Oct 2 19:24:58.173679 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Oct 2 19:24:58.173715 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Oct 2 17:55:37 -00 2023 Oct 2 19:24:58.173738 kernel: efi: EFI v2.70 by EDK II Oct 2 19:24:58.173753 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7ac1aa98 MEMRESERVE=0x71accf98 Oct 2 19:24:58.173767 kernel: ACPI: Early table checksum verification disabled Oct 2 19:24:58.173780 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Oct 2 19:24:58.173796 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Oct 2 19:24:58.173810 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Oct 2 19:24:58.173824 kernel: ACPI: DSDT 0x0000000078640000 00154F (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Oct 2 19:24:58.173838 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Oct 2 19:24:58.173856 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Oct 2 19:24:58.173869 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Oct 2 19:24:58.173883 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Oct 2 19:24:58.173897 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Oct 2 19:24:58.173913 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Oct 2 19:24:58.173932 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Oct 2 19:24:58.173947 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Oct 2 19:24:58.173961 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Oct 2 19:24:58.173975 kernel: printk: bootconsole [uart0] enabled Oct 2 19:24:58.173990 kernel: NUMA: Failed to initialise from firmware Oct 2 19:24:58.174004 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Oct 2 19:24:58.174019 kernel: NUMA: NODE_DATA [mem 0x4b5841900-0x4b5846fff] Oct 2 19:24:58.174033 kernel: Zone ranges: Oct 2 19:24:58.174048 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Oct 2 19:24:58.174062 kernel: DMA32 empty Oct 2 19:24:58.174076 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Oct 2 19:24:58.174094 kernel: Movable zone start for each node Oct 2 19:24:58.174109 kernel: Early memory node ranges Oct 2 19:24:58.174123 kernel: node 0: [mem 0x0000000040000000-0x00000000786effff] Oct 2 19:24:58.174138 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Oct 2 19:24:58.174152 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Oct 2 19:24:58.174166 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Oct 2 19:24:58.174181 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Oct 2 19:24:58.174195 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Oct 2 19:24:58.174210 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Oct 2 19:24:58.174224 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Oct 2 19:24:58.174238 kernel: psci: probing for conduit method from ACPI. Oct 2 19:24:58.174252 kernel: psci: PSCIv1.0 detected in firmware. Oct 2 19:24:58.174271 kernel: psci: Using standard PSCI v0.2 function IDs Oct 2 19:24:58.174285 kernel: psci: Trusted OS migration not required Oct 2 19:24:58.174306 kernel: psci: SMC Calling Convention v1.1 Oct 2 19:24:58.174321 kernel: ACPI: SRAT not present Oct 2 19:24:58.174337 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Oct 2 19:24:58.174356 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Oct 2 19:24:58.184420 kernel: pcpu-alloc: [0] 0 [0] 1 Oct 2 19:24:58.184456 kernel: Detected PIPT I-cache on CPU0 Oct 2 19:24:58.184473 kernel: CPU features: detected: GIC system register CPU interface Oct 2 19:24:58.184488 kernel: CPU features: detected: Spectre-v2 Oct 2 19:24:58.184504 kernel: CPU features: detected: Spectre-v3a Oct 2 19:24:58.184519 kernel: CPU features: detected: Spectre-BHB Oct 2 19:24:58.184534 kernel: CPU features: kernel page table isolation forced ON by KASLR Oct 2 19:24:58.184549 kernel: CPU features: detected: Kernel page table isolation (KPTI) Oct 2 19:24:58.184565 kernel: CPU features: detected: ARM erratum 1742098 Oct 2 19:24:58.184580 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Oct 2 19:24:58.184604 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Oct 2 19:24:58.184620 kernel: Policy zone: Normal Oct 2 19:24:58.184637 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca Oct 2 19:24:58.184654 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:24:58.184670 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 2 19:24:58.184685 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 19:24:58.184700 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:24:58.184716 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Oct 2 19:24:58.184733 kernel: Memory: 3826444K/4030464K available (9792K kernel code, 2092K rwdata, 7548K rodata, 34560K init, 779K bss, 204020K reserved, 0K cma-reserved) Oct 2 19:24:58.184749 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 19:24:58.184767 kernel: trace event string verifier disabled Oct 2 19:24:58.184783 kernel: rcu: Preemptible hierarchical RCU implementation. Oct 2 19:24:58.184799 kernel: rcu: RCU event tracing is enabled. Oct 2 19:24:58.184815 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 19:24:58.184830 kernel: Trampoline variant of Tasks RCU enabled. Oct 2 19:24:58.184846 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:24:58.184861 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:24:58.184876 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 19:24:58.184892 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Oct 2 19:24:58.184907 kernel: GICv3: 96 SPIs implemented Oct 2 19:24:58.184922 kernel: GICv3: 0 Extended SPIs implemented Oct 2 19:24:58.184937 kernel: GICv3: Distributor has no Range Selector support Oct 2 19:24:58.184956 kernel: Root IRQ handler: gic_handle_irq Oct 2 19:24:58.184971 kernel: GICv3: 16 PPIs implemented Oct 2 19:24:58.184986 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Oct 2 19:24:58.185000 kernel: ACPI: SRAT not present Oct 2 19:24:58.185015 kernel: ITS [mem 0x10080000-0x1009ffff] Oct 2 19:24:58.185030 kernel: ITS@0x0000000010080000: allocated 8192 Devices @4000a0000 (indirect, esz 8, psz 64K, shr 1) Oct 2 19:24:58.185046 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000b0000 (flat, esz 8, psz 64K, shr 1) Oct 2 19:24:58.185061 kernel: GICv3: using LPI property table @0x00000004000c0000 Oct 2 19:24:58.185076 kernel: ITS: Using hypervisor restricted LPI range [128] Oct 2 19:24:58.185091 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Oct 2 19:24:58.185106 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Oct 2 19:24:58.185125 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Oct 2 19:24:58.185141 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Oct 2 19:24:58.185156 kernel: Console: colour dummy device 80x25 Oct 2 19:24:58.185171 kernel: printk: console [tty1] enabled Oct 2 19:24:58.185187 kernel: ACPI: Core revision 20210730 Oct 2 19:24:58.185203 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Oct 2 19:24:58.185218 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:24:58.185234 kernel: LSM: Security Framework initializing Oct 2 19:24:58.185249 kernel: SELinux: Initializing. Oct 2 19:24:58.185265 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 19:24:58.185285 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 19:24:58.185300 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:24:58.185315 kernel: Platform MSI: ITS@0x10080000 domain created Oct 2 19:24:58.185331 kernel: PCI/MSI: ITS@0x10080000 domain created Oct 2 19:24:58.185346 kernel: Remapping and enabling EFI services. Oct 2 19:24:58.185361 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:24:58.191102 kernel: Detected PIPT I-cache on CPU1 Oct 2 19:24:58.191131 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Oct 2 19:24:58.192471 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Oct 2 19:24:58.192498 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Oct 2 19:24:58.192514 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 19:24:58.192531 kernel: SMP: Total of 2 processors activated. Oct 2 19:24:58.192546 kernel: CPU features: detected: 32-bit EL0 Support Oct 2 19:24:58.192562 kernel: CPU features: detected: 32-bit EL1 Support Oct 2 19:24:58.192577 kernel: CPU features: detected: CRC32 instructions Oct 2 19:24:58.192592 kernel: CPU: All CPU(s) started at EL1 Oct 2 19:24:58.192608 kernel: alternatives: patching kernel code Oct 2 19:24:58.192623 kernel: devtmpfs: initialized Oct 2 19:24:58.192643 kernel: KASLR disabled due to lack of seed Oct 2 19:24:58.192659 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:24:58.192675 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 19:24:58.192701 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:24:58.192721 kernel: SMBIOS 3.0.0 present. Oct 2 19:24:58.192737 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Oct 2 19:24:58.192753 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:24:58.192769 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Oct 2 19:24:58.192785 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Oct 2 19:24:58.192801 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Oct 2 19:24:58.192817 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:24:58.192834 kernel: audit: type=2000 audit(0.249:1): state=initialized audit_enabled=0 res=1 Oct 2 19:24:58.192854 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:24:58.192870 kernel: cpuidle: using governor menu Oct 2 19:24:58.192886 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Oct 2 19:24:58.192902 kernel: ASID allocator initialised with 32768 entries Oct 2 19:24:58.192918 kernel: ACPI: bus type PCI registered Oct 2 19:24:58.192938 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:24:58.192954 kernel: Serial: AMBA PL011 UART driver Oct 2 19:24:58.192970 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:24:58.192986 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Oct 2 19:24:58.193002 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:24:58.193018 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Oct 2 19:24:58.193034 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:24:58.193051 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Oct 2 19:24:58.193067 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:24:58.193086 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:24:58.193103 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:24:58.193119 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:24:58.193134 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:24:58.193150 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:24:58.193166 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:24:58.193183 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 2 19:24:58.193199 kernel: ACPI: Interpreter enabled Oct 2 19:24:58.193215 kernel: ACPI: Using GIC for interrupt routing Oct 2 19:24:58.193234 kernel: ACPI: MCFG table detected, 1 entries Oct 2 19:24:58.193250 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Oct 2 19:24:58.193741 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:24:58.193941 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Oct 2 19:24:58.194132 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Oct 2 19:24:58.194321 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Oct 2 19:24:58.194539 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Oct 2 19:24:58.194569 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Oct 2 19:24:58.194587 kernel: acpiphp: Slot [1] registered Oct 2 19:24:58.194603 kernel: acpiphp: Slot [2] registered Oct 2 19:24:58.194619 kernel: acpiphp: Slot [3] registered Oct 2 19:24:58.194635 kernel: acpiphp: Slot [4] registered Oct 2 19:24:58.194652 kernel: acpiphp: Slot [5] registered Oct 2 19:24:58.194668 kernel: acpiphp: Slot [6] registered Oct 2 19:24:58.194684 kernel: acpiphp: Slot [7] registered Oct 2 19:24:58.194701 kernel: acpiphp: Slot [8] registered Oct 2 19:24:58.194720 kernel: acpiphp: Slot [9] registered Oct 2 19:24:58.194736 kernel: acpiphp: Slot [10] registered Oct 2 19:24:58.194753 kernel: acpiphp: Slot [11] registered Oct 2 19:24:58.194769 kernel: acpiphp: Slot [12] registered Oct 2 19:24:58.194785 kernel: acpiphp: Slot [13] registered Oct 2 19:24:58.194801 kernel: acpiphp: Slot [14] registered Oct 2 19:24:58.194817 kernel: acpiphp: Slot [15] registered Oct 2 19:24:58.194833 kernel: acpiphp: Slot [16] registered Oct 2 19:24:58.194849 kernel: acpiphp: Slot [17] registered Oct 2 19:24:58.194864 kernel: acpiphp: Slot [18] registered Oct 2 19:24:58.194884 kernel: acpiphp: Slot [19] registered Oct 2 19:24:58.194900 kernel: acpiphp: Slot [20] registered Oct 2 19:24:58.194916 kernel: acpiphp: Slot [21] registered Oct 2 19:24:58.194932 kernel: acpiphp: Slot [22] registered Oct 2 19:24:58.194948 kernel: acpiphp: Slot [23] registered Oct 2 19:24:58.194964 kernel: acpiphp: Slot [24] registered Oct 2 19:24:58.194980 kernel: acpiphp: Slot [25] registered Oct 2 19:24:58.194996 kernel: acpiphp: Slot [26] registered Oct 2 19:24:58.195012 kernel: acpiphp: Slot [27] registered Oct 2 19:24:58.195031 kernel: acpiphp: Slot [28] registered Oct 2 19:24:58.195047 kernel: acpiphp: Slot [29] registered Oct 2 19:24:58.195063 kernel: acpiphp: Slot [30] registered Oct 2 19:24:58.195079 kernel: acpiphp: Slot [31] registered Oct 2 19:24:58.195095 kernel: PCI host bridge to bus 0000:00 Oct 2 19:24:58.195284 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Oct 2 19:24:58.195489 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Oct 2 19:24:58.195670 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Oct 2 19:24:58.195846 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Oct 2 19:24:58.196061 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Oct 2 19:24:58.196269 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Oct 2 19:24:58.196551 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Oct 2 19:24:58.196765 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Oct 2 19:24:58.196960 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Oct 2 19:24:58.197158 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 2 19:24:58.197366 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Oct 2 19:24:58.197601 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Oct 2 19:24:58.197824 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Oct 2 19:24:58.198021 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Oct 2 19:24:58.198217 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 2 19:24:58.200566 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Oct 2 19:24:58.200803 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Oct 2 19:24:58.201003 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Oct 2 19:24:58.201199 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Oct 2 19:24:58.205476 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Oct 2 19:24:58.205697 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Oct 2 19:24:58.205872 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Oct 2 19:24:58.206045 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Oct 2 19:24:58.206076 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Oct 2 19:24:58.206094 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Oct 2 19:24:58.206111 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Oct 2 19:24:58.206127 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Oct 2 19:24:58.206143 kernel: iommu: Default domain type: Translated Oct 2 19:24:58.206160 kernel: iommu: DMA domain TLB invalidation policy: strict mode Oct 2 19:24:58.206176 kernel: vgaarb: loaded Oct 2 19:24:58.206192 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:24:58.206209 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:24:58.206229 kernel: PTP clock support registered Oct 2 19:24:58.206245 kernel: Registered efivars operations Oct 2 19:24:58.206261 kernel: clocksource: Switched to clocksource arch_sys_counter Oct 2 19:24:58.206277 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:24:58.206293 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:24:58.206310 kernel: pnp: PnP ACPI init Oct 2 19:24:58.206569 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Oct 2 19:24:58.206597 kernel: pnp: PnP ACPI: found 1 devices Oct 2 19:24:58.206615 kernel: NET: Registered PF_INET protocol family Oct 2 19:24:58.206637 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 19:24:58.206655 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Oct 2 19:24:58.206672 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:24:58.206689 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 19:24:58.206705 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Oct 2 19:24:58.206721 kernel: TCP: Hash tables configured (established 32768 bind 32768) Oct 2 19:24:58.206738 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 19:24:58.206754 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 19:24:58.206770 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:24:58.206791 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:24:58.206807 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Oct 2 19:24:58.206823 kernel: kvm [1]: HYP mode not available Oct 2 19:24:58.206839 kernel: Initialise system trusted keyrings Oct 2 19:24:58.206856 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Oct 2 19:24:58.206872 kernel: Key type asymmetric registered Oct 2 19:24:58.206888 kernel: Asymmetric key parser 'x509' registered Oct 2 19:24:58.206904 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:24:58.206921 kernel: io scheduler mq-deadline registered Oct 2 19:24:58.206942 kernel: io scheduler kyber registered Oct 2 19:24:58.206958 kernel: io scheduler bfq registered Oct 2 19:24:58.207154 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Oct 2 19:24:58.207179 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Oct 2 19:24:58.207196 kernel: ACPI: button: Power Button [PWRB] Oct 2 19:24:58.207212 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:24:58.207229 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Oct 2 19:24:58.207448 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Oct 2 19:24:58.207477 kernel: printk: console [ttyS0] disabled Oct 2 19:24:58.207495 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Oct 2 19:24:58.207512 kernel: printk: console [ttyS0] enabled Oct 2 19:24:58.207528 kernel: printk: bootconsole [uart0] disabled Oct 2 19:24:58.207545 kernel: thunder_xcv, ver 1.0 Oct 2 19:24:58.207561 kernel: thunder_bgx, ver 1.0 Oct 2 19:24:58.207577 kernel: nicpf, ver 1.0 Oct 2 19:24:58.207593 kernel: nicvf, ver 1.0 Oct 2 19:24:58.207800 kernel: rtc-efi rtc-efi.0: registered as rtc0 Oct 2 19:24:58.207991 kernel: rtc-efi rtc-efi.0: setting system clock to 2023-10-02T19:24:57 UTC (1696274697) Oct 2 19:24:58.208015 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 2 19:24:58.208031 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:24:58.208048 kernel: Segment Routing with IPv6 Oct 2 19:24:58.208064 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:24:58.208080 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:24:58.208096 kernel: Key type dns_resolver registered Oct 2 19:24:58.208113 kernel: registered taskstats version 1 Oct 2 19:24:58.208133 kernel: Loading compiled-in X.509 certificates Oct 2 19:24:58.208150 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 3a2a38edc68cb70dc60ec0223a6460557b3bb28d' Oct 2 19:24:58.208166 kernel: Key type .fscrypt registered Oct 2 19:24:58.208182 kernel: Key type fscrypt-provisioning registered Oct 2 19:24:58.208198 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 19:24:58.208215 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:24:58.208231 kernel: ima: No architecture policies found Oct 2 19:24:58.208247 kernel: Freeing unused kernel memory: 34560K Oct 2 19:24:58.208263 kernel: Run /init as init process Oct 2 19:24:58.208284 kernel: with arguments: Oct 2 19:24:58.208319 kernel: /init Oct 2 19:24:58.208336 kernel: with environment: Oct 2 19:24:58.208352 kernel: HOME=/ Oct 2 19:24:58.208384 kernel: TERM=linux Oct 2 19:24:58.210484 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:24:58.210507 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:24:58.210529 systemd[1]: Detected virtualization amazon. Oct 2 19:24:58.210553 systemd[1]: Detected architecture arm64. Oct 2 19:24:58.210571 systemd[1]: Running in initrd. Oct 2 19:24:58.210588 systemd[1]: No hostname configured, using default hostname. Oct 2 19:24:58.210606 systemd[1]: Hostname set to . Oct 2 19:24:58.210624 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:24:58.210642 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:24:58.210659 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:24:58.210677 systemd[1]: Reached target cryptsetup.target. Oct 2 19:24:58.210697 systemd[1]: Reached target paths.target. Oct 2 19:24:58.210715 systemd[1]: Reached target slices.target. Oct 2 19:24:58.210733 systemd[1]: Reached target swap.target. Oct 2 19:24:58.210750 systemd[1]: Reached target timers.target. Oct 2 19:24:58.210768 systemd[1]: Listening on iscsid.socket. Oct 2 19:24:58.210786 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:24:58.210803 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:24:58.210821 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:24:58.210842 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:24:58.210860 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:24:58.210877 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:24:58.210895 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:24:58.210913 systemd[1]: Reached target sockets.target. Oct 2 19:24:58.210930 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:24:58.210948 systemd[1]: Finished network-cleanup.service. Oct 2 19:24:58.210965 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:24:58.210983 systemd[1]: Starting systemd-journald.service... Oct 2 19:24:58.211004 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:24:58.211022 systemd[1]: Starting systemd-resolved.service... Oct 2 19:24:58.211040 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:24:58.211057 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:24:58.211075 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:24:58.211093 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:24:58.211111 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:24:58.211128 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:24:58.211146 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:24:58.211169 kernel: audit: type=1130 audit(1696274698.173:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:24:58.211186 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:24:58.211203 kernel: Bridge firewalling registered Oct 2 19:24:58.211223 systemd-journald[308]: Journal started Oct 2 19:24:58.211317 systemd-journald[308]: Runtime Journal (/run/log/journal/ec255265589399d76252118381fb9046) is 8.0M, max 75.4M, 67.4M free. Oct 2 19:24:58.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:24:58.129045 systemd-modules-load[309]: Inserted module 'overlay' Oct 2 19:24:58.195484 systemd-modules-load[309]: Inserted module 'br_netfilter' Oct 2 19:24:58.230456 systemd[1]: Started systemd-journald.service. Oct 2 19:24:58.230536 kernel: audit: type=1130 audit(1696274698.216:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:24:58.230564 kernel: SCSI subsystem initialized Oct 2 19:24:58.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:24:58.246663 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:24:58.257628 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:24:58.257661 kernel: audit: type=1130 audit(1696274698.247:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:24:58.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:24:58.258984 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:24:58.267194 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:24:58.267939 systemd-resolved[310]: Positive Trust Anchors: Oct 2 19:24:58.267953 systemd-resolved[310]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:24:58.268006 systemd-resolved[310]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:24:58.297449 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:24:58.302761 dracut-cmdline[325]: dracut-dracut-053 Oct 2 19:24:58.307167 systemd-modules-load[309]: Inserted module 'dm_multipath' Oct 2 19:24:58.311600 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:24:58.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:24:58.323791 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:24:58.329388 kernel: audit: type=1130 audit(1696274698.312:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:24:58.357288 dracut-cmdline[325]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca Oct 2 19:24:58.373105 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:24:58.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:24:58.384398 kernel: audit: type=1130 audit(1696274698.374:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:24:58.605438 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:24:58.619404 kernel: iscsi: registered transport (tcp) Oct 2 19:24:58.646261 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:24:58.646332 kernel: QLogic iSCSI HBA Driver Oct 2 19:24:58.848403 kernel: random: crng init done Oct 2 19:24:58.848524 systemd-resolved[310]: Defaulting to hostname 'linux'. Oct 2 19:24:58.852278 systemd[1]: Started systemd-resolved.service. Oct 2 19:24:58.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:24:58.855595 systemd[1]: Reached target nss-lookup.target. Oct 2 19:24:58.866396 kernel: audit: type=1130 audit(1696274698.854:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:24:58.913778 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:24:58.918500 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:24:58.941350 kernel: audit: type=1130 audit(1696274698.915:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:24:58.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:24:59.011413 kernel: raid6: neonx8 gen() 6375 MB/s Oct 2 19:24:59.029402 kernel: raid6: neonx8 xor() 4725 MB/s Oct 2 19:24:59.047401 kernel: raid6: neonx4 gen() 6473 MB/s Oct 2 19:24:59.065401 kernel: raid6: neonx4 xor() 4894 MB/s Oct 2 19:24:59.083401 kernel: raid6: neonx2 gen() 5750 MB/s Oct 2 19:24:59.101402 kernel: raid6: neonx2 xor() 4518 MB/s Oct 2 19:24:59.119401 kernel: raid6: neonx1 gen() 4469 MB/s Oct 2 19:24:59.137402 kernel: raid6: neonx1 xor() 3667 MB/s Oct 2 19:24:59.155401 kernel: raid6: int64x8 gen() 3405 MB/s Oct 2 19:24:59.173401 kernel: raid6: int64x8 xor() 2083 MB/s Oct 2 19:24:59.191401 kernel: raid6: int64x4 gen() 3783 MB/s Oct 2 19:24:59.209401 kernel: raid6: int64x4 xor() 2189 MB/s Oct 2 19:24:59.227401 kernel: raid6: int64x2 gen() 3593 MB/s Oct 2 19:24:59.245401 kernel: raid6: int64x2 xor() 1948 MB/s Oct 2 19:24:59.263401 kernel: raid6: int64x1 gen() 2742 MB/s Oct 2 19:24:59.282993 kernel: raid6: int64x1 xor() 1450 MB/s Oct 2 19:24:59.283022 kernel: raid6: using algorithm neonx4 gen() 6473 MB/s Oct 2 19:24:59.283051 kernel: raid6: .... xor() 4894 MB/s, rmw enabled Oct 2 19:24:59.284855 kernel: raid6: using neon recovery algorithm Oct 2 19:24:59.303406 kernel: xor: measuring software checksum speed Oct 2 19:24:59.306401 kernel: 8regs : 9333 MB/sec Oct 2 19:24:59.308401 kernel: 32regs : 11107 MB/sec Oct 2 19:24:59.313002 kernel: arm64_neon : 9567 MB/sec Oct 2 19:24:59.313034 kernel: xor: using function: 32regs (11107 MB/sec) Oct 2 19:24:59.402418 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Oct 2 19:24:59.440836 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:24:59.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:24:59.449000 audit: BPF prog-id=7 op=LOAD Oct 2 19:24:59.454303 kernel: audit: type=1130 audit(1696274699.441:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:24:59.454352 kernel: audit: type=1334 audit(1696274699.449:10): prog-id=7 op=LOAD Oct 2 19:24:59.452289 systemd[1]: Starting systemd-udevd.service... Oct 2 19:24:59.450000 audit: BPF prog-id=8 op=LOAD Oct 2 19:24:59.490727 systemd-udevd[508]: Using default interface naming scheme 'v252'. Oct 2 19:24:59.501429 systemd[1]: Started systemd-udevd.service. Oct 2 19:24:59.507033 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:24:59.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:24:59.576648 dracut-pre-trigger[520]: rd.md=0: removing MD RAID activation Oct 2 19:24:59.686218 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:24:59.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:24:59.689456 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:24:59.802252 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:24:59.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:24:59.935699 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Oct 2 19:24:59.935758 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Oct 2 19:24:59.951304 kernel: ena 0000:00:05.0: ENA device version: 0.10 Oct 2 19:24:59.951630 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Oct 2 19:24:59.966404 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Oct 2 19:24:59.966463 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:1f:4c:91:d2:5d Oct 2 19:24:59.966718 kernel: nvme nvme0: pci function 0000:00:04.0 Oct 2 19:24:59.970152 (udev-worker)[561]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:24:59.982417 kernel: nvme nvme0: 2/0/0 default/read/poll queues Oct 2 19:24:59.988697 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 19:24:59.988752 kernel: GPT:9289727 != 16777215 Oct 2 19:24:59.988784 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 19:24:59.990981 kernel: GPT:9289727 != 16777215 Oct 2 19:24:59.992362 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 19:25:00.000984 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:25:00.089420 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (562) Oct 2 19:25:00.165915 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:25:00.266893 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:25:00.302197 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:25:00.306625 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:25:00.321699 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:25:00.334172 systemd[1]: Starting disk-uuid.service... Oct 2 19:25:00.356000 disk-uuid[673]: Primary Header is updated. Oct 2 19:25:00.356000 disk-uuid[673]: Secondary Entries is updated. Oct 2 19:25:00.356000 disk-uuid[673]: Secondary Header is updated. Oct 2 19:25:00.366416 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:25:00.373396 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:25:00.382402 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:25:01.379409 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:25:01.379620 disk-uuid[674]: The operation has completed successfully. Oct 2 19:25:01.662800 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:25:01.665174 systemd[1]: Finished disk-uuid.service. Oct 2 19:25:01.