cilium-gxmh6\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " pod="kube-system/cilium-gxmh6" Oct 2 19:47:12.810458 kubelet[2670]: I1002 19:47:12.810440 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"host-proc-sys-kernel\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-host-proc-sys-kernel\") pod \"cilium-gxmh6\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " pod="kube-system/cilium-gxmh6" Oct 2 19:47:12.810791 kubelet[2670]: I1002 19:47:12.810502 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-cgroup\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-cilium-cgroup\") pod \"cilium-gxmh6\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " pod="kube-system/cilium-gxmh6" Oct 2 19:47:12.810791 kubelet[2670]: I1002 19:47:12.810535 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etc-cni-netd\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-etc-cni-netd\") pod \"cilium-gxmh6\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " pod="kube-system/cilium-gxmh6" Oct 2 19:47:12.810791 kubelet[2670]: I1002 19:47:12.810601 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"host-proc-sys-net\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-host-proc-sys-net\") pod \"cilium-gxmh6\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " pod="kube-system/cilium-gxmh6" Oct 2 19:47:12.810791 kubelet[2670]: I1002 19:47:12.810678 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"hostproc\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-hostproc\") pod \"cilium-gxmh6\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " pod="kube-system/cilium-gxmh6" Oct 2 19:47:12.810791 kubelet[2670]: I1002 19:47:12.810742 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"bpf-maps\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-bpf-maps\") pod \"cilium-gxmh6\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " pod="kube-system/cilium-gxmh6" Oct 2 19:47:12.810791 kubelet[2670]: I1002 19:47:12.810776 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"clustermesh-secrets\" (UniqueName: \"kubernetes.io/secret/d9eec7ba-6773-4622-98ec-6495c5e95fcd-clustermesh-secrets\") pod \"cilium-gxmh6\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " pod="kube-system/cilium-gxmh6" Oct 2 19:47:12.811082 kubelet[2670]: I1002 19:47:12.810892 2670 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-ipsec-secrets\" (UniqueName: \"kubernetes.io/secret/d9eec7ba-6773-4622-98ec-6495c5e95fcd-cilium-ipsec-secrets\") pod \"cilium-gxmh6\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " pod="kube-system/cilium-gxmh6" Oct 2 19:47:12.973746 env[1565]: time="2023-10-02T19:47:12.973613444Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:cilium-gxmh6,Uid:d9eec7ba-6773-4622-98ec-6495c5e95fcd,Namespace:kube-system,Attempt:0,}" Oct 2 19:47:13.006467 env[1565]: time="2023-10-02T19:47:13.006378117Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:47:13.006467 env[1565]: time="2023-10-02T19:47:13.006424866Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:47:13.006467 env[1565]: time="2023-10-02T19:47:13.006441220Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:47:13.006955 env[1565]: time="2023-10-02T19:47:13.006860257Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163 pid=3712 runtime=io.containerd.runc.v2 Oct 2 19:47:13.029413 systemd[1]: Started cri-containerd-f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163.scope. Oct 2 19:47:13.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.058000 audit: BPF prog-id=131 op=LOAD Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3712 pid=3723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:13.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630366565333739626334613465373035666633613330306130633466 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3712 pid=3723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:13.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630366565333739626334613465373035666633613330306130633466 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit: BPF prog-id=132 op=LOAD Oct 2 19:47:13.060000 audit[3723]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021a360 items=0 ppid=3712 pid=3723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:13.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630366565333739626334613465373035666633613330306130633466 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit: BPF prog-id=133 op=LOAD Oct 2 19:47:13.060000 audit[3723]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021a3a8 items=0 ppid=3712 pid=3723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:13.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630366565333739626334613465373035666633613330306130633466 Oct 2 19:47:13.060000 audit: BPF prog-id=133 op=UNLOAD Oct 2 19:47:13.060000 audit: BPF prog-id=132 op=UNLOAD Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:13.060000 audit: BPF prog-id=134 op=LOAD Oct 2 19:47:13.060000 audit[3723]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021a7b8 items=0 ppid=3712 pid=3723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:13.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630366565333739626334613465373035666633613330306130633466 Oct 2 19:47:13.083259 env[1565]: time="2023-10-02T19:47:13.083169894Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:cilium-gxmh6,Uid:d9eec7ba-6773-4622-98ec-6495c5e95fcd,Namespace:kube-system,Attempt:0,} returns sandbox id \"f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163\"" Oct 2 19:47:13.092018 env[1565]: time="2023-10-02T19:47:13.091960057Z" level=info msg="CreateContainer within sandbox \"f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:0,}" Oct 2 19:47:13.120899 env[1565]: time="2023-10-02T19:47:13.120847360Z" level=info msg="CreateContainer within sandbox \"f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163\" for &ContainerMetadata{Name:mount-cgroup,Attempt:0,} returns container id \"d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208\"" Oct 2 19:47:13.123567 env[1565]: time="2023-10-02T19:47:13.121682977Z" level=info msg="StartContainer for \"d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208\"" Oct 2 19:47:13.160496 systemd[1]: Started cri-containerd-d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208.scope. Oct 2 19:47:13.185103 systemd[1]: cri-containerd-d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208.scope: Deactivated successfully. Oct 2 19:47:13.218518 env[1565]: time="2023-10-02T19:47:13.218311264Z" level=info msg="shim disconnected" id=d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208 Oct 2 19:47:13.218518 env[1565]: time="2023-10-02T19:47:13.218518249Z" level=warning msg="cleaning up after shim disconnected" id=d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208 namespace=k8s.io Oct 2 19:47:13.218844 env[1565]: time="2023-10-02T19:47:13.218532861Z" level=info msg="cleaning up dead shim" Oct 2 19:47:13.232663 env[1565]: time="2023-10-02T19:47:13.232527229Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:47:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3772 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:47:13Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:47:13.234896 env[1565]: time="2023-10-02T19:47:13.234421436Z" level=error msg="copy shim log" error="read /proc/self/fd/38: file already closed" Oct 2 19:47:13.236844 env[1565]: time="2023-10-02T19:47:13.236787784Z" level=error msg="Failed to pipe stderr of container \"d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208\"" error="reading from a closed fifo" Oct 2 19:47:13.237282 env[1565]: time="2023-10-02T19:47:13.237220411Z" level=error msg="Failed to pipe stdout of container \"d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208\"" error="reading from a closed fifo" Oct 2 19:47:13.239371 env[1565]: time="2023-10-02T19:47:13.239329482Z" level=error msg="StartContainer for \"d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:47:13.239629 kubelet[2670]: E1002 19:47:13.239606 2670 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208" Oct 2 19:47:13.239755 kubelet[2670]: E1002 19:47:13.239734 2670 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:47:13.239755 kubelet[2670]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:47:13.239755 kubelet[2670]: rm /hostbin/cilium-mount Oct 2 19:47:13.239755 kubelet[2670]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-mr6r9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-gxmh6_kube-system(d9eec7ba-6773-4622-98ec-6495c5e95fcd): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:47:13.240122 kubelet[2670]: E1002 19:47:13.239829 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-gxmh6" podUID="d9eec7ba-6773-4622-98ec-6495c5e95fcd" Oct 2 19:47:13.510403 env[1565]: time="2023-10-02T19:47:13.510252227Z" level=info msg="CreateContainer within sandbox \"f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:1,}" Oct 2 19:47:13.536240 env[1565]: time="2023-10-02T19:47:13.536179059Z" level=info msg="CreateContainer within sandbox \"f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163\" for &ContainerMetadata{Name:mount-cgroup,Attempt:1,} returns container id \"18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588\"" Oct 2 19:47:13.537648 env[1565]: time="2023-10-02T19:47:13.537563742Z" level=info msg="StartContainer for \"18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588\"" Oct 2 19:47:13.583808 systemd[1]: Started cri-containerd-18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588.scope. Oct 2 19:47:13.597077 systemd[1]: cri-containerd-18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588.scope: Deactivated successfully. Oct 2 19:47:13.614933 env[1565]: time="2023-10-02T19:47:13.614849628Z" level=info msg="shim disconnected" id=18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588 Oct 2 19:47:13.615191 env[1565]: time="2023-10-02T19:47:13.614940839Z" level=warning msg="cleaning up after shim disconnected" id=18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588 namespace=k8s.io Oct 2 19:47:13.615191 env[1565]: time="2023-10-02T19:47:13.614956254Z" level=info msg="cleaning up dead shim" Oct 2 19:47:13.626991 env[1565]: time="2023-10-02T19:47:13.626931604Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:47:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3808 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:47:13Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:47:13.627298 env[1565]: time="2023-10-02T19:47:13.627231888Z" level=error msg="copy shim log" error="read /proc/self/fd/38: file already closed" Oct 2 19:47:13.630424 env[1565]: time="2023-10-02T19:47:13.630356331Z" level=error msg="Failed to pipe stdout of container \"18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588\"" error="reading from a closed fifo" Oct 2 19:47:13.631480 env[1565]: time="2023-10-02T19:47:13.631432241Z" level=error msg="Failed to pipe stderr of container \"18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588\"" error="reading from a closed fifo" Oct 2 19:47:13.633485 env[1565]: time="2023-10-02T19:47:13.633436777Z" level=error msg="StartContainer for \"18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:47:13.633743 kubelet[2670]: E1002 19:47:13.633721 2670 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588" Oct 2 19:47:13.634284 kubelet[2670]: E1002 19:47:13.633845 2670 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:47:13.634284 kubelet[2670]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:47:13.634284 kubelet[2670]: rm /hostbin/cilium-mount Oct 2 19:47:13.634284 kubelet[2670]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-mr6r9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-gxmh6_kube-system(d9eec7ba-6773-4622-98ec-6495c5e95fcd): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:47:13.634284 kubelet[2670]: E1002 19:47:13.633894 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-gxmh6" podUID="d9eec7ba-6773-4622-98ec-6495c5e95fcd" Oct 2 19:47:14.510469 kubelet[2670]: I1002 19:47:14.510434 2670 scope.go:117] "RemoveContainer" containerID="d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208" Oct 2 19:47:14.511129 kubelet[2670]: I1002 19:47:14.510944 2670 scope.go:117] "RemoveContainer" containerID="d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208" Oct 2 19:47:14.512944 env[1565]: time="2023-10-02T19:47:14.512856485Z" level=info msg="RemoveContainer for \"d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208\"" Oct 2 19:47:14.514015 env[1565]: time="2023-10-02T19:47:14.513988594Z" level=info msg="RemoveContainer for \"d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208\"" Oct 2 19:47:14.514484 env[1565]: time="2023-10-02T19:47:14.514319840Z" level=error msg="RemoveContainer for \"d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208\" failed" error="failed to set removing state for container \"d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208\": container is already in removing state" Oct 2 19:47:14.515044 kubelet[2670]: E1002 19:47:14.515023 2670 remote_runtime.go:385] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208\": container is already in removing state" containerID="d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208" Oct 2 19:47:14.515154 kubelet[2670]: E1002 19:47:14.515065 2670 kuberuntime_container.go:820] failed to remove pod init container "mount-cgroup": rpc error: code = Unknown desc = failed to set removing state for container "d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208": container is already in removing state; Skipping pod "cilium-gxmh6_kube-system(d9eec7ba-6773-4622-98ec-6495c5e95fcd)" Oct 2 19:47:14.515550 kubelet[2670]: E1002 19:47:14.515529 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 10s restarting failed container=mount-cgroup pod=cilium-gxmh6_kube-system(d9eec7ba-6773-4622-98ec-6495c5e95fcd)\"" pod="kube-system/cilium-gxmh6" podUID="d9eec7ba-6773-4622-98ec-6495c5e95fcd" Oct 2 19:47:14.517869 env[1565]: time="2023-10-02T19:47:14.517835374Z" level=info msg="RemoveContainer for \"d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208\" returns successfully" Oct 2 19:47:16.324338 kubelet[2670]: W1002 19:47:16.324295 2670 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-podd9eec7ba_6773_4622_98ec_6495c5e95fcd.slice/cri-containerd-d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208.scope WatchSource:0}: container "d89a9c6f035477556816378a5c6b70e1e5ec8b41f3d2e25755b5df672ff07208" in namespace "k8s.io": not found Oct 2 19:47:17.004291 kubelet[2670]: E1002 19:47:17.004249 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:47:19.433403 kubelet[2670]: W1002 19:47:19.433363 2670 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-podd9eec7ba_6773_4622_98ec_6495c5e95fcd.slice/cri-containerd-18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588.scope WatchSource:0}: task 18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588 not found: not found Oct 2 19:47:20.986395 amazon-ssm-agent[1543]: 2023-10-02 19:47:20 INFO Backing off health check to every 600 seconds for 1800 seconds. Oct 2 19:47:21.087618 amazon-ssm-agent[1543]: 2023-10-02 19:47:21 ERROR Health ping failed with error - AccessDeniedException: User: arn:aws:sts::075585003325:assumed-role/jenkins-test/i-044a78b7f4bff8b37 is not authorized to perform: ssm:UpdateInstanceInformation on resource: arn:aws:ec2:us-west-2:075585003325:instance/i-044a78b7f4bff8b37 because no identity-based policy allows the ssm:UpdateInstanceInformation action Oct 2 19:47:21.087618 amazon-ssm-agent[1543]: status code: 400, request id: 200c5c1b-4e06-4d49-88ef-881166aed2f9 Oct 2 19:47:22.005341 kubelet[2670]: E1002 19:47:22.005311 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:47:25.718169 env[1565]: time="2023-10-02T19:47:25.717880919Z" level=info msg="CreateContainer within sandbox \"f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:2,}" Oct 2 19:47:25.766384 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2634120879.mount: Deactivated successfully. Oct 2 19:47:25.779137 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2632188569.mount: Deactivated successfully. Oct 2 19:47:25.786750 env[1565]: time="2023-10-02T19:47:25.786702902Z" level=info msg="CreateContainer within sandbox \"f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163\" for &ContainerMetadata{Name:mount-cgroup,Attempt:2,} returns container id \"27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186\"" Oct 2 19:47:25.788678 env[1565]: time="2023-10-02T19:47:25.787523409Z" level=info msg="StartContainer for \"27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186\"" Oct 2 19:47:25.828963 systemd[1]: Started cri-containerd-27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186.scope. Oct 2 19:47:25.845518 systemd[1]: cri-containerd-27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186.scope: Deactivated successfully. Oct 2 19:47:25.861953 env[1565]: time="2023-10-02T19:47:25.861582548Z" level=info msg="shim disconnected" id=27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186 Oct 2 19:47:25.862340 env[1565]: time="2023-10-02T19:47:25.861954996Z" level=warning msg="cleaning up after shim disconnected" id=27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186 namespace=k8s.io Oct 2 19:47:25.862340 env[1565]: time="2023-10-02T19:47:25.861970212Z" level=info msg="cleaning up dead shim" Oct 2 19:47:25.872578 env[1565]: time="2023-10-02T19:47:25.872519659Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:47:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3848 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:47:25Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:47:25.872975 env[1565]: time="2023-10-02T19:47:25.872813331Z" level=error msg="copy shim log" error="read /proc/self/fd/38: file already closed" Oct 2 19:47:25.873553 env[1565]: time="2023-10-02T19:47:25.873453525Z" level=error msg="Failed to pipe stderr of container \"27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186\"" error="reading from a closed fifo" Oct 2 19:47:25.873799 env[1565]: time="2023-10-02T19:47:25.873745554Z" level=error msg="Failed to pipe stdout of container \"27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186\"" error="reading from a closed fifo" Oct 2 19:47:25.876186 env[1565]: time="2023-10-02T19:47:25.876140525Z" level=error msg="StartContainer for \"27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:47:25.876422 kubelet[2670]: E1002 19:47:25.876388 2670 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186" Oct 2 19:47:25.877049 kubelet[2670]: E1002 19:47:25.876514 2670 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:47:25.877049 kubelet[2670]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:47:25.877049 kubelet[2670]: rm /hostbin/cilium-mount Oct 2 19:47:25.877049 kubelet[2670]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-mr6r9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-gxmh6_kube-system(d9eec7ba-6773-4622-98ec-6495c5e95fcd): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:47:25.877049 kubelet[2670]: E1002 19:47:25.876570 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-gxmh6" podUID="d9eec7ba-6773-4622-98ec-6495c5e95fcd" Oct 2 19:47:26.538086 kubelet[2670]: I1002 19:47:26.538058 2670 scope.go:117] "RemoveContainer" containerID="18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588" Oct 2 19:47:26.538564 kubelet[2670]: I1002 19:47:26.538537 2670 scope.go:117] "RemoveContainer" containerID="18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588" Oct 2 19:47:26.539707 env[1565]: time="2023-10-02T19:47:26.539672198Z" level=info msg="RemoveContainer for \"18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588\"" Oct 2 19:47:26.540291 env[1565]: time="2023-10-02T19:47:26.540263239Z" level=info msg="RemoveContainer for \"18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588\"" Oct 2 19:47:26.540639 env[1565]: time="2023-10-02T19:47:26.540593576Z" level=error msg="RemoveContainer for \"18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588\" failed" error="failed to set removing state for container \"18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588\": container is already in removing state" Oct 2 19:47:26.540877 kubelet[2670]: E1002 19:47:26.540862 2670 remote_runtime.go:385] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588\": container is already in removing state" containerID="18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588" Oct 2 19:47:26.541061 kubelet[2670]: E1002 19:47:26.541049 2670 kuberuntime_container.go:820] failed to remove pod init container "mount-cgroup": rpc error: code = Unknown desc = failed to set removing state for container "18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588": container is already in removing state; Skipping pod "cilium-gxmh6_kube-system(d9eec7ba-6773-4622-98ec-6495c5e95fcd)" Oct 2 19:47:26.541701 kubelet[2670]: E1002 19:47:26.541684 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 20s restarting failed container=mount-cgroup pod=cilium-gxmh6_kube-system(d9eec7ba-6773-4622-98ec-6495c5e95fcd)\"" pod="kube-system/cilium-gxmh6" podUID="d9eec7ba-6773-4622-98ec-6495c5e95fcd" Oct 2 19:47:26.545120 env[1565]: time="2023-10-02T19:47:26.545088402Z" level=info msg="RemoveContainer for \"18da73c75ed26fcf64f82b1a24c6c3672698a65a63bf139d63e6e1d4383ed588\" returns successfully" Oct 2 19:47:26.758180 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186-rootfs.mount: Deactivated successfully. Oct 2 19:47:27.006920 kubelet[2670]: E1002 19:47:27.006802 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:47:28.967350 kubelet[2670]: W1002 19:47:28.967286 2670 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-podd9eec7ba_6773_4622_98ec_6495c5e95fcd.slice/cri-containerd-27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186.scope WatchSource:0}: task 27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186 not found: not found Oct 2 19:47:32.008974 kubelet[2670]: E1002 19:47:32.008944 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:47:37.010007 kubelet[2670]: E1002 19:47:37.009961 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:47:37.711087 kubelet[2670]: E1002 19:47:37.711043 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 20s restarting failed container=mount-cgroup pod=cilium-gxmh6_kube-system(d9eec7ba-6773-4622-98ec-6495c5e95fcd)\"" pod="kube-system/cilium-gxmh6" podUID="d9eec7ba-6773-4622-98ec-6495c5e95fcd" Oct 2 19:47:42.011471 kubelet[2670]: E1002 19:47:42.011441 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:47:47.013729 kubelet[2670]: E1002 19:47:47.013697 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:47:48.713944 env[1565]: time="2023-10-02T19:47:48.713850559Z" level=info msg="CreateContainer within sandbox \"f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:3,}" Oct 2 19:47:48.742436 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4198005030.mount: Deactivated successfully. Oct 2 19:47:48.752015 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1042842388.mount: Deactivated successfully. Oct 2 19:47:48.754857 env[1565]: time="2023-10-02T19:47:48.754809272Z" level=info msg="CreateContainer within sandbox \"f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163\" for &ContainerMetadata{Name:mount-cgroup,Attempt:3,} returns container id \"3ab026589d089ae2196127f6ec9910bd9c43283dd7b5efcc68fe501a6114c1ed\"" Oct 2 19:47:48.755884 env[1565]: time="2023-10-02T19:47:48.755848923Z" level=info msg="StartContainer for \"3ab026589d089ae2196127f6ec9910bd9c43283dd7b5efcc68fe501a6114c1ed\"" Oct 2 19:47:48.781800 systemd[1]: Started cri-containerd-3ab026589d089ae2196127f6ec9910bd9c43283dd7b5efcc68fe501a6114c1ed.scope. Oct 2 19:47:48.804123 systemd[1]: cri-containerd-3ab026589d089ae2196127f6ec9910bd9c43283dd7b5efcc68fe501a6114c1ed.scope: Deactivated successfully. Oct 2 19:47:48.823588 env[1565]: time="2023-10-02T19:47:48.823528131Z" level=info msg="shim disconnected" id=3ab026589d089ae2196127f6ec9910bd9c43283dd7b5efcc68fe501a6114c1ed Oct 2 19:47:48.823588 env[1565]: time="2023-10-02T19:47:48.823588403Z" level=warning msg="cleaning up after shim disconnected" id=3ab026589d089ae2196127f6ec9910bd9c43283dd7b5efcc68fe501a6114c1ed namespace=k8s.io Oct 2 19:47:48.823930 env[1565]: time="2023-10-02T19:47:48.823600687Z" level=info msg="cleaning up dead shim" Oct 2 19:47:48.839154 env[1565]: time="2023-10-02T19:47:48.839090017Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:47:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3889 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:47:48Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/3ab026589d089ae2196127f6ec9910bd9c43283dd7b5efcc68fe501a6114c1ed/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:47:48.839498 env[1565]: time="2023-10-02T19:47:48.839439437Z" level=error msg="copy shim log" error="read /proc/self/fd/38: file already closed" Oct 2 19:47:48.839748 env[1565]: time="2023-10-02T19:47:48.839712239Z" level=error msg="Failed to pipe stderr of container \"3ab026589d089ae2196127f6ec9910bd9c43283dd7b5efcc68fe501a6114c1ed\"" error="reading from a closed fifo" Oct 2 19:47:48.843032 env[1565]: time="2023-10-02T19:47:48.842973336Z" level=error msg="Failed to pipe stdout of container \"3ab026589d089ae2196127f6ec9910bd9c43283dd7b5efcc68fe501a6114c1ed\"" error="reading from a closed fifo" Oct 2 19:47:48.844953 env[1565]: time="2023-10-02T19:47:48.844870432Z" level=error msg="StartContainer for \"3ab026589d089ae2196127f6ec9910bd9c43283dd7b5efcc68fe501a6114c1ed\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:47:48.845260 kubelet[2670]: E1002 19:47:48.845235 2670 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="3ab026589d089ae2196127f6ec9910bd9c43283dd7b5efcc68fe501a6114c1ed" Oct 2 19:47:48.847186 kubelet[2670]: E1002 19:47:48.845853 2670 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:47:48.847186 kubelet[2670]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:47:48.847186 kubelet[2670]: rm /hostbin/cilium-mount Oct 2 19:47:48.847186 kubelet[2670]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-mr6r9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-gxmh6_kube-system(d9eec7ba-6773-4622-98ec-6495c5e95fcd): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:47:48.847186 kubelet[2670]: E1002 19:47:48.845930 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-gxmh6" podUID="d9eec7ba-6773-4622-98ec-6495c5e95fcd" Oct 2 19:47:49.585024 kubelet[2670]: I1002 19:47:49.584991 2670 scope.go:117] "RemoveContainer" containerID="27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186" Oct 2 19:47:49.585580 kubelet[2670]: I1002 19:47:49.585558 2670 scope.go:117] "RemoveContainer" containerID="27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186" Oct 2 19:47:49.586899 env[1565]: time="2023-10-02T19:47:49.586858991Z" level=info msg="RemoveContainer for \"27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186\"" Oct 2 19:47:49.587570 env[1565]: time="2023-10-02T19:47:49.587541579Z" level=info msg="RemoveContainer for \"27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186\"" Oct 2 19:47:49.587763 env[1565]: time="2023-10-02T19:47:49.587729794Z" level=error msg="RemoveContainer for \"27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186\" failed" error="failed to set removing state for container \"27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186\": container is already in removing state" Oct 2 19:47:49.588006 kubelet[2670]: E1002 19:47:49.587988 2670 remote_runtime.go:385] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186\": container