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:01.669722 systemd[1]: Starting verity-setup.service... Oct 2 19:25:01.678975 kernel: kauditd_printk_skb: 4 callbacks suppressed Oct 2 19:25:01.679010 kernel: audit: type=1130 audit(1696274701.667:15): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:01.681401 kernel: audit: type=1131 audit(1696274701.667:16): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:01.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:01.725410 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Oct 2 19:25:01.819507 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:25:01.826498 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:25:01.835346 systemd[1]: Finished verity-setup.service. Oct 2 19:25:01.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:01.851423 kernel: audit: type=1130 audit(1696274701.840:17): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:01.933135 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:25:01.933569 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:25:01.938957 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:25:01.943083 systemd[1]: Starting ignition-setup.service... Oct 2 19:25:01.953834 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:25:01.980872 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Oct 2 19:25:01.980933 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:25:01.984808 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:25:02.000416 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:25:02.034514 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:25:02.064550 systemd[1]: Finished ignition-setup.service. Oct 2 19:25:02.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:02.067826 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:25:02.077966 kernel: audit: type=1130 audit(1696274702.065:18): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:02.313257 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:25:02.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:02.323000 audit: BPF prog-id=9 op=LOAD Oct 2 19:25:02.327567 kernel: audit: type=1130 audit(1696274702.315:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:02.327624 kernel: audit: type=1334 audit(1696274702.323:20): prog-id=9 op=LOAD Oct 2 19:25:02.325499 systemd[1]: Starting systemd-networkd.service... Oct 2 19:25:02.382446 systemd-networkd[1186]: lo: Link UP Oct 2 19:25:02.382469 systemd-networkd[1186]: lo: Gained carrier Oct 2 19:25:02.386222 systemd-networkd[1186]: Enumeration completed Oct 2 19:25:02.400548 kernel: audit: type=1130 audit(1696274702.387:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:02.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:02.386763 systemd-networkd[1186]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:25:02.386935 systemd[1]: Started systemd-networkd.service. Oct 2 19:25:02.388854 systemd[1]: Reached target network.target. Oct 2 19:25:02.400646 systemd[1]: Starting iscsiuio.service... Oct 2 19:25:02.421007 systemd[1]: Started iscsiuio.service. Oct 2 19:25:02.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:02.434704 systemd[1]: Starting iscsid.service... Oct 2 19:25:02.439520 kernel: audit: type=1130 audit(1696274702.421:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:02.441051 systemd-networkd[1186]: eth0: Link UP Oct 2 19:25:02.442759 systemd-networkd[1186]: eth0: Gained carrier Oct 2 19:25:02.455321 iscsid[1191]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:25:02.458433 iscsid[1191]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:25:02.458433 iscsid[1191]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:25:02.458433 iscsid[1191]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:25:02.458433 iscsid[1191]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:25:02.458433 iscsid[1191]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:25:02.479081 systemd-networkd[1186]: eth0: DHCPv4 address 172.31.27.184/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 19:25:02.494339 systemd[1]: Started iscsid.service. Oct 2 19:25:02.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:02.498520 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:25:02.511128 kernel: audit: type=1130 audit(1696274702.496:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:02.541333 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:25:02.546567 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:25:02.549858 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:25:02.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:02.551668 systemd[1]: Reached target remote-fs.target. Oct 2 19:25:02.563935 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:25:02.565918 kernel: audit: type=1130 audit(1696274702.545:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:02.596723 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:25:02.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:02.756227 ignition[1098]: Ignition 2.14.0 Oct 2 19:25:02.757944 ignition[1098]: Stage: fetch-offline Oct 2 19:25:02.759752 ignition[1098]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:25:02.760479 ignition[1098]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:25:02.778715 ignition[1098]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:25:02.781486 ignition[1098]: Ignition finished successfully Oct 2 19:25:02.785683 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:25:02.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:02.789259 systemd[1]: Starting ignition-fetch.service... Oct 2 19:25:02.819699 ignition[1210]: Ignition 2.14.0 Oct 2 19:25:02.819729 ignition[1210]: Stage: fetch Oct 2 19:25:02.820078 ignition[1210]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:25:02.820136 ignition[1210]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:25:02.836537 ignition[1210]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:25:02.839074 ignition[1210]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:25:02.872992 ignition[1210]: INFO : PUT result: OK Oct 2 19:25:02.877741 ignition[1210]: DEBUG : parsed url from cmdline: "" Oct 2 19:25:02.877741 ignition[1210]: INFO : no config URL provided Oct 2 19:25:02.877741 ignition[1210]: INFO : reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:25:02.883853 ignition[1210]: INFO : no config at "/usr/lib/ignition/user.ign" Oct 2 19:25:02.883853 ignition[1210]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:25:02.883853 ignition[1210]: INFO : PUT result: OK Oct 2 19:25:02.883853 ignition[1210]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Oct 2 19:25:02.892878 ignition[1210]: INFO : GET result: OK Oct 2 19:25:02.896179 ignition[1210]: DEBUG : parsing config with SHA512: 12a39bd4e7798ec28121f1d180883c784dbd575c43ea83725fb8ff768324d9040e86fc31ea0e7a9eee26b6265f6197684f3ea3838c65747efa718f9b39819734 Oct 2 19:25:02.934075 unknown[1210]: fetched base config from "system" Oct 2 19:25:02.934344 unknown[1210]: fetched base config from "system" Oct 2 19:25:02.936201 ignition[1210]: fetch: fetch complete Oct 2 19:25:02.934362 unknown[1210]: fetched user config from "aws" Oct 2 19:25:02.936216 ignition[1210]: fetch: fetch passed Oct 2 19:25:02.936331 ignition[1210]: Ignition finished successfully Oct 2 19:25:02.946952 systemd[1]: Finished ignition-fetch.service. Oct 2 19:25:02.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:02.951581 systemd[1]: Starting ignition-kargs.service... Oct 2 19:25:02.988124 ignition[1216]: Ignition 2.14.0 Oct 2 19:25:02.988154 ignition[1216]: Stage: kargs Oct 2 19:25:02.988561 ignition[1216]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:25:02.988667 ignition[1216]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:25:03.005693 ignition[1216]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:25:03.008445 ignition[1216]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:25:03.012192 ignition[1216]: INFO : PUT result: OK Oct 2 19:25:03.017539 ignition[1216]: kargs: kargs passed Oct 2 19:25:03.017680 ignition[1216]: Ignition finished successfully Oct 2 19:25:03.022111 systemd[1]: Finished ignition-kargs.service. Oct 2 19:25:03.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:03.026905 systemd[1]: Starting ignition-disks.service... Oct 2 19:25:03.055109 ignition[1222]: Ignition 2.14.0 Oct 2 19:25:03.055138 ignition[1222]: Stage: disks Oct 2 19:25:03.055559 ignition[1222]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:25:03.055622 ignition[1222]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:25:03.069763 ignition[1222]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:25:03.072451 ignition[1222]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:25:03.075981 ignition[1222]: INFO : PUT result: OK Oct 2 19:25:03.081580 ignition[1222]: disks: disks passed Oct 2 19:25:03.081682 ignition[1222]: Ignition finished successfully Oct 2 19:25:03.085942 systemd[1]: Finished ignition-disks.service. Oct 2 19:25:03.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:03.089325 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:25:03.092893 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:25:03.096037 systemd[1]: Reached target local-fs.target. Oct 2 19:25:03.097779 systemd[1]: Reached target sysinit.target. Oct 2 19:25:03.100740 systemd[1]: Reached target basic.target. Oct 2 19:25:03.106499 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:25:03.156670 systemd-fsck[1230]: ROOT: clean, 603/553520 files, 56011/553472 blocks Oct 2 19:25:03.165527 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:25:03.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:03.170207 systemd[1]: Mounting sysroot.mount... Oct 2 19:25:03.200421 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:25:03.202101 systemd[1]: Mounted sysroot.mount. Oct 2 19:25:03.204875 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:25:03.217824 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:25:03.220175 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 19:25:03.220287 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:25:03.220350 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:25:03.255645 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:25:03.269418 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:25:03.279037 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:25:03.299396 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1247) Oct 2 19:25:03.309774 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Oct 2 19:25:03.309839 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:25:03.312002 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:25:03.312924 initrd-setup-root[1252]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:25:03.327395 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:25:03.330831 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:25:03.340073 initrd-setup-root[1278]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:25:03.359113 initrd-setup-root[1286]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:25:03.378090 initrd-setup-root[1294]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:25:03.581171 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:25:03.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:03.585193 systemd[1]: Starting ignition-mount.service... Oct 2 19:25:03.594937 systemd[1]: Starting sysroot-boot.service... Oct 2 19:25:03.623113 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 19:25:03.623278 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 19:25:03.656899 systemd[1]: Finished sysroot-boot.service. Oct 2 19:25:03.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:03.674881 ignition[1314]: INFO : Ignition 2.14.0 Oct 2 19:25:03.674881 ignition[1314]: INFO : Stage: mount Oct 2 19:25:03.678333 ignition[1314]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:25:03.678333 ignition[1314]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:25:03.696430 ignition[1314]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:25:03.698987 ignition[1314]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:25:03.702407 ignition[1314]: INFO : PUT result: OK Oct 2 19:25:03.707388 ignition[1314]: INFO : mount: mount passed Oct 2 19:25:03.712430 ignition[1314]: INFO : Ignition finished successfully Oct 2 19:25:03.715776 systemd[1]: Finished ignition-mount.service. Oct 2 19:25:03.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:03.719847 systemd[1]: Starting ignition-files.service... Oct 2 19:25:03.743256 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:25:03.767570 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1322) Oct 2 19:25:03.773362 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Oct 2 19:25:03.773412 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:25:03.773436 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:25:03.782409 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:25:03.787432 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:25:03.831425 ignition[1341]: INFO : Ignition 2.14.0 Oct 2 19:25:03.831425 ignition[1341]: INFO : Stage: files Oct 2 19:25:03.834856 ignition[1341]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:25:03.834856 ignition[1341]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:25:03.853549 ignition[1341]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:25:03.856132 ignition[1341]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:25:03.859899 ignition[1341]: INFO : PUT result: OK Oct 2 19:25:03.864610 ignition[1341]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:25:03.869277 ignition[1341]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:25:03.869277 ignition[1341]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:25:03.933505 ignition[1341]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:25:03.936488 ignition[1341]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:25:03.940066 unknown[1341]: wrote ssh authorized keys file for user: core Oct 2 19:25:03.942483 ignition[1341]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:25:03.946101 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Oct 2 19:25:03.950126 ignition[1341]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Oct 2 19:25:04.128550 systemd-networkd[1186]: eth0: Gained IPv6LL Oct 2 19:25:04.304493 ignition[1341]: INFO : GET result: OK Oct 2 19:25:04.903401 ignition[1341]: DEBUG : file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Oct 2 19:25:04.908216 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Oct 2 19:25:04.908216 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Oct 2 19:25:04.916100 ignition[1341]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Oct 2 19:25:05.157539 ignition[1341]: INFO : GET result: OK Oct 2 19:25:05.458082 ignition[1341]: DEBUG : file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Oct 2 19:25:05.462944 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Oct 2 19:25:05.466833 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:25:05.470471 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:25:05.473990 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 19:25:05.477636 ignition[1341]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:25:05.497027 ignition[1341]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4195136982" Oct 2 19:25:05.500017 ignition[1341]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4195136982": device or resource busy Oct 2 19:25:05.500017 ignition[1341]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4195136982", trying btrfs: device or resource busy Oct 2 19:25:05.516484 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1343) Oct 2 19:25:05.516523 ignition[1341]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4195136982" Oct 2 19:25:05.516523 ignition[1341]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4195136982" Oct 2 19:25:05.525971 ignition[1341]: INFO : op(3): [started] unmounting "/mnt/oem4195136982" Oct 2 19:25:05.531190 ignition[1341]: INFO : op(3): [finished] unmounting "/mnt/oem4195136982" Oct 2 19:25:05.529213 systemd[1]: mnt-oem4195136982.mount: Deactivated successfully. Oct 2 19:25:05.537483 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 19:25:05.537483 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:25:05.537483 ignition[1341]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/arm64/kubeadm: attempt #1 Oct 2 19:25:05.626607 ignition[1341]: INFO : GET result: OK Oct 2 19:25:06.722124 ignition[1341]: DEBUG : file matches expected sum of: 5a08b81f9cc82d3cce21130856ca63b8dafca9149d9775dd25b376eb0f18209aa0e4a47c0a6d7e6fb1316aacd5d59dec770f26c09120c866949d70bc415518b3 Oct 2 19:25:06.727386 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:25:06.727386 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:25:06.727386 ignition[1341]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/arm64/kubelet: attempt #1 Oct 2 19:25:06.783135 ignition[1341]: INFO : GET result: OK Oct 2 19:25:08.132556 ignition[1341]: DEBUG : file matches expected sum of: 5a898ef543a6482895101ea58e33602e3c0a7682d322aaf08ac3dc8a5a3c8da8f09600d577024549288f8cebb1a86f9c79927796b69a3d8fe989ca8f12b147d6 Oct 2 19:25:08.137818 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:25:08.141275 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:25:08.144799 ignition[1341]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/arm64/kubectl: attempt #1 Oct 2 19:25:08.197035 ignition[1341]: INFO : GET result: OK Oct 2 19:25:08.856502 ignition[1341]: DEBUG : file matches expected sum of: 6a5c9c02a29126949f096415bb1761a0c0ad44168e2ab3d0409982701da58f96223bec354828ddf958e945ef1ce63c0ad41e77cbcbcce0756163e71b4fbae432 Oct 2 19:25:08.861272 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:25:08.861272 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/bin/cilium.tar.gz" Oct 2 19:25:08.861272 ignition[1341]: INFO : GET https://github.com/cilium/cilium-cli/releases/download/v0.12.12/cilium-linux-arm64.tar.gz: attempt #1 Oct 2 19:25:09.096100 ignition[1341]: INFO : GET result: OK Oct 2 19:25:09.229666 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/bin/cilium.tar.gz" Oct 2 19:25:09.233734 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:25:09.237618 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:25:09.241336 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:25:09.245022 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:25:09.248868 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:25:09.252720 ignition[1341]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:25:09.267356 ignition[1341]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem777878464" Oct 2 19:25:09.270314 ignition[1341]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem777878464": device or resource busy Oct 2 19:25:09.270314 ignition[1341]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem777878464", trying btrfs: device or resource busy Oct 2 19:25:09.270314 ignition[1341]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem777878464" Oct 2 19:25:09.270314 ignition[1341]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem777878464" Oct 2 19:25:09.283096 ignition[1341]: INFO : op(6): [started] unmounting "/mnt/oem777878464" Oct 2 19:25:09.283096 ignition[1341]: INFO : op(6): [finished] unmounting "/mnt/oem777878464" Oct 2 19:25:09.283096 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:25:09.283096 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 19:25:09.283096 ignition[1341]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:25:09.304255 systemd[1]: mnt-oem777878464.mount: Deactivated successfully. Oct 2 19:25:09.323139 ignition[1341]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2383031793" Oct 2 19:25:09.326167 ignition[1341]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2383031793": device or resource busy Oct 2 19:25:09.326167 ignition[1341]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2383031793", trying btrfs: device or resource busy Oct 2 19:25:09.326167 ignition[1341]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2383031793" Oct 2 19:25:09.350962 ignition[1341]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2383031793" Oct 2 19:25:09.350962 ignition[1341]: INFO : op(9): [started] unmounting "/mnt/oem2383031793" Oct 2 19:25:09.350962 ignition[1341]: INFO : op(9): [finished] unmounting "/mnt/oem2383031793" Oct 2 19:25:09.350962 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 19:25:09.350962 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 19:25:09.350962 ignition[1341]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:25:09.337756 systemd[1]: mnt-oem2383031793.mount: Deactivated successfully. Oct 2 19:25:09.373956 ignition[1341]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3464503316" Oct 2 19:25:09.378865 ignition[1341]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3464503316": device or resource busy Oct 2 19:25:09.378865 ignition[1341]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3464503316", trying btrfs: device or resource busy Oct 2 19:25:09.378865 ignition[1341]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3464503316" Oct 2 19:25:09.378865 ignition[1341]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3464503316" Oct 2 19:25:09.378865 ignition[1341]: INFO : op(c): [started] unmounting "/mnt/oem3464503316" Oct 2 19:25:09.378865 ignition[1341]: INFO : op(c): [finished] unmounting "/mnt/oem3464503316" Oct 2 19:25:09.378865 ignition[1341]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 19:25:09.378865 ignition[1341]: INFO : files: op(10): [started] processing unit "amazon-ssm-agent.service" Oct 2 19:25:09.378865 ignition[1341]: INFO : files: op(10): op(11): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 19:25:09.378865 ignition[1341]: INFO : files: op(10): op(11): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 19:25:09.378865 ignition[1341]: INFO : files: op(10): [finished] processing unit "amazon-ssm-agent.service" Oct 2 19:25:09.378865 ignition[1341]: INFO : files: op(12): [started] processing unit "nvidia.service" Oct 2 19:25:09.378865 ignition[1341]: INFO : files: op(12): [finished] processing unit "nvidia.service" Oct 2 19:25:09.378865 ignition[1341]: INFO : files: op(13): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:25:09.378865 ignition[1341]: INFO : files: op(13): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:25:09.378865 ignition[1341]: INFO : files: op(14): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:25:09.378865 ignition[1341]: INFO : files: op(14): op(15): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:25:09.378865 ignition[1341]: INFO : files: op(14): op(15): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:25:09.378865 ignition[1341]: INFO : files: op(14): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:25:09.378865 ignition[1341]: INFO : files: op(16): [started] processing unit "prepare-critools.service" Oct 2 19:25:09.446297 ignition[1341]: INFO : files: op(16): op(17): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:25:09.446297 ignition[1341]: INFO : files: op(16): op(17): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:25:09.446297 ignition[1341]: INFO : files: op(16): [finished] processing unit "prepare-critools.service" Oct 2 19:25:09.446297 ignition[1341]: INFO : files: op(18): [started] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 19:25:09.446297 ignition[1341]: INFO : files: op(18): [finished] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 19:25:09.446297 ignition[1341]: INFO : files: op(19): [started] setting preset to enabled for "nvidia.service" Oct 2 19:25:09.446297 ignition[1341]: INFO : files: op(19): [finished] setting preset to enabled for "nvidia.service" Oct 2 19:25:09.446297 ignition[1341]: INFO : files: op(1a): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:25:09.446297 ignition[1341]: INFO : files: op(1a): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:25:09.446297 ignition[1341]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:25:09.446297 ignition[1341]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:25:09.446297 ignition[1341]: INFO : files: op(1c): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:25:09.446297 ignition[1341]: INFO : files: op(1c): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:25:09.446297 ignition[1341]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:25:09.446297 ignition[1341]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:25:09.446297 ignition[1341]: INFO : files: files passed Oct 2 19:25:09.446297 ignition[1341]: INFO : Ignition finished successfully Oct 2 19:25:09.542475 kernel: kauditd_printk_skb: 9 callbacks suppressed Oct 2 19:25:09.542528 kernel: audit: type=1130 audit(1696274709.495:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.484317 systemd[1]: Finished ignition-files.service. Oct 2 19:25:09.508657 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:25:09.514200 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:25:09.515586 systemd[1]: Starting ignition-quench.service... Oct 2 19:25:09.551637 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:25:09.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.551826 systemd[1]: Finished ignition-quench.service. Oct 2 19:25:09.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.573838 kernel: audit: type=1130 audit(1696274709.552:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.573899 kernel: audit: type=1131 audit(1696274709.552:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.583477 initrd-setup-root-after-ignition[1366]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:25:09.588870 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:25:09.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.591909 systemd[1]: Reached target ignition-complete.target. Oct 2 19:25:09.602627 kernel: audit: type=1130 audit(1696274709.589:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.605783 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:25:09.655198 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:25:09.655961 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:25:09.675476 kernel: audit: type=1130 audit(1696274709.657:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.677089 kernel: audit: type=1131 audit(1696274709.658:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.660009 systemd[1]: Reached target initrd-fs.target. Oct 2 19:25:09.677164 systemd[1]: Reached target initrd.target. Oct 2 19:25:09.679511 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:25:09.680952 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:25:09.722256 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:25:09.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.735444 kernel: audit: type=1130 audit(1696274709.725:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.730750 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:25:09.759556 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:25:09.763166 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:25:09.766958 systemd[1]: Stopped target timers.target. Oct 2 19:25:09.770174 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:25:09.772404 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:25:09.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.779692 systemd[1]: Stopped target initrd.target. Oct 2 19:25:09.788763 kernel: audit: type=1131 audit(1696274709.774:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.785589 systemd[1]: Stopped target basic.target. Oct 2 19:25:09.787282 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:25:09.793936 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:25:09.797721 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:25:09.801561 systemd[1]: Stopped target remote-fs.target. Oct 2 19:25:09.804899 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:25:09.808433 systemd[1]: Stopped target sysinit.target. Oct 2 19:25:09.811674 systemd[1]: Stopped target local-fs.target. Oct 2 19:25:09.814937 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:25:09.818511 systemd[1]: Stopped target swap.target. Oct 2 19:25:09.821614 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:25:09.823841 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:25:09.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.828432 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:25:09.848858 kernel: audit: type=1131 audit(1696274709.825:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.848893 kernel: audit: type=1131 audit(1696274709.838:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.837442 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:25:09.837643 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:25:09.839631 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:25:09.839854 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:25:09.855362 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:25:09.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.855577 systemd[1]: Stopped ignition-files.service. Oct 2 19:25:09.861599 systemd[1]: Stopping ignition-mount.service... Oct 2 19:25:09.886055 systemd[1]: Stopping iscsiuio.service... Oct 2 19:25:09.887576 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:25:09.887832 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:25:09.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.896215 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:25:09.897828 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:25:09.898122 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:25:09.900220 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:25:09.900464 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:25:09.905490 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:25:09.905721 systemd[1]: Stopped iscsiuio.service. Oct 2 19:25:09.947244 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:25:09.949579 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:25:09.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.963472 ignition[1379]: INFO : Ignition 2.14.0 Oct 2 19:25:09.965501 ignition[1379]: INFO : Stage: umount Oct 2 19:25:09.967419 ignition[1379]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:25:09.970088 ignition[1379]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:25:09.977458 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:25:09.979765 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:25:09.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:09.991297 ignition[1379]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:25:09.993991 ignition[1379]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:25:09.996821 ignition[1379]: INFO : PUT result: OK Oct 2 19:25:10.001843 ignition[1379]: INFO : umount: umount passed Oct 2 19:25:10.003633 ignition[1379]: INFO : Ignition finished successfully Oct 2 19:25:10.005951 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:25:10.006144 systemd[1]: Stopped ignition-mount.service. Oct 2 19:25:10.011743 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:25:10.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:10.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:10.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:10.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:10.011833 systemd[1]: Stopped ignition-disks.service. Oct 2 19:25:10.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:10.013579 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:25:10.013658 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:25:10.015362 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 19:25:10.015454 systemd[1]: Stopped ignition-fetch.service. Oct 2 19:25:10.017142 systemd[1]: Stopped target network.target. Oct 2 19:25:10.018764 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:25:10.018844 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:25:10.022616 systemd[1]: Stopped target paths.target. Oct 2 19:25:10.024195 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:25:10.028446 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:25:10.037871 systemd[1]: Stopped target slices.target. Oct 2 19:25:10.046496 systemd[1]: Stopped target sockets.target. Oct 2 19:25:10.048203 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:25:10.053091 systemd[1]: Closed iscsid.socket. Oct 2 19:25:10.055826 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:25:10.055916 systemd[1]: Closed iscsiuio.socket. Oct 2 19:25:10.059007 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:25:10.062393 systemd[1]: Stopped ignition-setup.service. Oct 2 19:25:10.065443 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:25:10.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:10.067742 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:25:10.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:10.071206 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:25:10.073425 systemd-networkd[1186]: eth0: DHCPv6 lease lost Oct 2 19:25:10.077886 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:25:10.081747 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:25:10.083469 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:25:10.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:10.095023 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:25:10.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:10.096000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:25:10.095227 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:25:10.100000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:25:10.098908 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:25:10.098994 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:25:10.109511 systemd[1]: Stopping network-cleanup.service... Oct 2 19:25:10.121985 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:25:10.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:10.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:10.122780 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:25:10.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:10.125416 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:25:10.125507 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:25:10.128674 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:25:10.128770 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:25:10.132478 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:25:10.154187 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:25:10.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:10.154502 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:25:10.157247 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:25:10.157464 systemd[1]: Stopped network-cleanup.service. Oct 2 19:25:10.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:10.166307 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:25:10.166992 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:25:10.172015 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:25:10.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:10.172089 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:25:10.173857 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:25:10.173937 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:25:10.178150 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:25:10.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:10.178226 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:25:10.190325 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:25:10.192335 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:25:10.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:10.212437 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:25:10.216158 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:25:10.217100 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:25:10.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:10.242707 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:25:10.245066 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:25:10.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:10.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:10.249515 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:25:10.254327 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:25:10.272093 systemd[1]: mnt-oem3464503316.mount: Deactivated successfully. Oct 2 19:25:10.273206 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 19:25:10.273320 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 19:25:10.284961 systemd[1]: Switching root. Oct 2 19:25:10.313966 iscsid[1191]: iscsid shutting down. Oct 2 19:25:10.315569 systemd-journald[308]: Received SIGTERM from PID 1 (systemd). Oct 2 19:25:10.315641 systemd-journald[308]: Journal stopped Oct 2 19:25:16.518310 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:25:16.518933 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:25:16.518969 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:25:16.519007 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:25:16.519038 kernel: SELinux: policy capability open_perms=1 Oct 2 19:25:16.519069 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:25:16.519100 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:25:16.519130 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:25:16.519160 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:25:16.519191 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:25:16.519221 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:25:16.519254 systemd[1]: Successfully loaded SELinux policy in 86.130ms. Oct 2 19:25:16.519487 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 19.685ms. Oct 2 19:25:16.519525 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:25:16.519561 systemd[1]: Detected virtualization amazon. Oct 2 19:25:16.519593 systemd[1]: Detected architecture arm64. Oct 2 19:25:16.519628 systemd[1]: Detected first boot. Oct 2 19:25:16.519663 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:25:16.519694 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:25:16.519731 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:25:16.519769 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:25:16.519802 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:25:16.519898 kernel: kauditd_printk_skb: 38 callbacks suppressed Oct 2 19:25:16.519936 kernel: audit: type=1334 audit(1696274716.019:82): prog-id=12 op=LOAD Oct 2 19:25:16.519968 kernel: audit: type=1334 audit(1696274716.021:83): prog-id=3 op=UNLOAD Oct 2 19:25:16.519997 kernel: audit: type=1334 audit(1696274716.021:84): prog-id=13 op=LOAD Oct 2 19:25:16.520027 kernel: audit: type=1334 audit(1696274716.024:85): prog-id=14 op=LOAD Oct 2 19:25:16.520059 kernel: audit: type=1334 audit(1696274716.024:86): prog-id=4 op=UNLOAD Oct 2 19:25:16.520102 kernel: audit: type=1334 audit(1696274716.024:87): prog-id=5 op=UNLOAD Oct 2 19:25:16.520136 kernel: audit: type=1334 audit(1696274716.030:88): prog-id=15 op=LOAD Oct 2 19:25:16.520167 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:25:16.520202 kernel: audit: type=1334 audit(1696274716.030:89): prog-id=12 op=UNLOAD Oct 2 19:25:16.520234 systemd[1]: Stopped iscsid.service. Oct 2 19:25:16.520263 kernel: audit: type=1334 audit(1696274716.032:90): prog-id=16 op=LOAD Oct 2 19:25:16.520291 kernel: audit: type=1334 audit(1696274716.035:91): prog-id=17 op=LOAD Oct 2 19:25:16.520326 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:25:16.520356 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:25:16.522494 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:25:16.522544 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:25:16.522579 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:25:16.522629 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 19:25:16.522664 systemd[1]: Created slice system-getty.slice. Oct 2 19:25:16.522698 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:25:16.522735 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:25:16.522766 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:25:16.522797 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:25:16.522832 systemd[1]: Created slice user.slice. Oct 2 19:25:16.522864 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:25:16.522895 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:25:16.522925 systemd[1]: Set up automount boot.automount. Oct 2 19:25:16.522957 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:25:16.522989 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:25:16.523025 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:25:16.523057 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:25:16.523086 systemd[1]: Reached target integritysetup.target. Oct 2 19:25:16.523116 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:25:16.523148 systemd[1]: Reached target remote-fs.target. Oct 2 19:25:16.523180 systemd[1]: Reached target slices.target. Oct 2 19:25:16.523211 systemd[1]: Reached target swap.target. Oct 2 19:25:16.523240 systemd[1]: Reached target torcx.target. Oct 2 19:25:16.523273 systemd[1]: Reached target veritysetup.target. Oct 2 19:25:16.523309 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:25:16.523338 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:25:16.523383 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:25:16.523421 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:25:16.523453 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:25:16.523483 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:25:16.523516 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:25:16.523546 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:25:16.523575 systemd[1]: Mounting media.mount... Oct 2 19:25:16.523605 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:25:16.523640 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:25:16.523671 systemd[1]: Mounting tmp.mount... Oct 2 19:25:16.523701 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:25:16.523732 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:25:16.523831 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:25:16.523864 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:25:16.523897 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:25:16.523932 systemd[1]: Starting modprobe@drm.service... Oct 2 19:25:16.523964 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:25:16.523999 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:25:16.524031 systemd[1]: Starting modprobe@loop.service... Oct 2 19:25:16.524064 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:25:16.524111 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:25:16.524145 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:25:16.524175 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:25:16.524207 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:25:16.524240 systemd[1]: Stopped systemd-journald.service. Oct 2 19:25:16.524336 systemd[1]: Starting systemd-journald.service... Oct 2 19:25:16.524387 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:25:16.524424 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:25:16.524457 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:25:16.524487 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:25:16.524519 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:25:16.524551 systemd[1]: Stopped verity-setup.service. Oct 2 19:25:16.524581 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:25:16.524611 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:25:16.524642 systemd[1]: Mounted media.mount. Oct 2 19:25:16.524676 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:25:16.524706 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:25:16.524737 kernel: loop: module loaded Oct 2 19:25:16.524767 systemd[1]: Mounted tmp.mount. Oct 2 19:25:16.524798 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:25:16.524829 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:25:16.524860 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:25:16.524894 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:25:16.524925 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:25:16.524958 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:25:16.524990 systemd[1]: Finished modprobe@drm.service. Oct 2 19:25:16.525020 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:25:16.525051 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:25:16.525082 kernel: fuse: init (API version 7.34) Oct 2 19:25:16.525117 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:25:16.525147 systemd[1]: Finished modprobe@loop.service. Oct 2 19:25:16.525179 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:25:16.525212 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:25:16.525252 systemd[1]: Reached target network-pre.target. Oct 2 19:25:16.525288 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:25:16.525321 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:25:16.525352 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:25:16.549146 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:25:16.549211 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:25:16.549247 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:25:16.549282 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:25:16.549313 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:25:16.549344 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:25:16.554266 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:25:16.554321 systemd-journald[1489]: Journal started Oct 2 19:25:16.554452 systemd-journald[1489]: Runtime Journal (/run/log/journal/ec255265589399d76252118381fb9046) is 8.0M, max 75.4M, 67.4M free. Oct 2 19:25:11.094000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:25:11.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:25:11.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:25:11.362000 audit: BPF prog-id=10 op=LOAD Oct 2 19:25:11.362000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:25:11.362000 audit: BPF prog-id=11 op=LOAD Oct 2 19:25:11.362000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:25:16.019000 audit: BPF prog-id=12 op=LOAD Oct 2 19:25:16.021000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:25:16.021000 audit: BPF prog-id=13 op=LOAD Oct 2 19:25:16.024000 audit: BPF prog-id=14 op=LOAD Oct 2 19:25:16.024000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:25:16.024000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:25:16.030000 audit: BPF prog-id=15 op=LOAD Oct 2 19:25:16.030000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:25:16.032000 audit: BPF prog-id=16 op=LOAD Oct 2 19:25:16.035000 audit: BPF prog-id=17 op=LOAD Oct 2 19:25:16.035000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:25:16.035000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:25:16.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.051000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:25:16.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.336000 audit: BPF prog-id=18 op=LOAD Oct 2 19:25:16.336000 audit: BPF prog-id=19 op=LOAD Oct 2 19:25:16.336000 audit: BPF prog-id=20 op=LOAD Oct 2 19:25:16.336000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:25:16.336000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:25:16.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.512000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:25:16.512000 audit[1489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffc75a73f0 a2=4000 a3=1 items=0 ppid=1 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:16.512000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:25:16.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.018277 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:25:11.554927 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:25:16.038052 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:25:11.578745 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:11Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:25:11.578800 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:11Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:25:11.578933 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:11Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:25:11.578959 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:11Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:25:11.579046 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:11Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:25:11.579097 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:11Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:25:11.579677 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:11Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:25:11.579783 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:11Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:25:11.579838 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:11Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:25:11.580851 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:11Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:25:11.580956 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:11Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:25:11.581024 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:11Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:25:16.592487 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:25:16.592540 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:25:11.581085 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:11Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:25:11.581135 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:11Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:25:11.581197 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:11Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:25:15.166752 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:15Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:25:15.167273 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:15Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:25:15.167534 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:15Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:25:16.600327 systemd[1]: Started systemd-journald.service. Oct 2 19:25:16.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:15.167966 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:15Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:25:15.168070 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:15Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:25:15.168221 /usr/lib/systemd/system-generators/torcx-generator[1414]: time="2023-10-02T19:25:15Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:25:16.601897 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:25:16.608658 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:25:16.612051 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:25:16.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.614296 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:25:16.662150 systemd-journald[1489]: Time spent on flushing to /var/log/journal/ec255265589399d76252118381fb9046 is 34.606ms for 1153 entries. Oct 2 19:25:16.662150 systemd-journald[1489]: System Journal (/var/log/journal/ec255265589399d76252118381fb9046) is 8.0M, max 195.6M, 187.6M free. Oct 2 19:25:16.716439 systemd-journald[1489]: Received client request to flush runtime journal. Oct 2 19:25:16.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.719180 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:25:16.760165 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:25:16.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.780011 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:25:16.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.784147 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:25:16.814975 udevadm[1523]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 2 19:25:16.845305 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:25:16.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:16.849563 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:25:17.005278 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:25:17.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:17.598322 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:25:17.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:17.600000 audit: BPF prog-id=21 op=LOAD Oct 2 19:25:17.600000 audit: BPF prog-id=22 op=LOAD Oct 2 19:25:17.600000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:25:17.600000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:25:17.602819 systemd[1]: Starting systemd-udevd.service... Oct 2 19:25:17.651306 systemd-udevd[1534]: Using default interface naming scheme 'v252'. Oct 2 19:25:17.682861 systemd[1]: Started systemd-udevd.service. Oct 2 19:25:17.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:17.685000 audit: BPF prog-id=23 op=LOAD Oct 2 19:25:17.687687 systemd[1]: Starting systemd-networkd.service... Oct 2 19:25:17.723000 audit: BPF prog-id=24 op=LOAD Oct 2 19:25:17.723000 audit: BPF prog-id=25 op=LOAD Oct 2 19:25:17.723000 audit: BPF prog-id=26 op=LOAD Oct 2 19:25:17.726262 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:25:17.827841 systemd[1]: Started systemd-userdbd.service. Oct 2 19:25:17.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:17.880994 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:25:17.921740 (udev-worker)[1541]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:25:18.087130 systemd-networkd[1538]: lo: Link UP Oct 2 19:25:18.087155 systemd-networkd[1538]: lo: Gained carrier Oct 2 19:25:18.088522 systemd-networkd[1538]: Enumeration completed Oct 2 19:25:18.088689 systemd[1]: Started systemd-networkd.service. Oct 2 19:25:18.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:18.092741 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:25:18.097813 systemd-networkd[1538]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:25:18.105462 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:25:18.105782 systemd-networkd[1538]: eth0: Link UP Oct 2 19:25:18.106070 systemd-networkd[1538]: eth0: Gained carrier Oct 2 19:25:18.119750 systemd-networkd[1538]: eth0: DHCPv4 address 172.31.27.184/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 19:25:18.149478 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1537) Oct 2 19:25:18.355519 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:25:18.358277 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:25:18.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:18.362667 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:25:18.453725 lvm[1653]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:25:18.490326 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:25:18.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:18.492723 systemd[1]: Reached target cryptsetup.target. Oct 2 19:25:18.496655 systemd[1]: Starting lvm2-activation.service... Oct 2 19:25:18.510888 lvm[1654]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:25:18.549506 systemd[1]: Finished lvm2-activation.service. Oct 2 19:25:18.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:18.551507 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:25:18.553303 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:25:18.553362 systemd[1]: Reached target local-fs.target. Oct 2 19:25:18.555183 systemd[1]: Reached target machines.target. Oct 2 19:25:18.559212 systemd[1]: Starting ldconfig.service... Oct 2 19:25:18.561345 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:25:18.561512 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:25:18.563797 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:25:18.567502 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:25:18.574611 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:25:18.576708 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:25:18.576822 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:25:18.579145 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:25:18.639196 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1656 (bootctl) Oct 2 19:25:18.641451 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:25:18.648537 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:25:18.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:18.674286 systemd-tmpfiles[1659]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:25:18.699831 systemd-tmpfiles[1659]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:25:18.813077 systemd-fsck[1664]: fsck.fat 4.2 (2021-01-31) Oct 2 19:25:18.813077 systemd-fsck[1664]: /dev/nvme0n1p1: 236 files, 113463/258078 clusters Oct 2 19:25:18.816158 systemd-tmpfiles[1659]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:25:18.819444 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:25:18.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:18.824349 systemd[1]: Mounting boot.mount... Oct 2 19:25:18.866185 systemd[1]: Mounted boot.mount. Oct 2 19:25:18.893037 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:25:18.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:19.129100 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:25:19.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:19.134487 systemd[1]: Starting audit-rules.service... Oct 2 19:25:19.138358 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:25:19.143837 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:25:19.148000 audit: BPF prog-id=27 op=LOAD Oct 2 19:25:19.152568 systemd[1]: Starting systemd-resolved.service... Oct 2 19:25:19.154000 audit: BPF prog-id=28 op=LOAD Oct 2 19:25:19.157733 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:25:19.164668 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:25:19.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:19.198110 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:25:19.200357 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:25:19.206000 audit[1683]: SYSTEM_BOOT pid=1683 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:25:19.217224 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:25:19.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:19.269395 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:25:19.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:19.345965 systemd-resolved[1681]: Positive Trust Anchors: Oct 2 19:25:19.346494 systemd-resolved[1681]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:25:19.346959 systemd-resolved[1681]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:25:19.359588 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:25:19.