is already in removing state" containerID="27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186" Oct 2 19:47:49.588106 kubelet[2670]: E1002 19:47:49.588027 2670 kuberuntime_container.go:820] failed to remove pod init container "mount-cgroup": rpc error: code = Unknown desc = failed to set removing state for container "27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186": container is already in removing state; Skipping pod "cilium-gxmh6_kube-system(d9eec7ba-6773-4622-98ec-6495c5e95fcd)" Oct 2 19:47:49.588407 kubelet[2670]: E1002 19:47:49.588384 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 40s restarting failed container=mount-cgroup pod=cilium-gxmh6_kube-system(d9eec7ba-6773-4622-98ec-6495c5e95fcd)\"" pod="kube-system/cilium-gxmh6" podUID="d9eec7ba-6773-4622-98ec-6495c5e95fcd" Oct 2 19:47:49.592872 env[1565]: time="2023-10-02T19:47:49.592804979Z" level=info msg="RemoveContainer for \"27c1cd54d4a8ab344707aa1bc39f9e422ed7f77106c4375fe8fc448fcc084186\" returns successfully" Oct 2 19:47:49.737007 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3ab026589d089ae2196127f6ec9910bd9c43283dd7b5efcc68fe501a6114c1ed-rootfs.mount: Deactivated successfully. Oct 2 19:47:51.931405 kubelet[2670]: W1002 19:47:51.931362 2670 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-podd9eec7ba_6773_4622_98ec_6495c5e95fcd.slice/cri-containerd-3ab026589d089ae2196127f6ec9910bd9c43283dd7b5efcc68fe501a6114c1ed.scope WatchSource:0}: task 3ab026589d089ae2196127f6ec9910bd9c43283dd7b5efcc68fe501a6114c1ed not found: not found Oct 2 19:47:52.015019 kubelet[2670]: E1002 19:47:52.014993 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:47:57.018644 kubelet[2670]: E1002 19:47:57.018596 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:48:01.711905 kubelet[2670]: E1002 19:48:01.711856 2670 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 40s restarting failed container=mount-cgroup pod=cilium-gxmh6_kube-system(d9eec7ba-6773-4622-98ec-6495c5e95fcd)\"" pod="kube-system/cilium-gxmh6" podUID="d9eec7ba-6773-4622-98ec-6495c5e95fcd" Oct 2 19:48:02.021148 kubelet[2670]: E1002 19:48:02.021107 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:48:07.022454 kubelet[2670]: E1002 19:48:07.022422 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:48:07.529000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:07.533992 kernel: kauditd_printk_skb: 59 callbacks suppressed Oct 2 19:48:07.534214 kernel: audit: type=1400 audit(1696276087.529:1392): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:07.529000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028efa00 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:48:07.558739 kernel: audit: type=1300 audit(1696276087.529:1392): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028efa00 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:48:07.558891 kernel: audit: type=1327 audit(1696276087.529:1392): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:48:07.529000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:48:07.539000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:07.574456 kernel: audit: type=1400 audit(1696276087.539:1393): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:07.574602 kernel: audit: type=1300 audit(1696276087.539:1393): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021ab0e0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:48:07.539000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021ab0e0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:48:07.539000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:48:07.590284 kernel: audit: type=1327 audit(1696276087.539:1393): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:48:08.079000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:08.079000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:08.108114 kernel: audit: type=1400 audit(1696276088.079:1394): avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:08.108462 kernel: audit: type=1400 audit(1696276088.079:1395): avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:08.108510 kernel: audit: type=1300 audit(1696276088.079:1394): arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c00fb5a9e0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:48:08.079000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c00fb5a9e0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:48:08.079000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:48:08.123750 kernel: audit: type=1327 audit(1696276088.079:1394): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:48:08.079000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:08.079000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c00fc06330 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:48:08.079000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:48:08.079000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c00fa39950 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:48:08.079000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:48:08.095000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:08.095000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c00fc064b0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:48:08.095000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:48:08.215000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:08.215000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c00fa39ce0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:48:08.215000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:48:08.215000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:08.215000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c00fb5aca0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:48:08.215000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:48:12.023260 kubelet[2670]: E1002 19:48:12.023191 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:48:12.686000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:12.688760 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 2 19:48:12.688922 kernel: audit: type=1400 audit(1696276092.686:1401): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:12.686000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:12.703106 kernel: audit: type=1400 audit(1696276092.686:1400): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:12.703253 kernel: audit: type=1300 audit(1696276092.686:1401): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00233e780 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:48:12.686000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00233e780 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:48:12.686000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:48:12.687000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:12.726859 kernel: audit: type=1327 audit(1696276092.686:1401): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:48:12.727197 kernel: audit: type=1400 audit(1696276092.687:1402): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:12.727249 kernel: audit: type=1300 audit(1696276092.687:1402): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00233e7a0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:48:12.687000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00233e7a0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:48:12.687000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:48:12.748608 kernel: audit: type=1327 audit(1696276092.687:1402): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:48:12.748767 kernel: audit: type=1400 audit(1696276092.690:1403): avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:12.690000 audit[2448]: AVC avc: denied { watch } for pid=2448 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:12.762964 kernel: audit: type=1300 audit(1696276092.690:1403): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00233ebc0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:48:12.690000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00233ebc0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:48:12.690000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:48:12.786165 kernel: audit: type=1327 audit(1696276092.690:1403): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:48:12.686000 audit[2448]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0028efda0 a2=fc6 a3=0 items=0 ppid=2321 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:48:12.686000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:48:14.552715 env[1565]: time="2023-10-02T19:48:14.552661187Z" level=info msg="StopPodSandbox for \"f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163\"" Oct 2 19:48:14.563301 env[1565]: time="2023-10-02T19:48:14.552763465Z" level=info msg="Container to stop \"3ab026589d089ae2196127f6ec9910bd9c43283dd7b5efcc68fe501a6114c1ed\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Oct 2 19:48:14.561155 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163-shm.mount: Deactivated successfully. Oct 2 19:48:14.580000 audit: BPF prog-id=131 op=UNLOAD Oct 2 19:48:14.581066 systemd[1]: cri-containerd-f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163.scope: Deactivated successfully. Oct 2 19:48:14.583000 audit: BPF prog-id=134 