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:19.361757 systemd[1]: Reached target time-set.target. Oct 2 19:25:19.405000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:25:19.405000 audit[1699]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc8f63d00 a2=420 a3=0 items=0 ppid=1678 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:19.405000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:25:19.406917 augenrules[1699]: No rules Oct 2 19:25:19.408621 systemd[1]: Finished audit-rules.service. Oct 2 19:25:19.410637 systemd-resolved[1681]: Defaulting to hostname 'linux'. Oct 2 19:25:19.414233 systemd[1]: Started systemd-resolved.service. Oct 2 19:25:19.416199 systemd[1]: Reached target network.target. Oct 2 19:25:19.420290 systemd[1]: Reached target nss-lookup.target. Oct 2 19:25:19.425214 systemd-networkd[1538]: eth0: Gained IPv6LL Oct 2 19:25:19.426490 systemd-timesyncd[1682]: Network configuration changed, trying to establish connection. Oct 2 19:25:19.431143 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:25:19.433475 systemd[1]: Reached target network-online.target. Oct 2 19:25:19.741446 ldconfig[1655]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:25:19.770445 systemd[1]: Finished ldconfig.service. Oct 2 19:25:19.776673 systemd[1]: Starting systemd-update-done.service... Oct 2 19:25:19.798570 systemd[1]: Finished systemd-update-done.service. Oct 2 19:25:19.800929 systemd[1]: Reached target sysinit.target. Oct 2 19:25:19.802786 systemd[1]: Started motdgen.path. Oct 2 19:25:19.804572 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:25:19.807296 systemd[1]: Started logrotate.timer. Oct 2 19:25:19.820635 systemd[1]: Started mdadm.timer. Oct 2 19:25:19.822212 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:25:19.824101 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:25:19.824162 systemd[1]: Reached target paths.target. Oct 2 19:25:19.825826 systemd[1]: Reached target timers.target. Oct 2 19:25:19.827981 systemd[1]: Listening on dbus.socket. Oct 2 19:25:19.831772 systemd[1]: Starting docker.socket... Oct 2 19:25:19.843009 systemd[1]: Listening on sshd.socket. Oct 2 19:25:19.845106 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:25:19.846134 systemd[1]: Listening on docker.socket. Oct 2 19:25:19.848158 systemd[1]: Reached target sockets.target. Oct 2 19:25:19.850077 systemd[1]: Reached target basic.target. Oct 2 19:25:19.851868 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:25:19.852046 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:25:19.854983 systemd[1]: Started amazon-ssm-agent.service. Oct 2 19:25:19.861881 systemd[1]: Starting containerd.service... Oct 2 19:25:19.868898 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 19:25:19.874947 systemd[1]: Starting dbus.service... Oct 2 19:25:19.879192 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:25:19.885881 systemd[1]: Starting extend-filesystems.service... Oct 2 19:25:19.888611 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:25:19.891031 systemd[1]: Starting motdgen.service... Oct 2 19:25:19.897425 systemd[1]: Started nvidia.service. Oct 2 19:25:19.903359 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:25:19.907362 systemd[1]: Starting prepare-critools.service... Oct 2 19:25:19.913841 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:25:19.917908 systemd[1]: Starting sshd-keygen.service... Oct 2 19:25:19.925288 systemd[1]: Starting systemd-logind.service... Oct 2 19:25:19.927685 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:25:19.927833 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 19:25:19.929595 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:25:19.931809 systemd[1]: Starting update-engine.service... Oct 2 19:25:19.937017 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:25:19.975204 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:25:19.975625 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:25:19.987723 jq[1714]: false Oct 2 19:25:20.013394 jq[1724]: true Oct 2 19:25:20.050990 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:25:20.051342 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:25:20.118462 jq[1745]: true Oct 2 19:25:20.169046 extend-filesystems[1715]: Found nvme0n1 Oct 2 19:25:20.172189 extend-filesystems[1715]: Found nvme0n1p1 Oct 2 19:25:20.172968 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:25:20.173296 systemd[1]: Finished motdgen.service. Oct 2 19:25:20.175750 extend-filesystems[1715]: Found nvme0n1p2 Oct 2 19:25:20.195217 extend-filesystems[1715]: Found nvme0n1p3 Oct 2 19:25:20.197571 extend-filesystems[1715]: Found usr Oct 2 19:25:20.207656 tar[1726]: ./ Oct 2 19:25:20.207656 tar[1726]: ./loopback Oct 2 19:25:20.208362 extend-filesystems[1715]: Found nvme0n1p4 Oct 2 19:25:20.213546 extend-filesystems[1715]: Found nvme0n1p6 Oct 2 19:25:20.216639 tar[1730]: crictl Oct 2 19:25:20.217114 extend-filesystems[1715]: Found nvme0n1p7 Oct 2 19:25:20.218839 extend-filesystems[1715]: Found nvme0n1p9 Oct 2 19:25:20.222523 extend-filesystems[1715]: Checking size of /dev/nvme0n1p9 Oct 2 19:25:20.313577 systemd-logind[1722]: Watching system buttons on /dev/input/event0 (Power Button) Oct 2 19:25:20.322978 systemd-logind[1722]: New seat seat0. Oct 2 19:25:20.440728 extend-filesystems[1715]: Resized partition /dev/nvme0n1p9 Oct 2 19:25:20.471208 amazon-ssm-agent[1710]: 2023/10/02 19:25:20 Failed to load instance info from vault. RegistrationKey does not exist. Oct 2 19:25:20.481314 tar[1726]: ./bandwidth Oct 2 19:25:20.483735 amazon-ssm-agent[1710]: Initializing new seelog logger Oct 2 19:25:20.491553 amazon-ssm-agent[1710]: New Seelog Logger Creation Complete Oct 2 19:25:20.492305 env[1732]: time="2023-10-02T19:25:20.492226782Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:25:20.499647 amazon-ssm-agent[1710]: 2023/10/02 19:25:20 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 19:25:20.499829 amazon-ssm-agent[1710]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 19:25:20.500457 amazon-ssm-agent[1710]: 2023/10/02 19:25:20 processing appconfig overrides Oct 2 19:25:20.562578 extend-filesystems[1785]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 19:25:20.627421 tar[1726]: ./ptp Oct 2 19:25:20.662827 systemd[1]: nvidia.service: Deactivated successfully. Oct 2 19:25:20.701085 systemd[1]: Started dbus.service. Oct 2 19:25:20.700797 dbus-daemon[1713]: [system] SELinux support is enabled Oct 2 19:25:20.716530 env[1732]: time="2023-10-02T19:25:20.670867423Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:25:20.716530 env[1732]: time="2023-10-02T19:25:20.714326083Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:25:20.705811 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:25:20.705855 systemd[1]: Reached target system-config.target. Oct 2 19:25:20.707821 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:25:20.707851 systemd[1]: Reached target user-config.target. Oct 2 19:25:20.726072 systemd[1]: Started systemd-logind.service. Oct 2 19:25:20.728762 dbus-daemon[1713]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 19:25:20.732349 dbus-daemon[1713]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1538 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 2 19:25:20.737557 env[1732]: time="2023-10-02T19:25:20.737363935Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:25:20.737557 env[1732]: time="2023-10-02T19:25:20.737549983Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:25:20.738023 env[1732]: time="2023-10-02T19:25:20.737966023Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:25:20.738122 env[1732]: time="2023-10-02T19:25:20.738018499Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:25:20.738122 env[1732]: time="2023-10-02T19:25:20.738052603Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:25:20.738122 env[1732]: time="2023-10-02T19:25:20.738077899Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:25:20.738304 env[1732]: time="2023-10-02T19:25:20.738255955Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:25:20.739074 env[1732]: time="2023-10-02T19:25:20.738988891Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:25:20.739351 env[1732]: time="2023-10-02T19:25:20.739296835Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:25:20.739473 env[1732]: time="2023-10-02T19:25:20.739347739Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:25:20.739671 env[1732]: time="2023-10-02T19:25:20.739616563Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:25:20.739757 env[1732]: time="2023-10-02T19:25:20.739677811Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:25:20.749055 systemd[1]: Starting systemd-hostnamed.service... Oct 2 19:25:20.760414 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Oct 2 19:25:20.811811 update_engine[1723]: I1002 19:25:20.811343 1723 main.cc:92] Flatcar Update Engine starting Oct 2 19:25:20.842939 update_engine[1723]: I1002 19:25:20.822588 1723 update_check_scheduler.cc:74] Next update check in 7m37s Oct 2 19:25:20.817975 systemd[1]: Started update-engine.service. Oct 2 19:25:20.845822 systemd[1]: Started locksmithd.service. Oct 2 19:25:21.069706 coreos-metadata[1712]: Oct 02 19:25:21.069 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Oct 2 19:25:21.074957 coreos-metadata[1712]: Oct 02 19:25:21.071 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Oct 2 19:25:21.074957 coreos-metadata[1712]: Oct 02 19:25:21.073 INFO Fetch successful Oct 2 19:25:21.074957 coreos-metadata[1712]: Oct 02 19:25:21.073 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Oct 2 19:25:21.077811 coreos-metadata[1712]: Oct 02 19:25:21.076 INFO Fetch successful Oct 2 19:25:21.079403 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Oct 2 19:25:21.199792 extend-filesystems[1785]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Oct 2 19:25:21.199792 extend-filesystems[1785]: old_desc_blocks = 1, new_desc_blocks = 1 Oct 2 19:25:21.199792 extend-filesystems[1785]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Oct 2 19:25:21.318971 extend-filesystems[1715]: Resized filesystem in /dev/nvme0n1p9 Oct 2 19:25:21.328824 bash[1783]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:25:21.204098 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:25:21.329157 env[1732]: time="2023-10-02T19:25:21.283891962Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:25:21.329157 env[1732]: time="2023-10-02T19:25:21.283983162Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:25:21.329157 env[1732]: time="2023-10-02T19:25:21.284080482Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:25:21.329157 env[1732]: time="2023-10-02T19:25:21.284178054Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:25:21.329157 env[1732]: time="2023-10-02T19:25:21.284237118Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:25:21.329157 env[1732]: time="2023-10-02T19:25:21.284275074Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:25:21.329157 env[1732]: time="2023-10-02T19:25:21.284336730Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:25:21.329157 env[1732]: time="2023-10-02T19:25:21.285108582Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:25:21.329157 env[1732]: time="2023-10-02T19:25:21.285160398Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:25:21.329157 env[1732]: time="2023-10-02T19:25:21.285217734Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:25:21.329157 env[1732]: time="2023-10-02T19:25:21.285250878Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:25:21.329157 env[1732]: time="2023-10-02T19:25:21.285306606Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:25:21.329157 env[1732]: time="2023-10-02T19:25:21.323863554Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:25:21.329157 env[1732]: time="2023-10-02T19:25:21.324136110Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:25:21.335122 tar[1726]: ./vlan Oct 2 19:25:21.204504 systemd[1]: Finished extend-filesystems.service. Oct 2 19:25:21.337271 env[1732]: time="2023-10-02T19:25:21.325203162Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:25:21.337271 env[1732]: time="2023-10-02T19:25:21.325298562Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:25:21.337271 env[1732]: time="2023-10-02T19:25:21.325357614Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:25:21.337271 env[1732]: time="2023-10-02T19:25:21.325577394Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:25:21.337271 env[1732]: time="2023-10-02T19:25:21.325638186Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:25:21.337271 env[1732]: time="2023-10-02T19:25:21.325673202Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:25:21.337271 env[1732]: time="2023-10-02T19:25:21.325728174Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:25:21.337271 env[1732]: time="2023-10-02T19:25:21.325762098Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:25:21.337271 env[1732]: time="2023-10-02T19:25:21.325817502Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:25:21.337271 env[1732]: time="2023-10-02T19:25:21.325848966Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:25:21.337271 env[1732]: time="2023-10-02T19:25:21.325903218Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:25:21.337271 env[1732]: time="2023-10-02T19:25:21.325941234Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:25:21.337271 env[1732]: time="2023-10-02T19:25:21.326341926Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:25:21.337271 env[1732]: time="2023-10-02T19:25:21.326410950Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:25:21.337271 env[1732]: time="2023-10-02T19:25:21.326451018Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:25:21.273798 unknown[1712]: wrote ssh authorized keys file for user: core Oct 2 19:25:21.338555 env[1732]: time="2023-10-02T19:25:21.326506146Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:25:21.338555 env[1732]: time="2023-10-02T19:25:21.326540634Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:25:21.338555 env[1732]: time="2023-10-02T19:25:21.326597022Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:25:21.338555 env[1732]: time="2023-10-02T19:25:21.326662686Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:25:21.338555 env[1732]: time="2023-10-02T19:25:21.326777334Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:25:21.279782 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:25:21.338964 env[1732]: time="2023-10-02T19:25:21.327286086Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:25:21.338964 env[1732]: time="2023-10-02T19:25:21.327432090Z" level=info msg="Connect containerd service" Oct 2 19:25:21.338964 env[1732]: time="2023-10-02T19:25:21.327524178Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:25:21.338964 env[1732]: time="2023-10-02T19:25:21.333238338Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:25:21.338964 env[1732]: time="2023-10-02T19:25:21.334143342Z" level=info msg="Start subscribing containerd event" Oct 2 19:25:21.338964 env[1732]: time="2023-10-02T19:25:21.334212570Z" level=info msg="Start recovering state" Oct 2 19:25:21.338964 env[1732]: time="2023-10-02T19:25:21.334333794Z" level=info msg="Start event monitor" Oct 2 19:25:21.338964 env[1732]: time="2023-10-02T19:25:21.334503078Z" level=info msg="Start snapshots syncer" Oct 2 19:25:21.338964 env[1732]: time="2023-10-02T19:25:21.334532898Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:25:21.338964 env[1732]: time="2023-10-02T19:25:21.334572546Z" level=info msg="Start streaming server" Oct 2 19:25:21.355594 env[1732]: time="2023-10-02T19:25:21.345612246Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:25:21.355594 env[1732]: time="2023-10-02T19:25:21.347986266Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:25:21.355594 env[1732]: time="2023-10-02T19:25:21.352632678Z" level=info msg="containerd successfully booted in 0.862076s" Oct 2 19:25:21.348350 systemd[1]: Started containerd.service. Oct 2 19:25:21.381897 update-ssh-keys[1884]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:25:21.383059 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 19:25:21.465233 tar[1726]: ./host-device Oct 2 19:25:21.536605 tar[1726]: ./tuning Oct 2 19:25:21.614243 amazon-ssm-agent[1710]: 2023-10-02 19:25:21 INFO Entering SSM Agent hibernate - AccessDeniedException: User: arn:aws:sts::075585003325:assumed-role/jenkins-test/i-050853d88a17c3584 is not authorized to perform: ssm:UpdateInstanceInformation on resource: arn:aws:ec2:us-west-2:075585003325:instance/i-050853d88a17c3584 because no identity-based policy allows the ssm:UpdateInstanceInformation action Oct 2 19:25:21.614243 amazon-ssm-agent[1710]: status code: 400, request id: a0a45dd4-57da-45f0-9e9e-f9d85c03a133 Oct 2 19:25:21.615091 amazon-ssm-agent[1710]: 2023-10-02 19:25:21 INFO Agent is in hibernate mode. Reducing logging. Logging will be reduced to one log per backoff period Oct 2 19:25:21.618296 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:25:21.633582 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:25:21.638434 tar[1726]: ./vrf Oct 2 19:25:21.639607 dbus-daemon[1713]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 2 19:25:21.639854 systemd[1]: Started systemd-hostnamed.service. Oct 2 19:25:21.642865 dbus-daemon[1713]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1805 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 2 19:25:21.647537 systemd[1]: Starting polkit.service... Oct 2 19:25:21.705057 polkitd[1893]: Started polkitd version 121 Oct 2 19:25:21.740653 polkitd[1893]: Loading rules from directory /etc/polkit-1/rules.d Oct 2 19:25:21.740964 polkitd[1893]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 2 19:25:21.747582 polkitd[1893]: Finished loading, compiling and executing 2 rules Oct 2 19:25:21.748562 dbus-daemon[1713]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 2 19:25:21.748825 systemd[1]: Started polkit.service. Oct 2 19:25:21.751780 polkitd[1893]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 2 19:25:21.774064 tar[1726]: ./sbr Oct 2 19:25:21.791148 systemd-hostnamed[1805]: Hostname set to (transient) Oct 2 19:25:21.791292 systemd-resolved[1681]: System hostname changed to 'ip-172-31-27-184'. Oct 2 19:25:21.840557 tar[1726]: ./tap Oct 2 19:25:21.906728 tar[1726]: ./dhcp Oct 2 19:25:22.107756 tar[1726]: ./static Oct 2 19:25:22.165833 tar[1726]: ./firewall Oct 2 19:25:22.238910 tar[1726]: ./macvlan Oct 2 19:25:22.330056 tar[1726]: ./dummy Oct 2 19:25:22.405982 tar[1726]: ./bridge Oct 2 19:25:22.529053 tar[1726]: ./ipvlan Oct 2 19:25:22.626114 systemd[1]: Finished prepare-critools.service. Oct 2 19:25:22.646306 tar[1726]: ./portmap Oct 2 19:25:22.705835 tar[1726]: ./host-local Oct 2 19:25:22.786416 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:25:22.997423 locksmithd[1811]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:25:23.967480 sshd_keygen[1746]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:25:24.025195 systemd[1]: Finished sshd-keygen.service. Oct 2 19:25:24.029991 systemd[1]: Starting issuegen.service... Oct 2 19:25:24.049260 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:25:24.049641 systemd[1]: Finished issuegen.service. Oct 2 19:25:24.054469 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:25:24.076436 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:25:24.081661 systemd[1]: Started getty@tty1.service. Oct 2 19:25:24.087059 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:25:24.089926 systemd[1]: Reached target getty.target. Oct 2 19:25:24.091836 systemd[1]: Reached target multi-user.target. Oct 2 19:25:24.096186 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:25:24.119233 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:25:24.119642 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:25:24.121995 systemd[1]: Startup finished in 1.183s (kernel) + 13.324s (initrd) + 13.195s (userspace) = 27.704s. Oct 2 19:25:29.880055 systemd[1]: Created slice system-sshd.slice. Oct 2 19:25:29.882803 systemd[1]: Started sshd@0-172.31.27.184:22-139.178.89.65:52316.service. Oct 2 19:25:30.070285 sshd[1928]: Accepted publickey for core from 139.178.89.65 port 52316 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:25:30.074890 sshd[1928]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:25:30.092881 systemd[1]: Created slice user-500.slice. Oct 2 19:25:30.095354 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:25:30.101817 systemd-logind[1722]: New session 1 of user core. Oct 2 19:25:30.123269 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:25:30.126824 systemd[1]: Starting user@500.service... Oct 2 19:25:30.138791 (systemd)[1931]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:25:30.338341 systemd[1931]: Queued start job for default target default.target. Oct 2 19:25:30.340709 systemd[1931]: Reached target paths.target. Oct 2 19:25:30.340945 systemd[1931]: Reached target sockets.target. Oct 2 19:25:30.341101 systemd[1931]: Reached target timers.target. Oct 2 19:25:30.341260 systemd[1931]: Reached target basic.target. Oct 2 19:25:30.341510 systemd[1931]: Reached target default.target. Oct 2 19:25:30.341604 systemd[1]: Started user@500.service. Oct 2 19:25:30.342428 systemd[1931]: Startup finished in 185ms. Oct 2 19:25:30.343409 systemd[1]: Started session-1.scope. Oct 2 19:25:30.506582 systemd[1]: Started sshd@1-172.31.27.184:22-139.178.89.65:52320.service. Oct 2 19:25:30.685565 sshd[1940]: Accepted publickey for core from 139.178.89.65 port 52320 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:25:30.688825 sshd[1940]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:25:30.698024 systemd[1]: Started session-2.scope. Oct 2 19:25:30.698961 systemd-logind[1722]: New session 2 of user core. Oct 2 19:25:30.846992 sshd[1940]: pam_unix(sshd:session): session closed for user core Oct 2 19:25:30.853138 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 19:25:30.854309 systemd-logind[1722]: Session 2 logged out. Waiting for processes to exit. Oct 2 19:25:30.854707 systemd[1]: sshd@1-172.31.27.184:22-139.178.89.65:52320.service: Deactivated successfully. Oct 2 19:25:30.856805 systemd-logind[1722]: Removed session 2. Oct 2 19:25:30.879556 systemd[1]: Started sshd@2-172.31.27.184:22-139.178.89.65:52332.service. Oct 2 19:25:31.061982 sshd[1946]: Accepted publickey for core from 139.178.89.65 port 52332 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:25:31.065683 sshd[1946]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:25:31.073482 systemd-logind[1722]: New session 3 of user core. Oct 2 19:25:31.074458 systemd[1]: Started session-3.scope. Oct 2 19:25:31.206628 sshd[1946]: pam_unix(sshd:session): session closed for user core Oct 2 19:25:31.213032 systemd[1]: sshd@2-172.31.27.184:22-139.178.89.65:52332.service: Deactivated successfully. Oct 2 19:25:31.214255 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 19:25:31.215360 systemd-logind[1722]: Session 3 logged out. Waiting for processes to exit. Oct 2 19:25:31.217300 systemd-logind[1722]: Removed session 3. Oct 2 19:25:31.237127 systemd[1]: Started sshd@3-172.31.27.184:22-139.178.89.65:52344.service. Oct 2 19:25:31.420029 sshd[1952]: Accepted publickey for core from 139.178.89.65 port 52344 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:25:31.423725 sshd[1952]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:25:31.431513 systemd-logind[1722]: New session 4 of user core. Oct 2 19:25:31.432477 systemd[1]: Started session-4.scope. Oct 2 19:25:31.578500 sshd[1952]: pam_unix(sshd:session): session closed for user core Oct 2 19:25:31.584894 systemd[1]: sshd@3-172.31.27.184:22-139.178.89.65:52344.service: Deactivated successfully. Oct 2 19:25:31.586125 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:25:31.587124 systemd-logind[1722]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:25:31.588563 systemd-logind[1722]: Removed session 4. Oct 2 19:25:31.609301 systemd[1]: Started sshd@4-172.31.27.184:22-139.178.89.65:52348.service. Oct 2 19:25:31.791543 sshd[1958]: Accepted publickey for core from 139.178.89.65 port 52348 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:25:31.795579 sshd[1958]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:25:31.804521 systemd[1]: Started session-5.scope. Oct 2 19:25:31.805246 systemd-logind[1722]: New session 5 of user core. Oct 2 19:25:31.933037 sudo[1961]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:25:31.934178 sudo[1961]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:25:31.948639 dbus-daemon[1713]: avc: received setenforce notice (enforcing=1) Oct 2 19:25:31.951282 sudo[1961]: pam_unix(sudo:session): session closed for user root Oct 2 19:25:31.976014 sshd[1958]: pam_unix(sshd:session): session closed for user core Oct 2 19:25:31.982287 systemd[1]: sshd@4-172.31.27.184:22-139.178.89.65:52348.service: Deactivated successfully. Oct 2 19:25:31.983696 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:25:31.984951 systemd-logind[1722]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:25:31.986867 systemd-logind[1722]: Removed session 5. Oct 2 19:25:32.006363 systemd[1]: Started sshd@5-172.31.27.184:22-139.178.89.65:52352.service. Oct 2 19:25:32.190964 sshd[1965]: Accepted publickey for core from 139.178.89.65 port 52352 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:25:32.193957 sshd[1965]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:25:32.202468 systemd-logind[1722]: New session 6 of user core. Oct 2 19:25:32.202910 systemd[1]: Started session-6.scope. Oct 2 19:25:32.324876 sudo[1969]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:25:32.325954 sudo[1969]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:25:32.333705 sudo[1969]: pam_unix(sudo:session): session closed for user root Oct 2 19:25:32.348115 sudo[1968]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:25:32.349119 sudo[1968]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:25:32.374145 systemd[1]: Stopping audit-rules.service... Oct 2 19:25:32.377000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:25:32.380929 kernel: kauditd_printk_skb: 72 callbacks suppressed Oct 2 19:25:32.381012 kernel: audit: type=1305 audit(1696274732.377:160): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:25:32.377000 audit[1972]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcda87740 a2=420 a3=0 items=0 ppid=1 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:32.386294 auditctl[1972]: No rules Oct 2 19:25:32.387067 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:25:32.387436 systemd[1]: Stopped audit-rules.service. Oct 2 19:25:32.390412 systemd[1]: Starting audit-rules.service... Oct 2 19:25:32.377000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:25:32.402887 kernel: audit: type=1300 audit(1696274732.377:160): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcda87740 a2=420 a3=0 items=0 ppid=1 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:32.402948 kernel: audit: type=1327 audit(1696274732.377:160): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:25:32.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.412397 kernel: audit: type=1131 audit(1696274732.385:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.456907 augenrules[1989]: No rules Oct 2 19:25:32.459239 systemd[1]: Finished audit-rules.service. Oct 2 19:25:32.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.466686 sudo[1968]: pam_unix(sudo:session): session closed for user root Oct 2 19:25:32.465000 audit[1968]: USER_END pid=1968 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.479184 kernel: audit: type=1130 audit(1696274732.458:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.479358 kernel: audit: type=1106 audit(1696274732.465:163): pid=1968 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.479614 kernel: audit: type=1104 audit(1696274732.465:164): pid=1968 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.465000 audit[1968]: CRED_DISP pid=1968 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.491991 sshd[1965]: pam_unix(sshd:session): session closed for user core Oct 2 19:25:32.492000 audit[1965]: USER_END pid=1965 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:25:32.498185 systemd-logind[1722]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:25:32.499613 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:25:32.500693 systemd[1]: sshd@5-172.31.27.184:22-139.178.89.65:52352.service: Deactivated successfully. Oct 2 19:25:32.503489 systemd-logind[1722]: Removed session 6. Oct 2 19:25:32.492000 audit[1965]: CRED_DISP pid=1965 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:25:32.517618 kernel: audit: type=1106 audit(1696274732.492:165): pid=1965 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:25:32.517743 kernel: audit: type=1104 audit(1696274732.492:166): pid=1965 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:25:32.517787 kernel: audit: type=1131 audit(1696274732.498:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.27.184:22-139.178.89.65:52352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.27.184:22-139.178.89.65:52352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.525911 systemd[1]: Started sshd@6-172.31.27.184:22-139.178.89.65:52362.service. Oct 2 19:25:32.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.184:22-139.178.89.65:52362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.710000 audit[1995]: USER_ACCT pid=1995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:25:32.713406 sshd[1995]: Accepted publickey for core from 139.178.89.65 port 52362 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:25:32.713000 audit[1995]: CRED_ACQ pid=1995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:25:32.713000 audit[1995]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffca8dfc70 a2=3 a3=1 items=0 ppid=1 pid=1995 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:32.713000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:25:32.716055 sshd[1995]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:25:32.724537 systemd[1]: Started session-7.scope. Oct 2 19:25:32.725263 systemd-logind[1722]: New session 7 of user core. Oct 2 19:25:32.733000 audit[1995]: USER_START pid=1995 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:25:32.739000 audit[1997]: CRED_ACQ pid=1997 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:25:32.844000 audit[1998]: USER_ACCT pid=1998 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.846672 sudo[1998]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:25:32.845000 audit[1998]: CRED_REFR pid=1998 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.847717 sudo[1998]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:25:32.850000 audit[1998]: USER_START pid=1998 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:25:33.580608 systemd[1]: Starting docker.service... Oct 2 19:25:33.689189 env[2013]: time="2023-10-02T19:25:33.689099755Z" level=info msg="Starting up" Oct 2 19:25:33.692396 env[2013]: time="2023-10-02T19:25:33.692335039Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:25:33.692625 env[2013]: time="2023-10-02T19:25:33.692595691Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:25:33.692762 env[2013]: time="2023-10-02T19:25:33.692729887Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:25:33.692870 env[2013]: time="2023-10-02T19:25:33.692843527Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:25:33.697353 env[2013]: time="2023-10-02T19:25:33.697310167Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:25:33.697734 env[2013]: time="2023-10-02T19:25:33.697703647Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:25:33.697861 env[2013]: time="2023-10-02T19:25:33.697831711Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:25:33.697993 env[2013]: time="2023-10-02T19:25:33.697965859Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:25:33.709842 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport251643470-merged.mount: Deactivated successfully. Oct 2 19:25:33.754273 env[2013]: time="2023-10-02T19:25:33.754213544Z" level=info msg="Loading containers: start." Oct 2 19:25:33.858000 audit[2044]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2044 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:33.858000 audit[2044]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffff1bab900 a2=0 a3=1 items=0 ppid=2013 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:33.858000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 19:25:33.866000 audit[2046]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2046 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:33.866000 audit[2046]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=fffff8bc18c0 a2=0 a3=1 items=0 ppid=2013 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:33.866000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 19:25:33.873000 audit[2048]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2048 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:33.873000 audit[2048]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe964cf10 a2=0 a3=1 items=0 ppid=2013 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:33.873000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:25:33.879000 audit[2050]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2050 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:33.879000 audit[2050]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe21d32e0 a2=0 a3=1 items=0 ppid=2013 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:33.879000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:25:33.888000 audit[2052]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2052 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:33.888000 audit[2052]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe78edfc0 a2=0 a3=1 items=0 ppid=2013 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:33.888000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 19:25:33.927000 audit[2057]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2057 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:33.927000 audit[2057]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe701ea50 a2=0 a3=1 items=0 ppid=2013 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:33.927000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 19:25:33.944000 audit[2059]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2059 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:33.944000 audit[2059]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc145a9a0 a2=0 a3=1 items=0 ppid=2013 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:33.944000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 19:25:33.951000 audit[2061]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2061 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:33.951000 audit[2061]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffe850cb50 a2=0 a3=1 items=0 ppid=2013 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:33.951000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 19:25:33.958000 audit[2063]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2063 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:33.958000 audit[2063]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffcb9f2830 a2=0 a3=1 items=0 ppid=2013 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:33.958000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:25:33.978000 audit[2067]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2067 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:33.978000 audit[2067]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc0cdad30 a2=0 a3=1 items=0 ppid=2013 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:33.978000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:25:33.982000 audit[2068]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2068 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:33.982000 audit[2068]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd11d77c0 a2=0 a3=1 items=0 ppid=2013 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:33.982000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:25:33.996434 kernel: Initializing XFRM netlink socket Oct 2 19:25:34.040575 env[2013]: time="2023-10-02T19:25:34.040528373Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 19:25:34.043002 (udev-worker)[2024]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:25:34.043527 systemd-timesyncd[1682]: Network configuration changed, trying to establish connection. Oct 2 19:25:34.077000 audit[2076]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2076 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:34.077000 audit[2076]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffe2ea8320 a2=0 a3=1 items=0 ppid=2013 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:34.077000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 19:25:34.096000 audit[2079]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2079 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:34.096000 audit[2079]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffc0449a90 a2=0 a3=1 items=0 ppid=2013 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:34.096000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 19:25:34.106000 audit[2082]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2082 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:34.106000 audit[2082]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff3a2e6a0 a2=0 a3=1 items=0 ppid=2013 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:34.106000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 19:25:34.113000 audit[2084]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2084 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:34.113000 audit[2084]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffe45dd840 a2=0 a3=1 items=0 ppid=2013 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:34.113000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 19:25:34.121000 audit[2086]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2086 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:34.121000 audit[2086]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffc59bce50 a2=0 a3=1 items=0 ppid=2013 pid=2086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:34.121000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 19:25:34.129000 audit[2088]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2088 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:34.129000 audit[2088]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffff99bc70 a2=0 a3=1 items=0 ppid=2013 pid=2088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:34.129000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 19:25:34.136000 audit[2090]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2090 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:34.136000 audit[2090]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffd8736a30 a2=0 a3=1 items=0 ppid=2013 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:34.136000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 19:25:34.155000 audit[2093]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2093 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:34.155000 audit[2093]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffc6c02fb0 a2=0 a3=1 items=0 ppid=2013 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:34.155000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 19:25:34.162000 audit[2095]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2095 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:34.162000 audit[2095]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=fffff9729fb0 a2=0 a3=1 items=0 ppid=2013 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:34.162000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:25:34.171000 audit[2097]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2097 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:34.171000 audit[2097]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffefcb80e0 a2=0 a3=1 items=0 ppid=2013 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:34.171000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:25:34.179000 audit[2099]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2099 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:34.179000 audit[2099]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffce7a3ac0 a2=0 a3=1 items=0 ppid=2013 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:34.179000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 19:25:34.181702 systemd-networkd[1538]: docker0: Link UP Oct 2 19:25:34.202000 audit[2103]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2103 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:34.202000 audit[2103]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffff8dcc10 a2=0 a3=1 items=0 ppid=2013 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:34.202000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:25:34.207000 audit[2104]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2104 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:25:34.207000 audit[2104]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffffdf99d20 a2=0 a3=1 items=0 ppid=2013 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:34.207000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:25:34.209778 env[2013]: time="2023-10-02T19:25:34.209736990Z" level=info msg="Loading containers: done." Oct 2 19:25:34.701873 systemd-resolved[1681]: Clock change detected. Flushing caches. Oct 2 19:25:34.702735 systemd-timesyncd[1682]: Contacted time server 162.159.200.123:123 (2.flatcar.pool.ntp.org). Oct 2 19:25:34.703212 systemd-timesyncd[1682]: Initial clock synchronization to Mon 2023-10-02 19:25:34.701615 UTC. Oct 2 19:25:34.728911 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck841709343-merged.mount: Deactivated successfully. Oct 2 19:25:34.744106 env[2013]: time="2023-10-02T19:25:34.744030901Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 19:25:34.744823 env[2013]: time="2023-10-02T19:25:34.744792445Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 19:25:34.745177 env[2013]: time="2023-10-02T19:25:34.745152097Z" level=info msg="Daemon has completed initialization" Oct 2 19:25:34.779242 systemd[1]: Started docker.service. Oct 2 19:25:34.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:34.796366 env[2013]: time="2023-10-02T19:25:34.795955441Z" level=info msg="API listen on /run/docker.sock" Oct 2 19:25:34.844100 systemd[1]: Reloading. Oct 2 19:25:35.030558 /usr/lib/systemd/system-generators/torcx-generator[2157]: time="2023-10-02T19:25:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:25:35.034257 /usr/lib/systemd/system-generators/torcx-generator[2157]: time="2023-10-02T19:25:35Z" level=info msg="torcx already run" Oct 2 19:25:35.259521 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:25:35.259560 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:25:35.297017 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:25:35.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.455000 audit: BPF prog-id=37 op=LOAD Oct 2 19:25:35.455000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:25:35.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.455000 audit: BPF prog-id=38 op=LOAD Oct 2 19:25:35.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.456000 audit: BPF prog-id=39 op=LOAD Oct 2 19:25:35.456000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:25:35.456000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:25:35.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.460000 audit: BPF prog-id=40 op=LOAD Oct 2 19:25:35.460000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:25:35.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.461000 audit: BPF prog-id=41 op=LOAD Oct 2 19:25:35.461000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:25:35.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.462000 audit: BPF prog-id=42 op=LOAD Oct 2 19:25:35.462000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:25:35.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.463000 audit: BPF prog-id=43 op=LOAD Oct 2 19:25:35.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.463000 audit: BPF prog-id=44 op=LOAD Oct 2 19:25:35.463000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:25:35.463000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:25:35.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.469000 audit: BPF prog-id=45 op=LOAD Oct 2 19:25:35.469000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:25:35.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.470000 audit: BPF prog-id=46 op=LOAD Oct 2 19:25:35.471000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit: BPF prog-id=47 op=LOAD Oct 2 19:25:35.472000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit: BPF prog-id=48 op=LOAD Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.472000 audit: BPF prog-id=49 op=LOAD Oct 2 19:25:35.472000 audit: BPF prog-id=33 op=UNLOAD Oct 2 19:25:35.472000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:25:35.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.475000 audit: BPF prog-id=50 op=LOAD Oct 2 19:25:35.475000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:25:35.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.475000 audit: BPF prog-id=51 op=LOAD Oct 2 19:25:35.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.475000 audit: BPF prog-id=52 op=LOAD Oct 2 19:25:35.475000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:25:35.475000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:25:35.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.477000 audit: BPF prog-id=53 op=LOAD Oct 2 19:25:35.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:25:35.477000 audit: BPF prog-id=54 op=LOAD Oct 2 19:25:35.477000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:25:35.477000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:25:35.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:35.498392 systemd[1]: Started kubelet.service. Oct 2 19:25:35.685469 kubelet[2205]: E1002 19:25:35.685278 2205 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:25:35.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:25:35.694930 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:25:35.695229 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:25:35.954213 env[1732]: time="2023-10-02T19:25:35.954023631Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\"" Oct 2 19:25:36.656858 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1517526415.mount: Deactivated successfully. Oct 2 19:25:40.404791 env[1732]: time="2023-10-02T19:25:40.404721929Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:40.408185 env[1732]: time="2023-10-02T19:25:40.408108197Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:30bb499447fe1bc655853e2e8ac386cdeb28c80263536259cb54f290f9a58d6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:40.413943 env[1732]: time="2023-10-02T19:25:40.412268369Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:40.417789 env[1732]: time="2023-10-02T19:25:40.416563973Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:6beea2e5531a0606613594fd3ed92d71bbdcef99dd3237522049a0b32cad736c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:40.418381 env[1732]: time="2023-10-02T19:25:40.418338221Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\" returns image reference \"sha256:30bb499447fe1bc655853e2e8ac386cdeb28c80263536259cb54f290f9a58d6c\"" Oct 2 19:25:40.447598 env[1732]: time="2023-10-02T19:25:40.447544697Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\"" Oct 2 19:25:44.660339 env[1732]: time="2023-10-02T19:25:44.660279886Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:44.665727 env[1732]: time="2023-10-02T19:25:44.665646022Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:89d57b83c17862d0ca2dd214e9e5ad425f8d67ecba32d10b846f8d22d3b5597c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:44.669113 env[1732]: time="2023-10-02T19:25:44.669053638Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:44.674869 env[1732]: time="2023-10-02T19:25:44.674773174Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6a42ce14d716205a99763f3c732c0a8f0ea041bdbbea7d2dfffcc53dafd7cac4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:44.675703 env[1732]: time="2023-10-02T19:25:44.675631546Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\" returns image reference \"sha256:89d57b83c17862d0ca2dd214e9e5ad425f8d67ecba32d10b846f8d22d3b5597c\"" Oct 2 19:25:44.704511 env[1732]: time="2023-10-02T19:25:44.704442947Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\"" Oct 2 19:25:45.956660 kernel: kauditd_printk_skb: 292 callbacks suppressed Oct 2 19:25:45.956844 kernel: audit: type=1130 audit(1696274745.946:410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:45.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:45.946500 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 19:25:45.946877 systemd[1]: Stopped kubelet.service. Oct 2 19:25:45.949512 systemd[1]: Started kubelet.service. Oct 2 19:25:45.971737 kernel: audit: type=1131 audit(1696274745.946:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:45.971857 kernel: audit: type=1130 audit(1696274745.949:412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:45.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:45.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.103756 kubelet[2233]: E1002 19:25:46.103659 2233 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:25:46.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:25:46.111059 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:25:46.111358 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:25:46.120720 kernel: audit: type=1131 audit(1696274746.111:413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:25:47.700522 env[1732]: time="2023-10-02T19:25:47.700420921Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:47.703608 env[1732]: time="2023-10-02T19:25:47.703522753Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:64fc40cee3716a4596d219b360ce536adb7998eaeae3f5dbb774d6503f5039d7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:47.707163 env[1732]: time="2023-10-02T19:25:47.707114377Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:47.711353 env[1732]: time="2023-10-02T19:25:47.711284569Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:6511193f8114a2f011790619698efe12a8119ed9a17e2e36f4c1c759ccf173ab,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:47.713554 env[1732]: time="2023-10-02T19:25:47.713489677Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\" returns image reference \"sha256:64fc40cee3716a4596d219b360ce536adb7998eaeae3f5dbb774d6503f5039d7\"" Oct 2 19:25:47.744726 env[1732]: time="2023-10-02T19:25:47.744621554Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\"" Oct 2 19:25:49.194031 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1268223363.mount: Deactivated successfully. Oct 2 19:25:49.999578 env[1732]: time="2023-10-02T19:25:49.999509381Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:50.003579 env[1732]: time="2023-10-02T19:25:50.003512905Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7da62c127fc0f2c3473babe4dd0fe1da874278c4e524a490b1781e3e0e6dddfa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:50.006039 env[1732]: time="2023-10-02T19:25:50.005982937Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:50.008471 env[1732]: time="2023-10-02T19:25:50.008401501Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:41c8f92d1cd571e0e36af431f35c78379f84f5daf5b85d43014a9940d697afcf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:50.009519 env[1732]: time="2023-10-02T19:25:50.009478153Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\" returns image reference \"sha256:7da62c127fc0f2c3473babe4dd0fe1da874278c4e524a490b1781e3e0e6dddfa\"" Oct 2 19:25:50.038399 env[1732]: time="2023-10-02T19:25:50.038351005Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 19:25:50.534943 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2125022576.mount: Deactivated successfully. Oct 2 19:25:50.545127 env[1732]: time="2023-10-02T19:25:50.545052628Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:50.548591 env[1732]: time="2023-10-02T19:25:50.548529808Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:50.551583 env[1732]: time="2023-10-02T19:25:50.551524924Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:50.554527 env[1732]: time="2023-10-02T19:25:50.554479336Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:50.555642 env[1732]: time="2023-10-02T19:25:50.555599716Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Oct 2 19:25:50.584848 env[1732]: time="2023-10-02T19:25:50.584796712Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Oct 2 19:25:52.311397 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 2 19:25:52.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:52.320779 kernel: audit: type=1131 audit(1696274752.311:414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:52.344000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:25:52.344000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:25:52.350028 kernel: audit: type=1334 audit(1696274752.344:415): prog-id=49 op=UNLOAD Oct 2 19:25:52.350118 kernel: audit: type=1334 audit(1696274752.344:416): prog-id=48 op=UNLOAD Oct 2 19:25:52.350172 kernel: audit: type=1334 audit(1696274752.344:417): prog-id=47 op=UNLOAD Oct 2 19:25:52.344000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:25:56.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:56.362766 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 2 19:25:56.363092 systemd[1]: Stopped kubelet.service. Oct 2 19:25:56.365800 systemd[1]: Started kubelet.service. Oct 2 19:25:56.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:56.379954 kernel: audit: type=1130 audit(1696274756.362:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:56.380088 kernel: audit: type=1131 audit(1696274756.362:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:56.380138 kernel: audit: type=1130 audit(1696274756.365:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:56.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:56.508931 kubelet[2259]: E1002 19:25:56.508838 2259 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:25:56.513537 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:25:56.513899 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:25:56.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:25:56.523714 kernel: audit: type=1131 audit(1696274756.513:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:25:59.770356 env[1732]: time="2023-10-02T19:25:59.770272657Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:59.773577 env[1732]: time="2023-10-02T19:25:59.773514817Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:59.777234 env[1732]: time="2023-10-02T19:25:59.777179821Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:59.780633 env[1732]: time="2023-10-02T19:25:59.780573277Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:25:59.782609 env[1732]: time="2023-10-02T19:25:59.782563825Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace\"" Oct 2 19:25:59.810980 env[1732]: time="2023-10-02T19:25:59.810902966Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Oct 2 19:26:00.307852 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3930488615.mount: Deactivated successfully. Oct 2 19:26:01.219382 env[1732]: time="2023-10-02T19:26:01.219313585Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:01.224389 env[1732]: time="2023-10-02T19:26:01.224327629Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:01.228614 env[1732]: time="2023-10-02T19:26:01.228547681Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:01.231959 env[1732]: time="2023-10-02T19:26:01.231899005Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:01.233264 env[1732]: time="2023-10-02T19:26:01.233218717Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Oct 2 19:26:06.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:06.690401 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Oct 2 19:26:06.690773 systemd[1]: Stopped kubelet.service. Oct 2 19:26:06.693406 systemd[1]: Started kubelet.service. Oct 2 19:26:06.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:06.710424 kernel: audit: type=1130 audit(1696274766.690:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:06.710565 kernel: audit: type=1131 audit(1696274766.690:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:06.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:06.728323 kernel: audit: type=1130 audit(1696274766.690:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:06.852435 kubelet[2333]: E1002 19:26:06.852375 2333 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:26:06.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:26:06.856917 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:26:06.857224 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:26:06.866862 kernel: audit: type=1131 audit(1696274766.856:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:26:06.918789 update_engine[1723]: I1002 19:26:06.918732 1723 update_attempter.cc:505] Updating boot flags... Oct 2 19:26:07.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:07.569345 systemd[1]: Stopped kubelet.service. Oct 2 19:26:07.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:07.602008 kernel: audit: type=1130 audit(1696274767.568:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:07.602153 kernel: audit: type=1131 audit(1696274767.576:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:07.634472 systemd[1]: Reloading. Oct 2 19:26:07.932989 /usr/lib/systemd/system-generators/torcx-generator[2511]: time="2023-10-02T19:26:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:26:07.933065 /usr/lib/systemd/system-generators/torcx-generator[2511]: time="2023-10-02T19:26:07Z" level=info msg="torcx already run" Oct 2 19:26:08.296658 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:26:08.298793 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:26:08.344406 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:26:08.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.530050 kernel: audit: type=1400 audit(1696274768.514:428): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.530135 kernel: audit: type=1400 audit(1696274768.514:429): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.530183 kernel: audit: type=1400 audit(1696274768.514:430): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.545143 kernel: audit: type=1400 audit(1696274768.514:431): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.522000 audit: BPF prog-id=55 op=LOAD Oct 2 19:26:08.522000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:26:08.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.529000 audit: BPF prog-id=56 op=LOAD Oct 2 19:26:08.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.537000 audit: BPF prog-id=57 op=LOAD Oct 2 19:26:08.537000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:26:08.537000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:26:08.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.547000 audit: BPF prog-id=58 op=LOAD Oct 2 19:26:08.547000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:26:08.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.548000 audit: BPF prog-id=59 op=LOAD Oct 2 19:26:08.548000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:26:08.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.551000 audit: BPF prog-id=60 op=LOAD Oct 2 19:26:08.551000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:26:08.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.552000 audit: BPF prog-id=61 op=LOAD Oct 2 19:26:08.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.552000 audit: BPF prog-id=62 op=LOAD Oct 2 19:26:08.552000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:26:08.552000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:26:08.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.558000 audit: BPF prog-id=63 op=LOAD Oct 2 19:26:08.558000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:26:08.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.560000 audit: BPF prog-id=64 op=LOAD Oct 2 19:26:08.560000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:26:08.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.562000 audit: BPF prog-id=65 op=LOAD Oct 2 19:26:08.562000 audit: BPF prog-id=50 op=UNLOAD Oct 2 19:26:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.562000 audit: BPF prog-id=66 op=LOAD Oct 2 19:26:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.562000 audit: BPF prog-id=67 op=LOAD Oct 2 19:26:08.562000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:26:08.562000 audit: BPF prog-id=52 op=UNLOAD Oct 2 19:26:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.564000 audit: BPF prog-id=68 op=LOAD Oct 2 19:26:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:08.564000 audit: BPF prog-id=69 op=LOAD Oct 2 19:26:08.564000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:26:08.565000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:26:08.680102 systemd[1]: Started kubelet.service. Oct 2 19:26:08.