op=UNLOAD Oct 2 19:48:14.631568 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163-rootfs.mount: Deactivated successfully. Oct 2 19:48:14.655597 env[1565]: time="2023-10-02T19:48:14.655505478Z" level=info msg="shim disconnected" id=f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163 Oct 2 19:48:14.656509 env[1565]: time="2023-10-02T19:48:14.656422136Z" level=warning msg="cleaning up after shim disconnected" id=f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163 namespace=k8s.io Oct 2 19:48:14.656678 env[1565]: time="2023-10-02T19:48:14.656663952Z" level=info msg="cleaning up dead shim" Oct 2 19:48:14.690434 env[1565]: time="2023-10-02T19:48:14.690335971Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:48:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3925 runtime=io.containerd.runc.v2\n" Oct 2 19:48:14.690727 env[1565]: time="2023-10-02T19:48:14.690687235Z" level=info msg="TearDown network for sandbox \"f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163\" successfully" Oct 2 19:48:14.690727 env[1565]: time="2023-10-02T19:48:14.690721937Z" level=info msg="StopPodSandbox for \"f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163\" returns successfully" Oct 2 19:48:14.702996 sshd[3692]: pam_unix(sshd:session): session closed for user core Oct 2 19:48:14.705000 audit[3692]: USER_END pid=3692 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:48:14.705000 audit[3692]: CRED_DISP pid=3692 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:48:14.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-172.31.21.168:22-139.178.89.65:49618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:48:14.709065 systemd[1]: sshd@30-172.31.21.168:22-139.178.89.65:49618.service: Deactivated successfully. Oct 2 19:48:14.710130 systemd[1]: session-30.scope: Deactivated successfully. Oct 2 19:48:14.710489 systemd[1]: session-30.scope: Consumed 1.133s CPU time. Oct 2 19:48:14.712183 systemd-logind[1555]: Session 30 logged out. Waiting for processes to exit. Oct 2 19:48:14.713656 systemd-logind[1555]: Removed session 30. Oct 2 19:48:14.849591 kubelet[2670]: I1002 19:48:14.849078 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-mr6r9\" (UniqueName: \"kubernetes.io/projected/d9eec7ba-6773-4622-98ec-6495c5e95fcd-kube-api-access-mr6r9\") pod \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " Oct 2 19:48:14.849591 kubelet[2670]: I1002 19:48:14.849179 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-run\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-cilium-run\") pod \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " Oct 2 19:48:14.849591 kubelet[2670]: I1002 19:48:14.849204 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"etc-cni-netd\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-etc-cni-netd\") pod \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " Oct 2 19:48:14.849591 kubelet[2670]: I1002 19:48:14.849563 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"clustermesh-secrets\" (UniqueName: \"kubernetes.io/secret/d9eec7ba-6773-4622-98ec-6495c5e95fcd-clustermesh-secrets\") pod \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " Oct 2 19:48:14.851184 kubelet[2670]: I1002 19:48:14.849602 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-lib-modules\") pod \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " Oct 2 19:48:14.851184 kubelet[2670]: I1002 19:48:14.849625 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"hostproc\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-hostproc\") pod \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " Oct 2 19:48:14.851184 kubelet[2670]: I1002 19:48:14.849847 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-ipsec-secrets\" (UniqueName: \"kubernetes.io/secret/d9eec7ba-6773-4622-98ec-6495c5e95fcd-cilium-ipsec-secrets\") pod \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " Oct 2 19:48:14.851184 kubelet[2670]: I1002 19:48:14.849975 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-xtables-lock\") pod \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " Oct 2 19:48:14.851184 kubelet[2670]: I1002 19:48:14.850005 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"host-proc-sys-kernel\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-host-proc-sys-kernel\") pod \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " Oct 2 19:48:14.851184 kubelet[2670]: I1002 19:48:14.850065 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-cgroup\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-cilium-cgroup\") pod \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " Oct 2 19:48:14.851184 kubelet[2670]: I1002 19:48:14.850095 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-path\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-cni-path\") pod \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " Oct 2 19:48:14.851184 kubelet[2670]: I1002 19:48:14.850345 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/d9eec7ba-6773-4622-98ec-6495c5e95fcd-cilium-config-path\") pod \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " Oct 2 19:48:14.851184 kubelet[2670]: I1002 19:48:14.850404 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"host-proc-sys-net\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-host-proc-sys-net\") pod \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " Oct 2 19:48:14.851184 kubelet[2670]: I1002 19:48:14.850433 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"bpf-maps\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-bpf-maps\") pod \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " Oct 2 19:48:14.851184 kubelet[2670]: I1002 19:48:14.850489 2670 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"hubble-tls\" (UniqueName: \"kubernetes.io/projected/d9eec7ba-6773-4622-98ec-6495c5e95fcd-hubble-tls\") pod \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\" (UID: \"d9eec7ba-6773-4622-98ec-6495c5e95fcd\") " Oct 2 19:48:14.851963 kubelet[2670]: I1002 19:48:14.851869 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-cilium-run" (OuterVolumeSpecName: "cilium-run") pod "d9eec7ba-6773-4622-98ec-6495c5e95fcd" (UID: "d9eec7ba-6773-4622-98ec-6495c5e95fcd"). InnerVolumeSpecName "cilium-run". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:48:14.851963 kubelet[2670]: I1002 19:48:14.851933 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-etc-cni-netd" (OuterVolumeSpecName: "etc-cni-netd") pod "d9eec7ba-6773-4622-98ec-6495c5e95fcd" (UID: "d9eec7ba-6773-4622-98ec-6495c5e95fcd"). InnerVolumeSpecName "etc-cni-netd". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:48:14.852178 kubelet[2670]: I1002 19:48:14.852146 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "d9eec7ba-6773-4622-98ec-6495c5e95fcd" (UID: "d9eec7ba-6773-4622-98ec-6495c5e95fcd"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:48:14.852256 kubelet[2670]: I1002 19:48:14.852183 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-hostproc" (OuterVolumeSpecName: "hostproc") pod "d9eec7ba-6773-4622-98ec-6495c5e95fcd" (UID: "d9eec7ba-6773-4622-98ec-6495c5e95fcd"). InnerVolumeSpecName "hostproc". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:48:14.852256 kubelet[2670]: I1002 19:48:14.852209 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-cni-path" (OuterVolumeSpecName: "cni-path") pod "d9eec7ba-6773-4622-98ec-6495c5e95fcd" (UID: "d9eec7ba-6773-4622-98ec-6495c5e95fcd"). InnerVolumeSpecName "cni-path". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:48:14.852256 kubelet[2670]: I1002 19:48:14.852231 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "d9eec7ba-6773-4622-98ec-6495c5e95fcd" (UID: "d9eec7ba-6773-4622-98ec-6495c5e95fcd"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:48:14.852256 kubelet[2670]: I1002 19:48:14.852251 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-host-proc-sys-kernel" (OuterVolumeSpecName: "host-proc-sys-kernel") pod "d9eec7ba-6773-4622-98ec-6495c5e95fcd" (UID: "d9eec7ba-6773-4622-98ec-6495c5e95fcd"). InnerVolumeSpecName "host-proc-sys-kernel". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:48:14.852567 kubelet[2670]: I1002 19:48:14.852273 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-cilium-cgroup" (OuterVolumeSpecName: "cilium-cgroup") pod "d9eec7ba-6773-4622-98ec-6495c5e95fcd" (UID: "d9eec7ba-6773-4622-98ec-6495c5e95fcd"). InnerVolumeSpecName "cilium-cgroup". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:48:14.852567 kubelet[2670]: I1002 19:48:14.852297 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-host-proc-sys-net" (OuterVolumeSpecName: "host-proc-sys-net") pod "d9eec7ba-6773-4622-98ec-6495c5e95fcd" (UID: "d9eec7ba-6773-4622-98ec-6495c5e95fcd"). InnerVolumeSpecName "host-proc-sys-net". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:48:14.856500 kubelet[2670]: I1002 19:48:14.856463 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-bpf-maps" (OuterVolumeSpecName: "bpf-maps") pod "d9eec7ba-6773-4622-98ec-6495c5e95fcd" (UID: "d9eec7ba-6773-4622-98ec-6495c5e95fcd"). InnerVolumeSpecName "bpf-maps". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:48:14.876163 kubelet[2670]: I1002 19:48:14.864434 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/d9eec7ba-6773-4622-98ec-6495c5e95fcd-cilium-config-path" (OuterVolumeSpecName: "cilium-config-path") pod "d9eec7ba-6773-4622-98ec-6495c5e95fcd" (UID: "d9eec7ba-6773-4622-98ec-6495c5e95fcd"). InnerVolumeSpecName "cilium-config-path". PluginName "kubernetes.io/configmap", VolumeGidValue "" Oct 2 19:48:14.878825 systemd[1]: var-lib-kubelet-pods-d9eec7ba\x2d6773\x2d4622\x2d98ec\x2d6495c5e95fcd-volumes-kubernetes.io\x7eprojected-hubble\x2dtls.mount: Deactivated successfully. Oct 2 19:48:14.881895 kubelet[2670]: I1002 19:48:14.881859 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/d9eec7ba-6773-4622-98ec-6495c5e95fcd-clustermesh-secrets" (OuterVolumeSpecName: "clustermesh-secrets") pod "d9eec7ba-6773-4622-98ec-6495c5e95fcd" (UID: "d9eec7ba-6773-4622-98ec-6495c5e95fcd"). InnerVolumeSpecName "clustermesh-secrets". PluginName "kubernetes.io/secret", VolumeGidValue "" Oct 2 19:48:14.885657 systemd[1]: var-lib-kubelet-pods-d9eec7ba\x2d6773\x2d4622\x2d98ec\x2d6495c5e95fcd-volumes-kubernetes.io\x7esecret-clustermesh\x2dsecrets.mount: Deactivated successfully. Oct 2 19:48:14.888284 kubelet[2670]: I1002 19:48:14.888242 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/d9eec7ba-6773-4622-98ec-6495c5e95fcd-hubble-tls" (OuterVolumeSpecName: "hubble-tls") pod "d9eec7ba-6773-4622-98ec-6495c5e95fcd" (UID: "d9eec7ba-6773-4622-98ec-6495c5e95fcd"). InnerVolumeSpecName "hubble-tls". PluginName "kubernetes.io/projected", VolumeGidValue "" Oct 2 19:48:14.891659 kubelet[2670]: I1002 19:48:14.891626 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/d9eec7ba-6773-4622-98ec-6495c5e95fcd-kube-api-access-mr6r9" (OuterVolumeSpecName: "kube-api-access-mr6r9") pod "d9eec7ba-6773-4622-98ec-6495c5e95fcd" (UID: "d9eec7ba-6773-4622-98ec-6495c5e95fcd"). InnerVolumeSpecName "kube-api-access-mr6r9". PluginName "kubernetes.io/projected", VolumeGidValue "" Oct 2 19:48:14.892979 systemd[1]: var-lib-kubelet-pods-d9eec7ba\x2d6773\x2d4622\x2d98ec\x2d6495c5e95fcd-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dmr6r9.mount: Deactivated successfully. Oct 2 19:48:14.893490 systemd[1]: var-lib-kubelet-pods-d9eec7ba\x2d6773\x2d4622\x2d98ec\x2d6495c5e95fcd-volumes-kubernetes.io\x7esecret-cilium\x2dipsec\x2dsecrets.mount: Deactivated successfully. Oct 2 19:48:14.895831 kubelet[2670]: I1002 19:48:14.895799 2670 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/d9eec7ba-6773-4622-98ec-6495c5e95fcd-cilium-ipsec-secrets" (OuterVolumeSpecName: "cilium-ipsec-secrets") pod "d9eec7ba-6773-4622-98ec-6495c5e95fcd" (UID: "d9eec7ba-6773-4622-98ec-6495c5e95fcd"). InnerVolumeSpecName "cilium-ipsec-secrets". PluginName "kubernetes.io/secret", VolumeGidValue "" Oct 2 19:48:14.951291 kubelet[2670]: I1002 19:48:14.951250 2670 reconciler_common.go:300] "Volume detached for volume \"cni-path\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-cni-path\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:48:14.951492 kubelet[2670]: I1002 19:48:14.951369 2670 reconciler_common.go:300] "Volume detached for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/d9eec7ba-6773-4622-98ec-6495c5e95fcd-cilium-config-path\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:48:14.951492 kubelet[2670]: I1002 19:48:14.951391 2670 reconciler_common.go:300] "Volume detached for volume \"hubble-tls\" (UniqueName: \"kubernetes.io/projected/d9eec7ba-6773-4622-98ec-6495c5e95fcd-hubble-tls\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:48:14.951492 kubelet[2670]: I1002 19:48:14.951404 2670 reconciler_common.go:300] "Volume detached for volume \"host-proc-sys-net\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-host-proc-sys-net\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:48:14.951492 kubelet[2670]: I1002 19:48:14.951417 2670 reconciler_common.go:300] "Volume detached for volume \"bpf-maps\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-bpf-maps\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:48:14.951492 kubelet[2670]: I1002 19:48:14.951445 2670 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-mr6r9\" (UniqueName: \"kubernetes.io/projected/d9eec7ba-6773-4622-98ec-6495c5e95fcd-kube-api-access-mr6r9\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:48:14.951492 kubelet[2670]: I1002 19:48:14.951459 2670 reconciler_common.go:300] "Volume detached for volume \"etc-cni-netd\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-etc-cni-netd\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:48:14.951492 kubelet[2670]: I1002 19:48:14.951476 2670 reconciler_common.go:300] "Volume detached for volume \"clustermesh-secrets\" (UniqueName: \"kubernetes.io/secret/d9eec7ba-6773-4622-98ec-6495c5e95fcd-clustermesh-secrets\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:48:14.951492 kubelet[2670]: I1002 19:48:14.951491 2670 reconciler_common.go:300] "Volume detached for volume \"cilium-run\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-cilium-run\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:48:14.951807 kubelet[2670]: I1002 19:48:14.951505 2670 reconciler_common.go:300] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-lib-modules\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:48:14.951807 kubelet[2670]: I1002 19:48:14.951518 2670 reconciler_common.go:300] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-xtables-lock\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:48:14.951807 kubelet[2670]: I1002 19:48:14.951534 2670 reconciler_common.go:300] "Volume detached for volume \"host-proc-sys-kernel\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-host-proc-sys-kernel\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:48:14.951807 kubelet[2670]: I1002 19:48:14.951548 2670 reconciler_common.go:300] "Volume detached for volume \"cilium-cgroup\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-cilium-cgroup\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:48:14.951807 kubelet[2670]: I1002 19:48:14.951563 2670 reconciler_common.go:300] "Volume detached for volume \"hostproc\" (UniqueName: \"kubernetes.io/host-path/d9eec7ba-6773-4622-98ec-6495c5e95fcd-hostproc\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:48:14.951807 kubelet[2670]: I1002 19:48:14.951576 2670 reconciler_common.go:300] "Volume detached for volume \"cilium-ipsec-secrets\" (UniqueName: \"kubernetes.io/secret/d9eec7ba-6773-4622-98ec-6495c5e95fcd-cilium-ipsec-secrets\") on node \"ip-172-31-21-168\" DevicePath \"\"" Oct 2 19:48:15.660419 kubelet[2670]: I1002 19:48:15.660382 2670 scope.go:117] "RemoveContainer" containerID="3ab026589d089ae2196127f6ec9910bd9c43283dd7b5efcc68fe501a6114c1ed" Oct 2 19:48:15.670117 env[1565]: time="2023-10-02T19:48:15.668405950Z" level=info msg="RemoveContainer for \"3ab026589d089ae2196127f6ec9910bd9c43283dd7b5efcc68fe501a6114c1ed\"" Oct 2 19:48:15.673706 env[1565]: time="2023-10-02T19:48:15.673667017Z" level=info msg="RemoveContainer for \"3ab026589d089ae2196127f6ec9910bd9c43283dd7b5efcc68fe501a6114c1ed\" returns successfully" Oct 2 19:48:15.674483 systemd[1]: Removed slice kubepods-burstable-podd9eec7ba_6773_4622_98ec_6495c5e95fcd.slice. Oct 2 19:48:17.027175 kubelet[2670]: E1002 19:48:17.026997 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:48:17.714937 kubelet[2670]: I1002 19:48:17.714801 2670 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="d9eec7ba-6773-4622-98ec-6495c5e95fcd" path="/var/lib/kubelet/pods/d9eec7ba-6773-4622-98ec-6495c5e95fcd/volumes" Oct 2 19:48:22.031791 kubelet[2670]: E1002 19:48:22.031757 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:48:27.032866 kubelet[2670]: E1002 19:48:27.032820 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:48:32.037159 kubelet[2670]: E1002 19:48:32.037124 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:48:37.039352 kubelet[2670]: E1002 19:48:37.039314 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:48:42.040820 kubelet[2670]: E1002 19:48:42.040766 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:48:47.043107 kubelet[2670]: E1002 19:48:47.043074 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:48:52.044084 kubelet[2670]: E1002 19:48:52.044056 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:48:57.045624 kubelet[2670]: E1002 19:48:57.045592 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:49:00.859656 systemd[1]: cri-containerd-2be947a7e139f8331f68170a532f82a114b579e93a5dfea462f101aec64bfe72.scope: Deactivated successfully. Oct 2 19:49:00.859984 systemd[1]: cri-containerd-2be947a7e139f8331f68170a532f82a114b579e93a5dfea462f101aec64bfe72.scope: Consumed 4.669s CPU time. Oct 2 19:49:00.865876 kernel: kauditd_printk_skb: 7 callbacks suppressed Oct 2 19:49:00.866044 kernel: audit: type=1334 audit(1696276140.862:1409): prog-id=86 op=UNLOAD Oct 2 19:49:00.862000 audit: BPF prog-id=86 op=UNLOAD Oct 2 19:49:00.862000 audit: BPF prog-id=107 op=UNLOAD Oct 2 19:49:00.867682 kernel: audit: type=1334 audit(1696276140.862:1410): prog-id=107 op=UNLOAD Oct 2 19:49:00.892930 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2be947a7e139f8331f68170a532f82a114b579e93a5dfea462f101aec64bfe72-rootfs.mount: Deactivated successfully. Oct 2 19:49:00.907493 env[1565]: time="2023-10-02T19:49:00.907438402Z" level=info msg="shim disconnected" id=2be947a7e139f8331f68170a532f82a114b579e93a5dfea462f101aec64bfe72 