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:08.828961 kubelet[2685]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:26:08.828961 kubelet[2685]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:26:08.828961 kubelet[2685]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:26:08.828961 kubelet[2685]: I1002 19:26:08.824590 2685 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:26:09.747263 kubelet[2685]: I1002 19:26:09.747204 2685 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Oct 2 19:26:09.747263 kubelet[2685]: I1002 19:26:09.747250 2685 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:26:09.747606 kubelet[2685]: I1002 19:26:09.747571 2685 server.go:895] "Client rotation is on, will bootstrap in background" Oct 2 19:26:09.760541 kubelet[2685]: E1002 19:26:09.760483 2685 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.27.184:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.27.184:6443: connect: connection refused Oct 2 19:26:09.761365 kubelet[2685]: I1002 19:26:09.761318 2685 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:26:09.769328 kubelet[2685]: W1002 19:26:09.769293 2685 machine.go:65] Cannot read vendor id correctly, set empty. Oct 2 19:26:09.770776 kubelet[2685]: I1002 19:26:09.770747 2685 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:26:09.771606 kubelet[2685]: I1002 19:26:09.771583 2685 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:26:09.771987 kubelet[2685]: I1002 19:26:09.771959 2685 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Oct 2 19:26:09.772264 kubelet[2685]: I1002 19:26:09.772241 2685 topology_manager.go:138] "Creating topology manager with none policy" Oct 2 19:26:09.772397 kubelet[2685]: I1002 19:26:09.772376 2685 container_manager_linux.go:301] "Creating device plugin manager" Oct 2 19:26:09.772643 kubelet[2685]: I1002 19:26:09.772622 2685 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:26:09.773427 kubelet[2685]: I1002 19:26:09.773403 2685 kubelet.go:393] "Attempting to sync node with API server" Oct 2 19:26:09.773630 kubelet[2685]: I1002 19:26:09.773608 2685 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:26:09.773831 kubelet[2685]: I1002 19:26:09.773809 2685 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:26:09.773951 kubelet[2685]: I1002 19:26:09.773930 2685 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:26:09.777076 kubelet[2685]: I1002 19:26:09.777038 2685 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:26:09.778093 kubelet[2685]: W1002 19:26:09.778062 2685 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:26:09.779609 kubelet[2685]: I1002 19:26:09.779568 2685 server.go:1232] "Started kubelet" Oct 2 19:26:09.780069 kubelet[2685]: W1002 19:26:09.780007 2685 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.27.184:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.27.184:6443: connect: connection refused Oct 2 19:26:09.780227 kubelet[2685]: E1002 19:26:09.780206 2685 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.27.184:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.27.184:6443: connect: connection refused Oct 2 19:26:09.780466 kubelet[2685]: W1002 19:26:09.780419 2685 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.27.184:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-184&limit=500&resourceVersion=0": dial tcp 172.31.27.184:6443: connect: connection refused Oct 2 19:26:09.780595 kubelet[2685]: E1002 19:26:09.780574 2685 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.27.184:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-184&limit=500&resourceVersion=0": dial tcp 172.31.27.184:6443: connect: connection refused Oct 2 19:26:09.783782 kubelet[2685]: E1002 19:26:09.783732 2685 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:26:09.783782 kubelet[2685]: E1002 19:26:09.783785 2685 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:26:09.783000 audit[2685]: AVC avc: denied { mac_admin } for pid=2685 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:09.783000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:26:09.783000 audit[2685]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b327e0 a1=40008613f8 a2=4000b327b0 a3=25 items=0 ppid=1 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:09.783000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:26:09.784735 kubelet[2685]: I1002 19:26:09.784663 2685 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:26:09.784000 audit[2685]: AVC avc: denied { mac_admin } for pid=2685 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:09.784000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:26:09.784000 audit[2685]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008d6740 a1=4000861410 a2=4000b32870 a3=25 items=0 ppid=1 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:09.784000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:26:09.785381 kubelet[2685]: I1002 19:26:09.785355 2685 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:26:09.785644 kubelet[2685]: I1002 19:26:09.785622 2685 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:26:09.789977 kubelet[2685]: I1002 19:26:09.789929 2685 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:26:09.791133 kubelet[2685]: I1002 19:26:09.791098 2685 server.go:462] "Adding debug handlers to kubelet server" Oct 2 19:26:09.792963 kubelet[2685]: I1002 19:26:09.792910 2685 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:26:09.793274 kubelet[2685]: I1002 19:26:09.793233 2685 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 2 19:26:09.796653 kubelet[2685]: I1002 19:26:09.796615 2685 volume_manager.go:291] "Starting Kubelet Volume Manager" Oct 2 19:26:09.797667 kubelet[2685]: I1002 19:26:09.797631 2685 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:26:09.797968 kubelet[2685]: I1002 19:26:09.797945 2685 reconciler_new.go:29] "Reconciler: start to sync state" Oct 2 19:26:09.798134 kubelet[2685]: E1002 19:26:09.797920 2685 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-27-184.178a60ea762a9b1f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-27-184", UID:"ip-172-31-27-184", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-27-184"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 26, 9, 779530527, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 26, 9, 779530527, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ip-172-31-27-184"}': 'Post "https://172.31.27.184:6443/api/v1/namespaces/default/events": dial tcp 172.31.27.184:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:26:09.800166 kubelet[2685]: W1002 19:26:09.799795 2685 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.27.184:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.184:6443: connect: connection refused Oct 2 19:26:09.800166 kubelet[2685]: E1002 19:26:09.799940 2685 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.27.184:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.184:6443: connect: connection refused Oct 2 19:26:09.800866 kubelet[2685]: E1002 19:26:09.800837 2685 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.184:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-184?timeout=10s\": dial tcp 172.31.27.184:6443: connect: connection refused" interval="200ms" Oct 2 19:26:09.806000 audit[2696]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:09.806000 audit[2696]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc0561ed0 a2=0 a3=1 items=0 ppid=2685 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:09.806000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:26:09.823000 audit[2698]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:09.823000 audit[2698]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe5243170 a2=0 a3=1 items=0 ppid=2685 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:09.823000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:26:09.834000 audit[2702]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:09.834000 audit[2702]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd5542100 a2=0 a3=1 items=0 ppid=2685 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:09.834000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:26:09.851650 kubelet[2685]: I1002 19:26:09.851578 2685 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:26:09.851650 kubelet[2685]: I1002 19:26:09.851619 2685 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:26:09.851650 kubelet[2685]: I1002 19:26:09.851649 2685 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:26:09.852000 audit[2704]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:09.852000 audit[2704]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd9c55d40 a2=0 a3=1 items=0 ppid=2685 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:09.852000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:26:09.854473 kubelet[2685]: I1002 19:26:09.854434 2685 policy_none.go:49] "None policy: Start" Oct 2 19:26:09.855664 kubelet[2685]: I1002 19:26:09.855628 2685 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:26:09.855664 kubelet[2685]: I1002 19:26:09.855701 2685 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:26:09.866493 systemd[1]: Created slice kubepods.slice. Oct 2 19:26:09.878988 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:26:09.882000 audit[2707]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:09.882000 audit[2707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffdea34fe0 a2=0 a3=1 items=0 ppid=2685 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:09.882000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:26:09.883353 kubelet[2685]: I1002 19:26:09.883307 2685 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 2 19:26:09.887568 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:26:09.888000 audit[2708]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:09.888000 audit[2708]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff04a0b60 a2=0 a3=1 items=0 ppid=2685 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:09.888000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:26:09.891628 kubelet[2685]: I1002 19:26:09.891578 2685 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 2 19:26:09.891798 kubelet[2685]: I1002 19:26:09.891708 2685 status_manager.go:217] "Starting to sync pod status with apiserver" Oct 2 19:26:09.891798 kubelet[2685]: I1002 19:26:09.891742 2685 kubelet.go:2303] "Starting kubelet main sync loop" Oct 2 19:26:09.891947 kubelet[2685]: E1002 19:26:09.891825 2685 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:26:09.894624 kubelet[2685]: W1002 19:26:09.894529 2685 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.27.184:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.184:6443: connect: connection refused Oct 2 19:26:09.894624 kubelet[2685]: E1002 19:26:09.894617 2685 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.27.184:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.184:6443: connect: connection refused Oct 2 19:26:09.895000 audit[2709]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:09.895000 audit[2709]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd047d770 a2=0 a3=1 items=0 ppid=2685 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:09.895000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:26:09.896000 audit[2710]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:09.896000 audit[2710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe0b62b70 a2=0 a3=1 items=0 ppid=2685 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:09.896000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:26:09.900727 kubelet[2685]: I1002 19:26:09.900669 2685 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-184" Oct 2 19:26:09.901318 kubelet[2685]: I1002 19:26:09.901283 2685 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:26:09.900000 audit[2685]: AVC avc: denied { mac_admin } for pid=2685 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:09.900000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:26:09.900000 audit[2685]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000f9f650 a1=4000dd7cb0 a2=4000f9f620 a3=25 items=0 ppid=1 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:09.900000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:26:09.901797 kubelet[2685]: I1002 19:26:09.901390 2685 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:26:09.901797 kubelet[2685]: I1002 19:26:09.901719 2685 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:26:09.905557 kubelet[2685]: E1002 19:26:09.905499 2685 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.27.184:6443/api/v1/nodes\": dial tcp 172.31.27.184:6443: connect: connection refused" node="ip-172-31-27-184" Oct 2 19:26:09.906863 kubelet[2685]: E1002 19:26:09.906818 2685 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-27-184\" not found" Oct 2 19:26:09.910000 audit[2711]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:09.910000 audit[2711]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff50c81e0 a2=0 a3=1 items=0 ppid=2685 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:09.910000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:26:09.915000 audit[2712]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=2712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:09.915000 audit[2712]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe37d4d90 a2=0 a3=1 items=0 ppid=2685 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:09.915000 audit[2713]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=2713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:09.915000 audit[2713]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc2b36a70 a2=0 a3=1 items=0 ppid=2685 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:09.915000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:26:09.915000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:26:09.920000 audit[2714]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2714 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:09.920000 audit[2714]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffecf16f70 a2=0 a3=1 items=0 ppid=2685 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:09.920000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:26:09.992505 kubelet[2685]: I1002 19:26:09.992458 2685 topology_manager.go:215] "Topology Admit Handler" podUID="be57e8eee3727f9170b1952cdc4d10af" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-27-184" Oct 2 19:26:09.994797 kubelet[2685]: I1002 19:26:09.994763 2685 topology_manager.go:215] "Topology Admit Handler" podUID="76d09cb692ea4d58960a8c0e23a7dd7d" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-27-184" Oct 2 19:26:09.996891 kubelet[2685]: I1002 19:26:09.996843 2685 topology_manager.go:215] "Topology Admit Handler" podUID="e06570d3661aa69c62d35af9b90aef47" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-27-184" Oct 2 19:26:10.005236 kubelet[2685]: I1002 19:26:09.998999 2685 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/76d09cb692ea4d58960a8c0e23a7dd7d-k8s-certs\") pod \"kube-controller-manager-ip-172-31-27-184\" (UID: \"76d09cb692ea4d58960a8c0e23a7dd7d\") " pod="kube-system/kube-controller-manager-ip-172-31-27-184" Oct 2 19:26:10.005236 kubelet[2685]: I1002 19:26:09.999097 2685 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/76d09cb692ea4d58960a8c0e23a7dd7d-kubeconfig\") pod \"kube-controller-manager-ip-172-31-27-184\" (UID: \"76d09cb692ea4d58960a8c0e23a7dd7d\") " pod="kube-system/kube-controller-manager-ip-172-31-27-184" Oct 2 19:26:10.005236 kubelet[2685]: I1002 19:26:09.999172 2685 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e06570d3661aa69c62d35af9b90aef47-kubeconfig\") pod \"kube-scheduler-ip-172-31-27-184\" (UID: \"e06570d3661aa69c62d35af9b90aef47\") " pod="kube-system/kube-scheduler-ip-172-31-27-184" Oct 2 19:26:10.005236 kubelet[2685]: I1002 19:26:09.999254 2685 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/be57e8eee3727f9170b1952cdc4d10af-ca-certs\") pod \"kube-apiserver-ip-172-31-27-184\" (UID: \"be57e8eee3727f9170b1952cdc4d10af\") " pod="kube-system/kube-apiserver-ip-172-31-27-184" Oct 2 19:26:10.005236 kubelet[2685]: I1002 19:26:09.999332 2685 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/76d09cb692ea4d58960a8c0e23a7dd7d-ca-certs\") pod \"kube-controller-manager-ip-172-31-27-184\" (UID: \"76d09cb692ea4d58960a8c0e23a7dd7d\") " pod="kube-system/kube-controller-manager-ip-172-31-27-184" Oct 2 19:26:10.005607 kubelet[2685]: I1002 19:26:09.999379 2685 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/76d09cb692ea4d58960a8c0e23a7dd7d-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-27-184\" (UID: \"76d09cb692ea4d58960a8c0e23a7dd7d\") " pod="kube-system/kube-controller-manager-ip-172-31-27-184" Oct 2 19:26:10.005607 kubelet[2685]: I1002 19:26:09.999440 2685 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/76d09cb692ea4d58960a8c0e23a7dd7d-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-27-184\" (UID: \"76d09cb692ea4d58960a8c0e23a7dd7d\") " pod="kube-system/kube-controller-manager-ip-172-31-27-184" Oct 2 19:26:10.005607 kubelet[2685]: I1002 19:26:09.999484 2685 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/be57e8eee3727f9170b1952cdc4d10af-k8s-certs\") pod \"kube-apiserver-ip-172-31-27-184\" (UID: \"be57e8eee3727f9170b1952cdc4d10af\") " pod="kube-system/kube-apiserver-ip-172-31-27-184" Oct 2 19:26:10.005607 kubelet[2685]: I1002 19:26:09.999533 2685 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/be57e8eee3727f9170b1952cdc4d10af-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-27-184\" (UID: \"be57e8eee3727f9170b1952cdc4d10af\") " pod="kube-system/kube-apiserver-ip-172-31-27-184" Oct 2 19:26:10.005607 kubelet[2685]: E1002 19:26:10.001865 2685 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.184:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-184?timeout=10s\": dial tcp 172.31.27.184:6443: connect: connection refused" interval="400ms" Oct 2 19:26:10.013254 systemd[1]: Created slice kubepods-burstable-podbe57e8eee3727f9170b1952cdc4d10af.slice. Oct 2 19:26:10.029104 systemd[1]: Created slice kubepods-burstable-pod76d09cb692ea4d58960a8c0e23a7dd7d.slice. Oct 2 19:26:10.046984 systemd[1]: Created slice kubepods-burstable-pode06570d3661aa69c62d35af9b90aef47.slice. Oct 2 19:26:10.107572 kubelet[2685]: I1002 19:26:10.107517 2685 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-184" Oct 2 19:26:10.108044 kubelet[2685]: E1002 19:26:10.108014 2685 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.27.184:6443/api/v1/nodes\": dial tcp 172.31.27.184:6443: connect: connection refused" node="ip-172-31-27-184" Oct 2 19:26:10.331845 env[1732]: time="2023-10-02T19:26:10.331652823Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-27-184,Uid:be57e8eee3727f9170b1952cdc4d10af,Namespace:kube-system,Attempt:0,}" Oct 2 19:26:10.335116 env[1732]: time="2023-10-02T19:26:10.335038847Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-27-184,Uid:76d09cb692ea4d58960a8c0e23a7dd7d,Namespace:kube-system,Attempt:0,}" Oct 2 19:26:10.345346 kubelet[2685]: E1002 19:26:10.345082 2685 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-27-184.178a60ea762a9b1f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-27-184", UID:"ip-172-31-27-184", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-27-184"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 26, 9, 779530527, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 26, 9, 779530527, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ip-172-31-27-184"}': 'Post "https://172.31.27.184:6443/api/v1/namespaces/default/events": dial tcp 172.31.27.184:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:26:10.351635 env[1732]: time="2023-10-02T19:26:10.351564877Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-27-184,Uid:e06570d3661aa69c62d35af9b90aef47,Namespace:kube-system,Attempt:0,}" Oct 2 19:26:10.402749 kubelet[2685]: E1002 19:26:10.402655 2685 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.184:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-184?timeout=10s\": dial tcp 172.31.27.184:6443: connect: connection refused" interval="800ms" Oct 2 19:26:10.510724 kubelet[2685]: I1002 19:26:10.510652 2685 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-184" Oct 2 19:26:10.511454 kubelet[2685]: E1002 19:26:10.511385 2685 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.27.184:6443/api/v1/nodes\": dial tcp 172.31.27.184:6443: connect: connection refused" node="ip-172-31-27-184" Oct 2 19:26:10.824318 kubelet[2685]: W1002 19:26:10.824181 2685 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.27.184:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.184:6443: connect: connection refused Oct 2 19:26:10.824318 kubelet[2685]: E1002 19:26:10.824259 2685 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.27.184:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.184:6443: connect: connection refused Oct 2 19:26:10.868470 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount726402247.mount: Deactivated successfully. Oct 2 19:26:10.878616 env[1732]: time="2023-10-02T19:26:10.878540850Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:10.884294 env[1732]: time="2023-10-02T19:26:10.884241661Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:10.886000 env[1732]: time="2023-10-02T19:26:10.885956790Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:10.888956 env[1732]: time="2023-10-02T19:26:10.888911376Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:10.890496 env[1732]: time="2023-10-02T19:26:10.890452859Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:10.892094 env[1732]: time="2023-10-02T19:26:10.892055256Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:10.894379 env[1732]: time="2023-10-02T19:26:10.894318046Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:10.900719 env[1732]: time="2023-10-02T19:26:10.900621623Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:10.909040 env[1732]: time="2023-10-02T19:26:10.908988627Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:10.911506 env[1732]: time="2023-10-02T19:26:10.911450755Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:10.913779 env[1732]: time="2023-10-02T19:26:10.913731701Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:10.918108 env[1732]: time="2023-10-02T19:26:10.918033244Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:10.974772 env[1732]: time="2023-10-02T19:26:10.974387799Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:26:10.974772 env[1732]: time="2023-10-02T19:26:10.974471838Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:26:10.974772 env[1732]: time="2023-10-02T19:26:10.974497998Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:26:10.975558 env[1732]: time="2023-10-02T19:26:10.975475680Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7bcec7476f051d8c150e58a9a45169f82d6c68b3694207c4696695d80ccc0308 pid=2723 runtime=io.containerd.runc.v2 Oct 2 19:26:10.993266 env[1732]: time="2023-10-02T19:26:10.993118993Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:26:10.993266 env[1732]: time="2023-10-02T19:26:10.993201135Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:26:10.993266 env[1732]: time="2023-10-02T19:26:10.993228184Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:26:10.994389 env[1732]: time="2023-10-02T19:26:10.994238255Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4aff9545d5fa838d27cfaa2528994202b476c1a06fc3fb7b39354abf7b9273e3 pid=2735 runtime=io.containerd.runc.v2 Oct 2 19:26:11.007295 env[1732]: time="2023-10-02T19:26:11.007177963Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:26:11.007723 env[1732]: time="2023-10-02T19:26:11.007633508Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:26:11.007924 env[1732]: time="2023-10-02T19:26:11.007863435Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:26:11.008645 env[1732]: time="2023-10-02T19:26:11.008568623Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d3102803999f12fdc40053b6b3b8f572b0269a13a687c37e5e71a7cf1a0704dc pid=2751 runtime=io.containerd.runc.v2 Oct 2 19:26:11.020891 kubelet[2685]: W1002 19:26:11.020742 2685 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.27.184:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.184:6443: connect: connection refused Oct 2 19:26:11.020891 kubelet[2685]: E1002 19:26:11.020825 2685 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.27.184:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.184:6443: connect: connection refused Oct 2 19:26:11.042538 systemd[1]: Started cri-containerd-7bcec7476f051d8c150e58a9a45169f82d6c68b3694207c4696695d80ccc0308.scope. Oct 2 19:26:11.091597 systemd[1]: Started cri-containerd-d3102803999f12fdc40053b6b3b8f572b0269a13a687c37e5e71a7cf1a0704dc.scope. Oct 2 19:26:11.108362 kubelet[2685]: W1002 19:26:11.108277 2685 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.27.184:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-184&limit=500&resourceVersion=0": dial tcp 172.31.27.184:6443: connect: connection refused Oct 2 19:26:11.108534 kubelet[2685]: E1002 19:26:11.108371 2685 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.27.184:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-184&limit=500&resourceVersion=0": dial tcp 172.31.27.184:6443: connect: connection refused Oct 2 19:26:11.127770 systemd[1]: Started cri-containerd-4aff9545d5fa838d27cfaa2528994202b476c1a06fc3fb7b39354abf7b9273e3.scope. Oct 2 19:26:11.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.134000 audit: BPF prog-id=70 op=LOAD Oct 2 19:26:11.135000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.135000 audit[2740]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2723 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762636563373437366630353164386331353065353861396134353136 Oct 2 19:26:11.136000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.136000 audit[2740]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2723 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762636563373437366630353164386331353065353861396134353136 Oct 2 19:26:11.138000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.138000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.138000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.138000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.138000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.138000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.138000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.138000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.138000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.138000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.138000 audit: BPF prog-id=71 op=LOAD Oct 2 19:26:11.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.140000 audit: BPF prog-id=72 op=LOAD Oct 2 19:26:11.138000 audit[2740]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2723 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762636563373437366630353164386331353065353861396134353136 Oct 2 19:26:11.141000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.141000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.141000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.141000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.141000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.141000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.141000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.141000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.141000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.141000 audit: BPF prog-id=73 op=LOAD Oct 2 19:26:11.141000 audit[2740]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2723 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762636563373437366630353164386331353065353861396134353136 Oct 2 19:26:11.141000 audit: BPF prog-id=73 op=UNLOAD Oct 2 19:26:11.141000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:26:11.141000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.141000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.141000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.141000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.141000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.141000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.141000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.141000 audit[2740]: AVC avc: denied { perfmon } for pid=2740 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.141000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.141000 audit[2740]: AVC avc: denied { bpf } for pid=2740 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.141000 audit: BPF prog-id=74 op=LOAD Oct 2 19:26:11.141000 audit[2740]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2723 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762636563373437366630353164386331353065353861396134353136 Oct 2 19:26:11.148083 kubelet[2685]: W1002 19:26:11.143456 2685 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.27.184:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.27.184:6443: connect: connection refused Oct 2 19:26:11.148083 kubelet[2685]: E1002 19:26:11.143575 2685 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.27.184:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.27.184:6443: connect: connection refused Oct 2 19:26:11.147000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.147000 audit[2776]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2751 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433313032383033393939663132666463343030353362366233623866 Oct 2 19:26:11.148000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.148000 audit[2776]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2751 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433313032383033393939663132666463343030353362366233623866 Oct 2 19:26:11.148000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.148000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.148000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.148000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.148000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.148000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.148000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.148000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.148000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.148000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.148000 audit: BPF prog-id=75 op=LOAD Oct 2 19:26:11.148000 audit[2776]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2751 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433313032383033393939663132666463343030353362366233623866 Oct 2 19:26:11.152000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.152000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.152000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.152000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.152000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.152000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.152000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.152000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.152000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.152000 audit: BPF prog-id=76 op=LOAD Oct 2 19:26:11.152000 audit[2776]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2751 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433313032383033393939663132666463343030353362366233623866 Oct 2 19:26:11.154000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:26:11.154000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:26:11.154000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.154000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.154000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.154000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.154000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.154000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.154000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.154000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.154000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.154000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.154000 audit: BPF prog-id=77 op=LOAD Oct 2 19:26:11.154000 audit[2776]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2751 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433313032383033393939663132666463343030353362366233623866 Oct 2 19:26:11.203888 kubelet[2685]: E1002 19:26:11.203536 2685 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.184:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-184?timeout=10s\": dial tcp 172.31.27.184:6443: connect: connection refused" interval="1.6s" Oct 2 19:26:11.223259 env[1732]: time="2023-10-02T19:26:11.223200212Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-27-184,Uid:76d09cb692ea4d58960a8c0e23a7dd7d,Namespace:kube-system,Attempt:0,} returns sandbox id \"7bcec7476f051d8c150e58a9a45169f82d6c68b3694207c4696695d80ccc0308\"" Oct 2 19:26:11.232895 env[1732]: time="2023-10-02T19:26:11.232806524Z" level=info msg="CreateContainer within sandbox \"7bcec7476f051d8c150e58a9a45169f82d6c68b3694207c4696695d80ccc0308\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 19:26:11.241812 env[1732]: time="2023-10-02T19:26:11.241754293Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-27-184,Uid:e06570d3661aa69c62d35af9b90aef47,Namespace:kube-system,Attempt:0,} returns sandbox id \"d3102803999f12fdc40053b6b3b8f572b0269a13a687c37e5e71a7cf1a0704dc\"" Oct 2 19:26:11.246631 env[1732]: time="2023-10-02T19:26:11.246546703Z" level=info msg="CreateContainer within sandbox \"d3102803999f12fdc40053b6b3b8f572b0269a13a687c37e5e71a7cf1a0704dc\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 19:26:11.