Oct 2 19:49:00.907493 env[1565]: time="2023-10-02T19:49:00.907491181Z" level=warning msg="cleaning up after shim disconnected" id=2be947a7e139f8331f68170a532f82a114b579e93a5dfea462f101aec64bfe72 namespace=k8s.io Oct 2 19:49:00.908175 env[1565]: time="2023-10-02T19:49:00.907503006Z" level=info msg="cleaning up dead shim" Oct 2 19:49:00.917364 env[1565]: time="2023-10-02T19:49:00.917291601Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:49:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3962 runtime=io.containerd.runc.v2\n" Oct 2 19:49:01.774902 kubelet[2670]: I1002 19:49:01.774867 2670 scope.go:117] "RemoveContainer" containerID="2be947a7e139f8331f68170a532f82a114b579e93a5dfea462f101aec64bfe72" Oct 2 19:49:01.783035 env[1565]: time="2023-10-02T19:49:01.782985234Z" level=info msg="CreateContainer within sandbox \"1f69c220992c0c62a8677bbb8f2879d1353531f5b6dd99ded8a4d6b17d07f3c7\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Oct 2 19:49:01.826759 env[1565]: time="2023-10-02T19:49:01.826711722Z" level=info msg="CreateContainer within sandbox \"1f69c220992c0c62a8677bbb8f2879d1353531f5b6dd99ded8a4d6b17d07f3c7\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"e90ab3da6667480e73273ee07d1a0423e127a5c1f4490fc425ce2501ac5d4d62\"" Oct 2 19:49:01.831125 env[1565]: time="2023-10-02T19:49:01.830932972Z" level=info msg="StartContainer for \"e90ab3da6667480e73273ee07d1a0423e127a5c1f4490fc425ce2501ac5d4d62\"" Oct 2 19:49:01.941535 systemd[1]: Started cri-containerd-e90ab3da6667480e73273ee07d1a0423e127a5c1f4490fc425ce2501ac5d4d62.scope. Oct 2 19:49:02.052454 kernel: audit: type=1400 audit(1696276142.036:1411): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.052673 kernel: audit: type=1400 audit(1696276142.036:1412): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.059768 kubelet[2670]: E1002 19:49:02.053967 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:49:02.059928 kernel: audit: type=1400 audit(1696276142.036:1413): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.076957 kernel: audit: type=1400 audit(1696276142.036:1414): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.077118 kernel: audit: type=1400 audit(1696276142.036:1415): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.077155 kernel: audit: type=1400 audit(1696276142.036:1416): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.077334 kernel: audit: type=1400 audit(1696276142.036:1417): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.089252 kernel: audit: type=1400 audit(1696276142.036:1418): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.037000 audit: BPF prog-id=135 op=LOAD Oct 2 19:49:02.037000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.037000 audit[3983]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2321 pid=3983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:49:02.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539306162336461363636373438306537333237336565303764316130 Oct 2 19:49:02.037000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.037000 audit[3983]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2321 pid=3983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:49:02.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539306162336461363636373438306537333237336565303764316130 Oct 2 19:49:02.037000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.037000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.037000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.037000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.037000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.037000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.037000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.037000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.037000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.037000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.037000 audit: BPF prog-id=136 op=LOAD Oct 2 19:49:02.037000 audit[3983]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000398320 items=0 ppid=2321 pid=3983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:49:02.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539306162336461363636373438306537333237336565303764316130 Oct 2 19:49:02.058000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.058000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.058000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.058000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.058000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.058000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.058000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.058000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.058000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.058000 audit: BPF prog-id=137 op=LOAD Oct 2 19:49:02.058000 audit[3983]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000398368 items=0 ppid=2321 pid=3983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:49:02.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539306162336461363636373438306537333237336565303764316130 Oct 2 19:49:02.058000 audit: BPF prog-id=137 op=UNLOAD Oct 2 19:49:02.058000 audit: BPF prog-id=136 op=UNLOAD Oct 2 19:49:02.058000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.058000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.058000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.058000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.058000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.058000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.058000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.058000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.058000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.058000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:02.058000 audit: BPF prog-id=138 op=LOAD Oct 2 19:49:02.058000 audit[3983]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000398778 items=0 ppid=2321 pid=3983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:49:02.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539306162336461363636373438306537333237336565303764316130 Oct 2 19:49:02.165405 env[1565]: time="2023-10-02T19:49:02.165355414Z" level=info msg="StartContainer for \"e90ab3da6667480e73273ee07d1a0423e127a5c1f4490fc425ce2501ac5d4d62\" returns successfully" Oct 2 19:49:03.941000 audit[3994]: AVC avc: denied { watch } for pid=3994 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:03.941000 audit[3994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a601b0 a2=fc6 a3=0 items=0 ppid=2321 pid=3994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:49:03.941000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:49:03.944000 audit[3994]: AVC avc: denied { watch } for pid=3994 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:03.944000 audit[3994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000251e40 a2=fc6 a3=0 items=0 ppid=2321 pid=3994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c628,c757 key=(null) Oct 2 19:49:03.944000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:49:05.336534 systemd[1]: cri-containerd-481cf3e4956d754320c4cd01dec0bd7fd59d37b826a89a80aa3219b50450da4b.scope: Deactivated successfully. Oct 2 19:49:05.337036 systemd[1]: cri-containerd-481cf3e4956d754320c4cd01dec0bd7fd59d37b826a89a80aa3219b50450da4b.scope: Consumed 1.459s CPU time. Oct 2 19:49:05.341000 audit: BPF prog-id=90 op=UNLOAD Oct 2 19:49:05.341000 audit: BPF prog-id=108 op=UNLOAD Oct 2 19:49:05.392665 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-481cf3e4956d754320c4cd01dec0bd7fd59d37b826a89a80aa3219b50450da4b-rootfs.mount: Deactivated successfully. Oct 2 19:49:05.433675 env[1565]: time="2023-10-02T19:49:05.433612773Z" level=info msg="shim disconnected" id=481cf3e4956d754320c4cd01dec0bd7fd59d37b826a89a80aa3219b50450da4b Oct 2 19:49:05.433675 env[1565]: time="2023-10-02T19:49:05.433664032Z" level=warning msg="cleaning up after shim disconnected" id=481cf3e4956d754320c4cd01dec0bd7fd59d37b826a89a80aa3219b50450da4b namespace=k8s.io Oct 2 19:49:05.433675 env[1565]: time="2023-10-02T19:49:05.433677196Z" level=info msg="cleaning up dead shim" Oct 2 19:49:05.449743 env[1565]: time="2023-10-02T19:49:05.449698980Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:49:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4024 runtime=io.containerd.runc.v2\n" Oct 2 19:49:05.790516 kubelet[2670]: I1002 19:49:05.790419 2670 scope.go:117] "RemoveContainer" containerID="481cf3e4956d754320c4cd01dec0bd7fd59d37b826a89a80aa3219b50450da4b" Oct 2 19:49:05.799293 env[1565]: time="2023-10-02T19:49:05.799157535Z" level=info msg="CreateContainer within sandbox \"8f3e7e327cc02af4cdeaace2fb406aa70e449a1cc3fff21d09405b37725002f7\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Oct 2 19:49:05.820916 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2318200958.mount: Deactivated successfully. Oct 2 19:49:05.848894 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount757914366.mount: Deactivated successfully. Oct 2 19:49:05.854177 env[1565]: time="2023-10-02T19:49:05.854125389Z" level=info msg="CreateContainer within