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.254000 audit: BPF prog-id=78 op=LOAD Oct 2 19:26:11.255000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.255000 audit[2770]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2735 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461666639353435643566613833386432376366616132353238393934 Oct 2 19:26:11.256000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.256000 audit[2770]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2735 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461666639353435643566613833386432376366616132353238393934 Oct 2 19:26:11.256000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.256000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.256000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.256000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.256000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.256000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.256000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.256000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.256000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.256000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.256000 audit: BPF prog-id=79 op=LOAD Oct 2 19:26:11.256000 audit[2770]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2735 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461666639353435643566613833386432376366616132353238393934 Oct 2 19:26:11.257000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.257000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.257000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.257000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.257000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.257000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.257000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.257000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.257000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.257000 audit: BPF prog-id=80 op=LOAD Oct 2 19:26:11.257000 audit[2770]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2735 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461666639353435643566613833386432376366616132353238393934 Oct 2 19:26:11.258000 audit: BPF prog-id=80 op=UNLOAD Oct 2 19:26:11.258000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:26:11.258000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.258000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.258000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.258000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.258000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.258000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.258000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.258000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.258000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.258000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.258000 audit: BPF prog-id=81 op=LOAD Oct 2 19:26:11.258000 audit[2770]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2735 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461666639353435643566613833386432376366616132353238393934 Oct 2 19:26:11.297126 env[1732]: time="2023-10-02T19:26:11.297059286Z" level=info msg="CreateContainer within sandbox \"7bcec7476f051d8c150e58a9a45169f82d6c68b3694207c4696695d80ccc0308\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"580fb31524dd428784395fc2bbf17bcb536e2b8b7e738ea1ec2b6ec96239c453\"" Oct 2 19:26:11.299214 env[1732]: time="2023-10-02T19:26:11.299163138Z" level=info msg="StartContainer for \"580fb31524dd428784395fc2bbf17bcb536e2b8b7e738ea1ec2b6ec96239c453\"" Oct 2 19:26:11.302518 env[1732]: time="2023-10-02T19:26:11.302455805Z" level=info msg="CreateContainer within sandbox \"d3102803999f12fdc40053b6b3b8f572b0269a13a687c37e5e71a7cf1a0704dc\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"3828d30e32340a7fc533c13e48dccc82a55ee88db0d3da3208eb2964039ebac6\"" Oct 2 19:26:11.303424 env[1732]: time="2023-10-02T19:26:11.303378931Z" level=info msg="StartContainer for \"3828d30e32340a7fc533c13e48dccc82a55ee88db0d3da3208eb2964039ebac6\"" Oct 2 19:26:11.314807 kubelet[2685]: I1002 19:26:11.314016 2685 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-184" Oct 2 19:26:11.314807 kubelet[2685]: E1002 19:26:11.314721 2685 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.27.184:6443/api/v1/nodes\": dial tcp 172.31.27.184:6443: connect: connection refused" node="ip-172-31-27-184" Oct 2 19:26:11.336671 env[1732]: time="2023-10-02T19:26:11.336612434Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-27-184,Uid:be57e8eee3727f9170b1952cdc4d10af,Namespace:kube-system,Attempt:0,} returns sandbox id \"4aff9545d5fa838d27cfaa2528994202b476c1a06fc3fb7b39354abf7b9273e3\"" Oct 2 19:26:11.343898 env[1732]: time="2023-10-02T19:26:11.343796836Z" level=info msg="CreateContainer within sandbox \"4aff9545d5fa838d27cfaa2528994202b476c1a06fc3fb7b39354abf7b9273e3\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 19:26:11.368564 systemd[1]: Started cri-containerd-3828d30e32340a7fc533c13e48dccc82a55ee88db0d3da3208eb2964039ebac6.scope. Oct 2 19:26:11.384841 env[1732]: time="2023-10-02T19:26:11.384776117Z" level=info msg="CreateContainer within sandbox \"4aff9545d5fa838d27cfaa2528994202b476c1a06fc3fb7b39354abf7b9273e3\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"2455a264c12c3c0c55e6568a468c06c6003a6c4d4631167025b3324980fb85a6\"" Oct 2 19:26:11.385875 env[1732]: time="2023-10-02T19:26:11.385821131Z" level=info msg="StartContainer for \"2455a264c12c3c0c55e6568a468c06c6003a6c4d4631167025b3324980fb85a6\"" Oct 2 19:26:11.416985 systemd[1]: Started cri-containerd-580fb31524dd428784395fc2bbf17bcb536e2b8b7e738ea1ec2b6ec96239c453.scope. Oct 2 19:26:11.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.458000 audit: BPF prog-id=82 op=LOAD Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2751 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338323864333065333233343061376663353333633133653438646363 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2751 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338323864333065333233343061376663353333633133653438646363 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit: BPF prog-id=83 op=LOAD Oct 2 19:26:11.459000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2751 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338323864333065333233343061376663353333633133653438646363 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit: BPF prog-id=84 op=LOAD Oct 2 19:26:11.459000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2751 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338323864333065333233343061376663353333633133653438646363 Oct 2 19:26:11.459000 audit: BPF prog-id=84 op=UNLOAD Oct 2 19:26:11.459000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.459000 audit: BPF prog-id=85 op=LOAD Oct 2 19:26:11.459000 audit[2857]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2751 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338323864333065333233343061376663353333633133653438646363 Oct 2 19:26:11.473882 systemd[1]: Started cri-containerd-2455a264c12c3c0c55e6568a468c06c6003a6c4d4631167025b3324980fb85a6.scope. Oct 2 19:26:11.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.496000 audit: BPF prog-id=86 op=LOAD Oct 2 19:26:11.497000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.497000 audit[2851]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2723 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538306662333135323464643432383738343339356663326262663137 Oct 2 19:26:11.497000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.497000 audit[2851]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2723 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538306662333135323464643432383738343339356663326262663137 Oct 2 19:26:11.497000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.497000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.497000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.497000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.497000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.497000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.497000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.497000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.497000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.497000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.497000 audit: BPF prog-id=87 op=LOAD Oct 2 19:26:11.497000 audit[2851]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2723 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538306662333135323464643432383738343339356663326262663137 Oct 2 19:26:11.498000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.498000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.498000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.498000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.498000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.498000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.498000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.498000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.498000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.498000 audit: BPF prog-id=88 op=LOAD Oct 2 19:26:11.498000 audit[2851]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2723 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538306662333135323464643432383738343339356663326262663137 Oct 2 19:26:11.498000 audit: BPF prog-id=88 op=UNLOAD Oct 2 19:26:11.498000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:26:11.498000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.498000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.498000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.498000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.498000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.498000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.498000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.498000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.498000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.498000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.498000 audit: BPF prog-id=89 op=LOAD Oct 2 19:26:11.498000 audit[2851]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2723 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538306662333135323464643432383738343339356663326262663137 Oct 2 19:26:11.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.544000 audit: BPF prog-id=90 op=LOAD Oct 2 19:26:11.548000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.548000 audit[2893]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2735 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234353561323634633132633363306335356536353638613436386330 Oct 2 19:26:11.551000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.551000 audit[2893]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2735 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234353561323634633132633363306335356536353638613436386330 Oct 2 19:26:11.552000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.552000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.552000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.552000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.552000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.552000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.552000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.552000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.552000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.552000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.552000 audit: BPF prog-id=91 op=LOAD Oct 2 19:26:11.552000 audit[2893]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2735 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234353561323634633132633363306335356536353638613436386330 Oct 2 19:26:11.554000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.554000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.554000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.554000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.554000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.554000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.554000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.554000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.554000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.554000 audit: BPF prog-id=92 op=LOAD Oct 2 19:26:11.554000 audit[2893]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2735 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234353561323634633132633363306335356536353638613436386330 Oct 2 19:26:11.556000 audit: BPF prog-id=92 op=UNLOAD Oct 2 19:26:11.556000 audit: BPF prog-id=91 op=UNLOAD Oct 2 19:26:11.556000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.556000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.556000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.556000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.556000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.556000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.556000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.556000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.556000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.556000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:11.556000 audit: BPF prog-id=93 op=LOAD Oct 2 19:26:11.556000 audit[2893]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2735 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:11.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234353561323634633132633363306335356536353638613436386330 Oct 2 19:26:11.593534 env[1732]: time="2023-10-02T19:26:11.593469528Z" level=info msg="StartContainer for \"3828d30e32340a7fc533c13e48dccc82a55ee88db0d3da3208eb2964039ebac6\" returns successfully" Oct 2 19:26:11.612209 env[1732]: time="2023-10-02T19:26:11.612147464Z" level=info msg="StartContainer for \"580fb31524dd428784395fc2bbf17bcb536e2b8b7e738ea1ec2b6ec96239c453\" returns successfully" Oct 2 19:26:11.658269 env[1732]: time="2023-10-02T19:26:11.658049203Z" level=info msg="StartContainer for \"2455a264c12c3c0c55e6568a468c06c6003a6c4d4631167025b3324980fb85a6\" returns successfully" Oct 2 19:26:12.917533 kubelet[2685]: I1002 19:26:12.917499 2685 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-184" Oct 2 19:26:15.792362 kernel: kauditd_printk_skb: 559 callbacks suppressed Oct 2 19:26:15.792526 kernel: audit: type=1400 audit(1696274775.778:724): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:15.778000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:15.778000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40000740c0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:26:15.806787 kernel: audit: type=1300 audit(1696274775.778:724): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40000740c0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:26:15.778000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:15.817709 kernel: audit: type=1327 audit(1696274775.778:724): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:15.792000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:15.829775 kernel: audit: type=1400 audit(1696274775.792:725): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:15.792000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40002488e0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:26:15.792000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:15.855373 kernel: audit: type=1300 audit(1696274775.792:725): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40002488e0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:26:15.855530 kernel: audit: type=1327 audit(1696274775.792:725): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:16.848000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:16.848000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4009871b30 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:26:16.875812 kernel: audit: type=1400 audit(1696274776.848:726): avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:16.875995 kernel: audit: type=1300 audit(1696274776.848:726): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4009871b30 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:26:16.848000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:26:16.889364 kernel: audit: type=1327 audit(1696274776.848:726): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:26:16.859000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:16.902120 kernel: audit: type=1400 audit(1696274776.859:727): avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:16.859000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40062ecb00 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:26:16.859000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:26:16.862000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:16.862000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4004c52a50 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:26:16.862000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:26:16.872000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:16.872000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4b a1=4004c52ea0 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:26:16.872000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:26:17.038000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:17.038000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=40041cc020 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:26:17.038000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:26:17.038000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:17.038000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=4001012e70 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:26:17.038000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:26:17.079103 kubelet[2685]: E1002 19:26:17.079051 2685 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-27-184\" not found" node="ip-172-31-27-184" Oct 2 19:26:17.152719 kubelet[2685]: I1002 19:26:17.152544 2685 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-27-184" Oct 2 19:26:17.778257 kubelet[2685]: I1002 19:26:17.778186 2685 apiserver.go:52] "Watching apiserver" Oct 2 19:26:17.787282 kubelet[2685]: E1002 19:26:17.787203 2685 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-27-184\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ip-172-31-27-184" Oct 2 19:26:17.798486 kubelet[2685]: I1002 19:26:17.798436 2685 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:26:19.849444 systemd[1]: Reloading. Oct 2 19:26:20.094362 /usr/lib/systemd/system-generators/torcx-generator[2977]: time="2023-10-02T19:26:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:26:20.094422 /usr/lib/systemd/system-generators/torcx-generator[2977]: time="2023-10-02T19:26:20Z" level=info msg="torcx already run" Oct 2 19:26:20.358381 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:26:20.358419 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:26:20.406631 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:26:20.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.628000 audit: BPF prog-id=94 op=LOAD Oct 2 19:26:20.628000 audit: BPF prog-id=55 op=UNLOAD Oct 2 19:26:20.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.628000 audit: BPF prog-id=95 op=LOAD Oct 2 19:26:20.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.628000 audit: BPF prog-id=96 op=LOAD Oct 2 19:26:20.629000 audit: BPF prog-id=56 op=UNLOAD Oct 2 19:26:20.629000 audit: BPF prog-id=57 op=UNLOAD Oct 2 19:26:20.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.633000 audit: BPF prog-id=97 op=LOAD Oct 2 19:26:20.633000 audit: BPF prog-id=82 op=UNLOAD Oct 2 19:26:20.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.637000 audit: BPF prog-id=98 op=LOAD Oct 2 19:26:20.637000 audit: BPF prog-id=70 op=UNLOAD Oct 2 19:26:20.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.639000 audit: BPF prog-id=99 op=LOAD Oct 2 19:26:20.639000 audit: BPF prog-id=58 op=UNLOAD Oct 2 19:26:20.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.640000 audit: BPF prog-id=100 op=LOAD Oct 2 19:26:20.640000 audit: BPF prog-id=59 op=UNLOAD Oct 2 19:26:20.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.641000 audit: BPF prog-id=101 op=LOAD Oct 2 19:26:20.641000 audit: BPF prog-id=60 op=UNLOAD Oct 2 19:26:20.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.642000 audit: BPF prog-id=102 op=LOAD Oct 2 19:26:20.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.642000 audit: BPF prog-id=103 op=LOAD Oct 2 19:26:20.642000 audit: BPF prog-id=61 op=UNLOAD Oct 2 19:26:20.642000 audit: BPF prog-id=62 op=UNLOAD Oct 2 19:26:20.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.647000 audit: BPF prog-id=104 op=LOAD Oct 2 19:26:20.647000 audit: BPF prog-id=90 op=UNLOAD Oct 2 19:26:20.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.650000 audit: BPF prog-id=105 op=LOAD Oct 2 19:26:20.650000 audit: BPF prog-id=78 op=UNLOAD Oct 2 19:26:20.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.652000 audit: BPF prog-id=106 op=LOAD Oct 2 19:26:20.652000 audit: BPF prog-id=63 op=UNLOAD Oct 2 19:26:20.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.654000 audit: BPF prog-id=107 op=LOAD Oct 2 19:26:20.654000 audit: BPF prog-id=64 op=UNLOAD Oct 2 19:26:20.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.655000 audit: BPF prog-id=108 op=LOAD Oct 2 19:26:20.655000 audit: BPF prog-id=72 op=UNLOAD Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit: BPF prog-id=109 op=LOAD Oct 2 19:26:20.657000 audit: BPF prog-id=65 op=UNLOAD Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit: BPF prog-id=110 op=LOAD Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.658000 audit: BPF prog-id=111 op=LOAD Oct 2 19:26:20.658000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:26:20.658000 audit: BPF prog-id=67 op=UNLOAD Oct 2 19:26:20.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.661000 audit: BPF prog-id=112 op=LOAD Oct 2 19:26:20.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.661000 audit: BPF prog-id=113 op=LOAD Oct 2 19:26:20.661000 audit: BPF prog-id=68 op=UNLOAD Oct 2 19:26:20.661000 audit: BPF prog-id=69 op=UNLOAD Oct 2 19:26:20.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:20.662000 audit: BPF prog-id=114 op=LOAD Oct 2 19:26:20.662000 audit: BPF prog-id=86 op=UNLOAD Oct 2 19:26:20.712841 systemd[1]: Stopping kubelet.service... Oct 2 19:26:20.737374 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 19:26:20.737818 systemd[1]: Stopped kubelet.service. Oct 2 19:26:20.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:20.737958 systemd[1]: kubelet.service: Consumed 1.706s CPU time. Oct 2 19:26:20.743723 systemd[1]: Started kubelet.service. Oct 2 19:26:20.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:20.900825 kernel: kauditd_printk_skb: 260 callbacks suppressed Oct 2 19:26:20.900952 kernel: audit: type=1101 audit(1696274780.888:978): pid=3043 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:20.888000 audit[3043]: USER_ACCT pid=3043 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:20.901469 sudo[3043]: root : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/tar -xf /opt/bin/cilium.tar.gz -C /opt/bin Oct 2 19:26:20.902014 sudo[3043]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 2 19:26:20.900000 audit[3043]: CRED_REFR pid=3043 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:20.913724 kernel: audit: type=1110 audit(1696274780.900:979): pid=3043 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:20.917000 audit[3043]: USER_START pid=3043 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:20.930757 kernel: audit: type=1105 audit(1696274780.917:980): pid=3043 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:20.992476 kubelet[3033]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:26:20.999753 kubelet[3033]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:26:20.999915 kubelet[3033]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:26:21.000311 kubelet[3033]: I1002 19:26:21.000248 3033 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:26:21.031063 kubelet[3033]: I1002 19:26:21.030989 3033 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Oct 2 19:26:21.031063 kubelet[3033]: I1002 19:26:21.031056 3033 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:26:21.032020 kubelet[3033]: I1002 19:26:21.031974 3033 server.go:895] "Client rotation is on, will bootstrap in background" Oct 2 19:26:21.038443 kubelet[3033]: I1002 19:26:21.038392 3033 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 19:26:21.044532 kubelet[3033]: I1002 19:26:21.044477 3033 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:26:21.060391 kubelet[3033]: W1002 19:26:21.060342 3033 machine.go:65] Cannot read vendor id correctly, set empty. Oct 2 19:26:21.063334 kubelet[3033]: I1002 19:26:21.063287 3033 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:26:21.064218 kubelet[3033]: I1002 19:26:21.064180 3033 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:26:21.064499 kubelet[3033]: I1002 19:26:21.064457 3033 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Oct 2 19:26:21.064641 kubelet[3033]: I1002 19:26:21.064559 3033 topology_manager.go:138] "Creating topology manager with none policy" Oct 2 19:26:21.064641 kubelet[3033]: I1002 19:26:21.064583 3033 container_manager_linux.go:301] "Creating device plugin manager" Oct 2 19:26:21.064641 kubelet[3033]: I1002 19:26:21.064627 3033 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:26:21.065797 kubelet[3033]: I1002 19:26:21.065757 3033 kubelet.go:393] "Attempting to sync node with API server" Oct 2 19:26:21.065914 kubelet[3033]: I1002 19:26:21.065803 3033 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:26:21.065914 kubelet[3033]: I1002 19:26:21.065847 3033 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:26:21.066023 kubelet[3033]: I1002 19:26:21.065971 3033 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:26:21.067763 kubelet[3033]: I1002 19:26:21.067728 3033 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:26:21.069358 kubelet[3033]: I1002 19:26:21.069323 3033 server.go:1232] "Started kubelet" Oct 2 19:26:21.085000 audit[3033]: AVC avc: denied { mac_admin } for pid=3033 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:21.094876 kubelet[3033]: I1002 19:26:21.091918 3033 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:26:21.094876 kubelet[3033]: I1002 19:26:21.093188 3033 server.go:462] "Adding debug handlers to kubelet server" Oct 2 19:26:21.104819 kernel: audit: type=1400 audit(1696274781.085:981): avc: denied { mac_admin } for pid=3033 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:21.104949 kernel: audit: type=1401 audit(1696274781.085:981): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:26:21.085000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:26:21.085000 audit[3033]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000937320 a1=4000c8a210 a2=40009372f0 a3=25 items=0 ppid=1 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:21.116552 kernel: audit: type=1300 audit(1696274781.085:981): arch=c00000b7 syscall=5 success=no exit=-22 a0=4000937320 a1=4000c8a210 a2=40009372f0 a3=25 items=0 ppid=1 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:21.116710 kubelet[3033]: I1002 19:26:21.105751 3033 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:26:21.116710 kubelet[3033]: I1002 19:26:21.106187 3033 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 2 19:26:21.116710 kubelet[3033]: I1002 19:26:21.114125 