sandbox \"8f3e7e327cc02af4cdeaace2fb406aa70e449a1cc3fff21d09405b37725002f7\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"5e6ff5c28248307f32b9f8697220fbfb05b0039ca097d75190bb1b1eecfd6d17\"" Oct 2 19:49:05.855316 env[1565]: time="2023-10-02T19:49:05.855049663Z" level=info msg="StartContainer for \"5e6ff5c28248307f32b9f8697220fbfb05b0039ca097d75190bb1b1eecfd6d17\"" Oct 2 19:49:05.889778 systemd[1]: Started cri-containerd-5e6ff5c28248307f32b9f8697220fbfb05b0039ca097d75190bb1b1eecfd6d17.scope. Oct 2 19:49:05.928648 kernel: kauditd_printk_skb: 57 callbacks suppressed Oct 2 19:49:05.928861 kernel: audit: type=1400 audit(1696276145.914:1433): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.928943 kernel: audit: type=1400 audit(1696276145.914:1434): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.942336 kernel: audit: type=1400 audit(1696276145.914:1435): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.949687 kernel: audit: type=1400 audit(1696276145.914:1436): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.949852 kernel: audit: type=1400 audit(1696276145.914:1437): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.949885 kernel: audit: type=1400 audit(1696276145.914:1438): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.964615 kernel: audit: type=1400 audit(1696276145.914:1439): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.964801 kernel: audit: type=1400 audit(1696276145.914:1440): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.978472 kernel: audit: type=1400 audit(1696276145.914:1441): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.978785 kernel: audit: type=1400 audit(1696276145.914:1442): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.914000 audit: BPF prog-id=139 op=LOAD Oct 2 19:49:05.915000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.915000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2288 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:49:05.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366666356332383234383330376633326239663836393732323066 Oct 2 19:49:05.915000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.915000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2288 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:49:05.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366666356332383234383330376633326239663836393732323066 Oct 2 19:49:05.915000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.915000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.915000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.915000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.915000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.915000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.915000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.915000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.915000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.915000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.915000 audit: BPF prog-id=140 op=LOAD Oct 2 19:49:05.915000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024cd0 items=0 ppid=2288 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:49:05.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366666356332383234383330376633326239663836393732323066 Oct 2 19:49:05.916000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.916000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.916000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.916000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.916000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.916000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.916000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.916000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.916000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.916000 audit: BPF prog-id=141 op=LOAD Oct 2 19:49:05.916000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024d18 items=0 ppid=2288 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:49:05.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366666356332383234383330376633326239663836393732323066 Oct 2 19:49:05.927000 audit: BPF prog-id=141 op=UNLOAD Oct 2 19:49:05.927000 audit: BPF prog-id=140 op=UNLOAD Oct 2 19:49:05.927000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.927000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.927000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.927000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.927000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.927000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.927000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.927000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.927000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.927000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:49:05.927000 audit: BPF prog-id=142 op=LOAD Oct 2 19:49:05.927000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025128 items=0 ppid=2288 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:49:05.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366666356332383234383330376633326239663836393732323066 Oct 2 19:49:06.024701 env[1565]: time="2023-10-02T19:49:06.024644930Z" level=info msg="StartContainer for \"5e6ff5c28248307f32b9f8697220fbfb05b0039ca097d75190bb1b1eecfd6d17\" returns successfully" Oct 2 19:49:07.054921 kubelet[2670]: E1002 19:49:07.054843 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:49:08.079000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:08.079000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:08.079000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c006c22330 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:49:08.079000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:49:08.079000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c00aae2bc0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:49:08.079000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:49:08.085000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:08.085000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c006803ad0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:49:08.085000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:49:08.096000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:08.096000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c006803bf0 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:49:08.096000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:49:08.216000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:08.216000 audit[2413]: AVC avc: denied { watch } for pid=2413 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:08.216000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c006c22480 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:49:08.216000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:49:08.216000 audit[2413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c00aae2d20 a2=fc6 a3=0 items=0 ppid=2268 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c197,c412 key=(null) Oct 2 19:49:08.216000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313638002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:49:08.565321 kubelet[2670]: E1002 19:49:08.565260 2670 controller.go:193] "Failed to update lease" err="Put \"https://172.31.21.168:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-168?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 19:49:11.748489 env[1565]: time="2023-10-02T19:49:11.748429053Z" level=info msg="StopPodSandbox for \"f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163\"" Oct 2 19:49:11.748945 env[1565]: time="2023-10-02T19:49:11.748566323Z" level=info msg="TearDown network for sandbox \"f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163\" successfully" Oct 2 19:49:11.748945 env[1565]: time="2023-10-02T19:49:11.748633112Z" level=info msg="StopPodSandbox for \"f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163\" returns successfully" Oct 2 19:49:11.749250 env[1565]: time="2023-10-02T19:49:11.749079221Z" level=info msg="RemovePodSandbox for \"f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163\"" Oct 2 19:49:11.749341 env[1565]: time="2023-10-02T19:49:11.749130094Z" level=info msg="Forcibly stopping sandbox \"f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163\"" Oct 2 19:49:11.749389 env[1565]: time="2023-10-02T19:49:11.749338950Z" level=info msg="TearDown network for sandbox \"f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163\" successfully" Oct 2 19:49:11.753543 env[1565]: time="2023-10-02T19:49:11.753498817Z" level=info msg="RemovePodSandbox \"f06ee379bc4a4e705ff3a300a0c4f5423a3f36ee0822a193e2baf28abc5cb163\" returns successfully" Oct 2 19:49:12.056124 kubelet[2670]: E1002 19:49:12.056039 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:49:17.057235 kubelet[2670]: E1002 19:49:17.057190 2670 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:49:18.566122 kubelet[2670]: E1002 19:49:18.566082 2670 controller.go:193] "Failed to update lease" err="Put \"https://172.31.21.168:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-168?timeout=10s\": context deadline exceeded"