3033 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:26:21.116710 kubelet[3033]: I1002 19:26:21.114243 3033 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:26:21.116710 kubelet[3033]: I1002 19:26:21.114284 3033 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:26:21.085000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:26:21.123942 kubelet[3033]: E1002 19:26:21.123873 3033 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:26:21.123942 kubelet[3033]: E1002 19:26:21.123931 3033 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:26:21.156704 kernel: audit: type=1327 audit(1696274781.085:981): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:26:21.156836 kernel: audit: type=1400 audit(1696274781.108:982): avc: denied { mac_admin } for pid=3033 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:21.108000 audit[3033]: AVC avc: denied { mac_admin } for pid=3033 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:21.179714 kernel: audit: type=1401 audit(1696274781.108:982): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:26:21.179827 kernel: audit: type=1300 audit(1696274781.108:982): arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c6ba00 a1=4000be5f08 a2=4000bff4d0 a3=25 items=0 ppid=1 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:21.108000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:26:21.108000 audit[3033]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c6ba00 a1=4000be5f08 a2=4000bff4d0 a3=25 items=0 ppid=1 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:21.180266 kubelet[3033]: I1002 19:26:21.180233 3033 volume_manager.go:291] "Starting Kubelet Volume Manager" Oct 2 19:26:21.180988 kubelet[3033]: I1002 19:26:21.180953 3033 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:26:21.181382 kubelet[3033]: I1002 19:26:21.181362 3033 reconciler_new.go:29] "Reconciler: start to sync state" Oct 2 19:26:21.108000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:26:21.288943 kubelet[3033]: I1002 19:26:21.288905 3033 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 2 19:26:21.293362 kubelet[3033]: I1002 19:26:21.293328 3033 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 2 19:26:21.293641 kubelet[3033]: I1002 19:26:21.293620 3033 status_manager.go:217] "Starting to sync pod status with apiserver" Oct 2 19:26:21.294068 kubelet[3033]: I1002 19:26:21.293892 3033 kubelet.go:2303] "Starting kubelet main sync loop" Oct 2 19:26:21.294184 kubelet[3033]: E1002 19:26:21.294140 3033 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:26:21.320744 kubelet[3033]: I1002 19:26:21.320697 3033 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-184" Oct 2 19:26:21.367665 kubelet[3033]: I1002 19:26:21.367564 3033 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-27-184" Oct 2 19:26:21.367861 kubelet[3033]: I1002 19:26:21.367778 3033 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-27-184" Oct 2 19:26:21.394304 kubelet[3033]: E1002 19:26:21.394252 3033 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Oct 2 19:26:21.518603 kubelet[3033]: I1002 19:26:21.518203 3033 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:26:21.518603 kubelet[3033]: I1002 19:26:21.518241 3033 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:26:21.518603 kubelet[3033]: I1002 19:26:21.518274 3033 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:26:21.518603 kubelet[3033]: I1002 19:26:21.518540 3033 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 19:26:21.518603 kubelet[3033]: I1002 19:26:21.518578 3033 state_mem.go:96] "Updated CPUSet assignments" assignments={} Oct 2 19:26:21.518603 kubelet[3033]: I1002 19:26:21.518594 3033 policy_none.go:49] "None policy: Start" Oct 2 19:26:21.520956 kubelet[3033]: I1002 19:26:21.520908 3033 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:26:21.520956 kubelet[3033]: I1002 19:26:21.520962 3033 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:26:21.521291 kubelet[3033]: I1002 19:26:21.521251 3033 state_mem.go:75] "Updated machine memory state" Oct 2 19:26:21.539214 kubelet[3033]: I1002 19:26:21.539161 3033 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:26:21.537000 audit[3033]: AVC avc: denied { mac_admin } for pid=3033 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:21.537000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:26:21.537000 audit[3033]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400112ee10 a1=40010df428 a2=400112ede0 a3=25 items=0 ppid=1 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:21.537000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:26:21.541355 kubelet[3033]: I1002 19:26:21.541111 3033 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:26:21.549902 kubelet[3033]: I1002 19:26:21.549856 3033 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:26:21.598938 kubelet[3033]: I1002 19:26:21.595053 3033 topology_manager.go:215] "Topology Admit Handler" podUID="be57e8eee3727f9170b1952cdc4d10af" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-27-184" Oct 2 19:26:21.598938 kubelet[3033]: I1002 19:26:21.595218 3033 topology_manager.go:215] "Topology Admit Handler" podUID="76d09cb692ea4d58960a8c0e23a7dd7d" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-27-184" Oct 2 19:26:21.598938 kubelet[3033]: I1002 19:26:21.595358 3033 topology_manager.go:215] "Topology Admit Handler" podUID="e06570d3661aa69c62d35af9b90aef47" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-27-184" Oct 2 19:26:21.609626 kubelet[3033]: E1002 19:26:21.607078 3033 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-27-184\" already exists" pod="kube-system/kube-scheduler-ip-172-31-27-184" Oct 2 19:26:21.693383 kubelet[3033]: I1002 19:26:21.693340 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/76d09cb692ea4d58960a8c0e23a7dd7d-ca-certs\") pod \"kube-controller-manager-ip-172-31-27-184\" (UID: \"76d09cb692ea4d58960a8c0e23a7dd7d\") " pod="kube-system/kube-controller-manager-ip-172-31-27-184" Oct 2 19:26:21.693704 kubelet[3033]: I1002 19:26:21.693653 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/76d09cb692ea4d58960a8c0e23a7dd7d-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-27-184\" (UID: \"76d09cb692ea4d58960a8c0e23a7dd7d\") " pod="kube-system/kube-controller-manager-ip-172-31-27-184" Oct 2 19:26:21.693960 kubelet[3033]: I1002 19:26:21.693910 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e06570d3661aa69c62d35af9b90aef47-kubeconfig\") pod \"kube-scheduler-ip-172-31-27-184\" (UID: \"e06570d3661aa69c62d35af9b90aef47\") " pod="kube-system/kube-scheduler-ip-172-31-27-184" Oct 2 19:26:21.694040 kubelet[3033]: I1002 19:26:21.693996 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/76d09cb692ea4d58960a8c0e23a7dd7d-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-27-184\" (UID: \"76d09cb692ea4d58960a8c0e23a7dd7d\") " pod="kube-system/kube-controller-manager-ip-172-31-27-184" Oct 2 19:26:21.694103 kubelet[3033]: I1002 19:26:21.694051 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/76d09cb692ea4d58960a8c0e23a7dd7d-k8s-certs\") pod \"kube-controller-manager-ip-172-31-27-184\" (UID: \"76d09cb692ea4d58960a8c0e23a7dd7d\") " pod="kube-system/kube-controller-manager-ip-172-31-27-184" Oct 2 19:26:21.694199 kubelet[3033]: I1002 19:26:21.694108 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/76d09cb692ea4d58960a8c0e23a7dd7d-kubeconfig\") pod \"kube-controller-manager-ip-172-31-27-184\" (UID: \"76d09cb692ea4d58960a8c0e23a7dd7d\") " pod="kube-system/kube-controller-manager-ip-172-31-27-184" Oct 2 19:26:21.694199 kubelet[3033]: I1002 19:26:21.694150 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/be57e8eee3727f9170b1952cdc4d10af-ca-certs\") pod \"kube-apiserver-ip-172-31-27-184\" (UID: \"be57e8eee3727f9170b1952cdc4d10af\") " pod="kube-system/kube-apiserver-ip-172-31-27-184" Oct 2 19:26:21.694325 kubelet[3033]: I1002 19:26:21.694228 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/be57e8eee3727f9170b1952cdc4d10af-k8s-certs\") pod \"kube-apiserver-ip-172-31-27-184\" (UID: \"be57e8eee3727f9170b1952cdc4d10af\") " pod="kube-system/kube-apiserver-ip-172-31-27-184" Oct 2 19:26:21.694325 kubelet[3033]: I1002 19:26:21.694274 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/be57e8eee3727f9170b1952cdc4d10af-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-27-184\" (UID: \"be57e8eee3727f9170b1952cdc4d10af\") " pod="kube-system/kube-apiserver-ip-172-31-27-184" Oct 2 19:26:22.057755 sudo[3043]: pam_unix(sudo:session): session closed for user root Oct 2 19:26:22.056000 audit[3043]: USER_END pid=3043 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:22.056000 audit[3043]: CRED_DISP pid=3043 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:22.079884 kubelet[3033]: I1002 19:26:22.079839 3033 apiserver.go:52] "Watching apiserver" Oct 2 19:26:22.181994 kubelet[3033]: I1002 19:26:22.181926 3033 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:26:22.326886 kubelet[3033]: I1002 19:26:22.326761 3033 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-27-184" podStartSLOduration=3.326596581 podCreationTimestamp="2023-10-02 19:26:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:26:22.31506683 +0000 UTC m=+1.539324518" watchObservedRunningTime="2023-10-02 19:26:22.326596581 +0000 UTC m=+1.550854245" Oct 2 19:26:22.342229 kubelet[3033]: I1002 19:26:22.342160 3033 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-27-184" podStartSLOduration=1.342082992 podCreationTimestamp="2023-10-02 19:26:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:26:22.340667008 +0000 UTC m=+1.564924660" watchObservedRunningTime="2023-10-02 19:26:22.342082992 +0000 UTC m=+1.566340644" Oct 2 19:26:22.342389 kubelet[3033]: I1002 19:26:22.342370 3033 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-27-184" podStartSLOduration=1.342336315 podCreationTimestamp="2023-10-02 19:26:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:26:22.329281715 +0000 UTC m=+1.553539391" watchObservedRunningTime="2023-10-02 19:26:22.342336315 +0000 UTC m=+1.566593979" Oct 2 19:26:26.248366 sudo[1998]: pam_unix(sudo:session): session closed for user root Oct 2 19:26:26.252083 kernel: kauditd_printk_skb: 7 callbacks suppressed Oct 2 19:26:26.252184 kernel: audit: type=1106 audit(1696274786.247:986): pid=1998 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:26.247000 audit[1998]: USER_END pid=1998 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:26.247000 audit[1998]: CRED_DISP pid=1998 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:26.268488 kernel: audit: type=1104 audit(1696274786.247:987): pid=1998 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:26.274753 sshd[1995]: pam_unix(sshd:session): session closed for user core Oct 2 19:26:26.275000 audit[1995]: USER_END pid=1995 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:26:26.275000 audit[1995]: CRED_DISP pid=1995 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:26:26.299041 kernel: audit: type=1106 audit(1696274786.275:988): pid=1995 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:26:26.299124 kernel: audit: type=1104 audit(1696274786.275:989): pid=1995 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:26:26.299994 systemd[1]: sshd@6-172.31.27.184:22-139.178.89.65:52362.service: Deactivated successfully. Oct 2 19:26:26.301265 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:26:26.301607 systemd[1]: session-7.scope: Consumed 11.812s CPU time. Oct 2 19:26:26.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.184:22-139.178.89.65:52362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:26.302820 systemd-logind[1722]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:26:26.311551 kernel: audit: type=1131 audit(1696274786.298:990): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.184:22-139.178.89.65:52362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:26.312671 systemd-logind[1722]: Removed session 7. Oct 2 19:26:30.571000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:26:30.571000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001088e00 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:26:30.599034 kernel: audit: type=1400 audit(1696274790.571:991): avc: denied { watch } for pid=2895 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:26:30.599156 kernel: audit: type=1300 audit(1696274790.571:991): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001088e00 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:26:30.571000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:30.611012 kernel: audit: type=1327 audit(1696274790.571:991): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:31.339000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:31.339000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d0f900 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:26:31.363818 kernel: audit: type=1400 audit(1696274791.339:992): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:31.363970 kernel: audit: type=1300 audit(1696274791.339:992): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d0f900 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:26:31.339000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:31.374954 kernel: audit: type=1327 audit(1696274791.339:992): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:31.375150 kernel: audit: type=1400 audit(1696274791.339:993): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:31.339000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:31.339000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d0fa60 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:26:31.397642 kernel: audit: type=1300 audit(1696274791.339:993): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d0fa60 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:26:31.339000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:31.408422 kernel: audit: type=1327 audit(1696274791.339:993): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:31.408590 kernel: audit: type=1400 audit(1696274791.345:994): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:31.345000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:31.345000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d0fba0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:26:31.430699 kernel: audit: type=1300 audit(1696274791.345:994): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d0fba0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:26:31.431002 kernel: audit: type=1327 audit(1696274791.345:994): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:31.345000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:31.345000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:31.451115 kernel: audit: type=1400 audit(1696274791.345:995): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:31.345000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000da6fc0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:26:31.345000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:32.220295 kubelet[3033]: I1002 19:26:32.219925 3033 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 19:26:32.221008 kubelet[3033]: I1002 19:26:32.220940 3033 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 19:26:32.221090 env[1732]: time="2023-10-02T19:26:32.220567205Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:26:32.833921 kubelet[3033]: I1002 19:26:32.833863 3033 topology_manager.go:215] "Topology Admit Handler" podUID="b158e910-2bed-4b84-8f32-89e6b6383cf8" podNamespace="kube-system" podName="kube-proxy-fvnql" Oct 2 19:26:32.845311 systemd[1]: Created slice kubepods-besteffort-podb158e910_2bed_4b84_8f32_89e6b6383cf8.slice. Oct 2 19:26:32.866050 kubelet[3033]: I1002 19:26:32.865993 3033 topology_manager.go:215] "Topology Admit Handler" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" podNamespace="kube-system" podName="cilium-r2wml" Oct 2 19:26:32.872793 kubelet[3033]: I1002 19:26:32.872745 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b158e910-2bed-4b84-8f32-89e6b6383cf8-xtables-lock\") pod \"kube-proxy-fvnql\" (UID: \"b158e910-2bed-4b84-8f32-89e6b6383cf8\") " pod="kube-system/kube-proxy-fvnql" Oct 2 19:26:32.873095 kubelet[3033]: I1002 19:26:32.873045 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b158e910-2bed-4b84-8f32-89e6b6383cf8-lib-modules\") pod \"kube-proxy-fvnql\" (UID: \"b158e910-2bed-4b84-8f32-89e6b6383cf8\") " pod="kube-system/kube-proxy-fvnql" Oct 2 19:26:32.873437 kubelet[3033]: I1002 19:26:32.873398 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-76mdr\" (UniqueName: \"kubernetes.io/projected/b158e910-2bed-4b84-8f32-89e6b6383cf8-kube-api-access-76mdr\") pod \"kube-proxy-fvnql\" (UID: \"b158e910-2bed-4b84-8f32-89e6b6383cf8\") " pod="kube-system/kube-proxy-fvnql" Oct 2 19:26:32.873727 kubelet[3033]: I1002 19:26:32.873664 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/b158e910-2bed-4b84-8f32-89e6b6383cf8-kube-proxy\") pod \"kube-proxy-fvnql\" (UID: \"b158e910-2bed-4b84-8f32-89e6b6383cf8\") " pod="kube-system/kube-proxy-fvnql" Oct 2 19:26:32.877157 systemd[1]: Created slice kubepods-burstable-pod74fc5ce2_141a_4229_be64_48dc72ee9d6a.slice. Oct 2 19:26:32.974492 kubelet[3033]: I1002 19:26:32.974426 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etc-cni-netd\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-etc-cni-netd\") pod \"cilium-r2wml\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " pod="kube-system/cilium-r2wml" Oct 2 19:26:32.975056 kubelet[3033]: I1002 19:26:32.975001 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"hostproc\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-hostproc\") pod \"cilium-r2wml\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " pod="kube-system/cilium-r2wml" Oct 2 19:26:32.975522 kubelet[3033]: I1002 19:26:32.975455 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-xtables-lock\") pod \"cilium-r2wml\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " pod="kube-system/cilium-r2wml" Oct 2 19:26:32.975831 kubelet[3033]: I1002 19:26:32.975790 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"hubble-tls\" (UniqueName: \"kubernetes.io/projected/74fc5ce2-141a-4229-be64-48dc72ee9d6a-hubble-tls\") pod \"cilium-r2wml\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " pod="kube-system/cilium-r2wml" Oct 2 19:26:32.975946 kubelet[3033]: I1002 19:26:32.975905 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/74fc5ce2-141a-4229-be64-48dc72ee9d6a-cilium-config-path\") pod \"cilium-r2wml\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " pod="kube-system/cilium-r2wml" Oct 2 19:26:32.976021 kubelet[3033]: I1002 19:26:32.975977 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"clustermesh-secrets\" (UniqueName: \"kubernetes.io/secret/74fc5ce2-141a-4229-be64-48dc72ee9d6a-clustermesh-secrets\") pod \"cilium-r2wml\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " pod="kube-system/cilium-r2wml" Oct 2 19:26:32.976144 kubelet[3033]: I1002 19:26:32.976114 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"host-proc-sys-kernel\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-host-proc-sys-kernel\") pod \"cilium-r2wml\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " pod="kube-system/cilium-r2wml" Oct 2 19:26:32.976439 kubelet[3033]: I1002 19:26:32.976405 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9xvjc\" (UniqueName: \"kubernetes.io/projected/74fc5ce2-141a-4229-be64-48dc72ee9d6a-kube-api-access-9xvjc\") pod \"cilium-r2wml\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " pod="kube-system/cilium-r2wml" Oct 2 19:26:32.976735 kubelet[3033]: I1002 19:26:32.976668 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-lib-modules\") pod \"cilium-r2wml\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " pod="kube-system/cilium-r2wml" Oct 2 19:26:32.976897 kubelet[3033]: I1002 19:26:32.976858 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"bpf-maps\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-bpf-maps\") pod \"cilium-r2wml\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " pod="kube-system/cilium-r2wml" Oct 2 19:26:32.977043 kubelet[3033]: I1002 19:26:32.977005 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-path\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-cni-path\") pod \"cilium-r2wml\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " pod="kube-system/cilium-r2wml" Oct 2 19:26:32.977336 kubelet[3033]: I1002 19:26:32.977286 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-run\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-cilium-run\") pod \"cilium-r2wml\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " pod="kube-system/cilium-r2wml" Oct 2 19:26:32.977600 kubelet[3033]: I1002 19:26:32.977563 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-cgroup\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-cilium-cgroup\") pod \"cilium-r2wml\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " pod="kube-system/cilium-r2wml" Oct 2 19:26:32.977791 kubelet[3033]: I1002 19:26:32.977658 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"host-proc-sys-net\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-host-proc-sys-net\") pod \"cilium-r2wml\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " pod="kube-system/cilium-r2wml" Oct 2 19:26:33.068425 kubelet[3033]: I1002 19:26:33.068356 3033 topology_manager.go:215] "Topology Admit Handler" podUID="2e8cd754-25e0-40bb-828c-751ddf3559bc" podNamespace="kube-system" podName="cilium-operator-6bc8ccdb58-ww47l" Oct 2 19:26:33.080262 systemd[1]: Created slice kubepods-besteffort-pod2e8cd754_25e0_40bb_828c_751ddf3559bc.slice. Oct 2 19:26:33.159475 env[1732]: time="2023-10-02T19:26:33.158628905Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fvnql,Uid:b158e910-2bed-4b84-8f32-89e6b6383cf8,Namespace:kube-system,Attempt:0,}" Oct 2 19:26:33.182801 kubelet[3033]: I1002 19:26:33.182730 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/2e8cd754-25e0-40bb-828c-751ddf3559bc-cilium-config-path\") pod \"cilium-operator-6bc8ccdb58-ww47l\" (UID: \"2e8cd754-25e0-40bb-828c-751ddf3559bc\") " pod="kube-system/cilium-operator-6bc8ccdb58-ww47l" Oct 2 19:26:33.183036 kubelet[3033]: I1002 19:26:33.182853 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bn8fj\" (UniqueName: \"kubernetes.io/projected/2e8cd754-25e0-40bb-828c-751ddf3559bc-kube-api-access-bn8fj\") pod \"cilium-operator-6bc8ccdb58-ww47l\" (UID: \"2e8cd754-25e0-40bb-828c-751ddf3559bc\") " pod="kube-system/cilium-operator-6bc8ccdb58-ww47l" Oct 2 19:26:33.234527 env[1732]: time="2023-10-02T19:26:33.234374703Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:26:33.235160 env[1732]: time="2023-10-02T19:26:33.234612652Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:26:33.235311 env[1732]: time="2023-10-02T19:26:33.235217961Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:26:33.235957 env[1732]: time="2023-10-02T19:26:33.235854265Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e8603c671d8229c4a95dba799f7ba41405231dc2efc971da387f37b8eaf346c5 pid=3110 runtime=io.containerd.runc.v2 Oct 2 19:26:33.270420 systemd[1]: Started cri-containerd-e8603c671d8229c4a95dba799f7ba41405231dc2efc971da387f37b8eaf346c5.scope. Oct 2 19:26:33.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.332000 audit: BPF prog-id=115 op=LOAD Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bfb38 a2=10 a3=0 items=0 ppid=3110 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538363033633637316438323239633461393564626137393966376261 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bf5a0 a2=3c a3=0 items=0 ppid=3110 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538363033633637316438323239633461393564626137393966376261 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit: BPF prog-id=116 op=LOAD Oct 2 19:26:33.334000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bf8e0 a2=78 a3=0 items=0 ppid=3110 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538363033633637316438323239633461393564626137393966376261 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit: BPF prog-id=117 op=LOAD Oct 2 19:26:33.334000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bf670 a2=78 a3=0 items=0 ppid=3110 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538363033633637316438323239633461393564626137393966376261 Oct 2 19:26:33.334000 audit: BPF prog-id=117 op=UNLOAD Oct 2 19:26:33.334000 audit: BPF prog-id=116 op=UNLOAD Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.334000 audit: BPF prog-id=118 op=LOAD Oct 2 19:26:33.334000 audit[3120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bfb40 a2=78 a3=0 items=0 ppid=3110 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538363033633637316438323239633461393564626137393966376261 Oct 2 19:26:33.367972 env[1732]: time="2023-10-02T19:26:33.367905523Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fvnql,Uid:b158e910-2bed-4b84-8f32-89e6b6383cf8,Namespace:kube-system,Attempt:0,} returns sandbox id \"e8603c671d8229c4a95dba799f7ba41405231dc2efc971da387f37b8eaf346c5\"" Oct 2 19:26:33.374620 env[1732]: time="2023-10-02T19:26:33.374549765Z" level=info msg="CreateContainer within sandbox \"e8603c671d8229c4a95dba799f7ba41405231dc2efc971da387f37b8eaf346c5\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:26:33.398023 env[1732]: time="2023-10-02T19:26:33.397947239Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:cilium-operator-6bc8ccdb58-ww47l,Uid:2e8cd754-25e0-40bb-828c-751ddf3559bc,Namespace:kube-system,Attempt:0,}" Oct 2 19:26:33.406341 env[1732]: time="2023-10-02T19:26:33.406169996Z" level=info msg="CreateContainer within sandbox \"e8603c671d8229c4a95dba799f7ba41405231dc2efc971da387f37b8eaf346c5\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"0bd9885ecfa43cebbd9342f90d213a8a94ded309c24ac2c2a3025019bb22b833\"" Oct 2 19:26:33.408461 env[1732]: time="2023-10-02T19:26:33.408402528Z" level=info msg="StartContainer for \"0bd9885ecfa43cebbd9342f90d213a8a94ded309c24ac2c2a3025019bb22b833\"" Oct 2 19:26:33.454837 env[1732]: time="2023-10-02T19:26:33.454706326Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:26:33.455010 env[1732]: time="2023-10-02T19:26:33.454866971Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:26:33.455010 env[1732]: time="2023-10-02T19:26:33.454931267Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:26:33.455359 env[1732]: time="2023-10-02T19:26:33.455249989Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1758a14eddb35c3fe38a85bdfb56e839651edef90cd6879d886604119bd4dec5 pid=3158 runtime=io.containerd.runc.v2 Oct 2 19:26:33.477895 systemd[1]: Started cri-containerd-0bd9885ecfa43cebbd9342f90d213a8a94ded309c24ac2c2a3025019bb22b833.scope. Oct 2 19:26:33.491358 env[1732]: time="2023-10-02T19:26:33.489760897Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:cilium-r2wml,Uid:74fc5ce2-141a-4229-be64-48dc72ee9d6a,Namespace:kube-system,Attempt:0,}" Oct 2 19:26:33.522052 systemd[1]: Started cri-containerd-1758a14eddb35c3fe38a85bdfb56e839651edef90cd6879d886604119bd4dec5.scope. Oct 2 19:26:33.558393 env[1732]: time="2023-10-02T19:26:33.558252729Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:26:33.558746 env[1732]: time="2023-10-02T19:26:33.558334462Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:26:33.558944 env[1732]: time="2023-10-02T19:26:33.558867805Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:26:33.559394 env[1732]: time="2023-10-02T19:26:33.559317892Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe pid=3199 runtime=io.containerd.runc.v2 Oct 2 19:26:33.578000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.578000 audit[3155]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3110 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062643938383565636661343363656262643933343266393064323133 Oct 2 19:26:33.579000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.579000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.579000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.579000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.579000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.579000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.579000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.579000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.579000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.579000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.579000 audit: BPF prog-id=119 op=LOAD Oct 2 19:26:33.579000 audit[3155]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3110 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062643938383565636661343363656262643933343266393064323133 Oct 2 19:26:33.581000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.581000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.581000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.581000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.581000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.581000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.581000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.581000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.581000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.581000 audit: BPF prog-id=120 op=LOAD Oct 2 19:26:33.581000 audit[3155]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3110 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062643938383565636661343363656262643933343266393064323133 Oct 2 19:26:33.583000 audit: BPF prog-id=120 op=UNLOAD Oct 2 19:26:33.583000 audit: BPF prog-id=119 op=UNLOAD Oct 2 19:26:33.583000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.583000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.583000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.583000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.583000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.583000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.583000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.583000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.583000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.583000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.583000 audit: BPF prog-id=121 op=LOAD Oct 2 19:26:33.583000 audit[3155]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3110 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062643938383565636661343363656262643933343266393064323133 Oct 2 19:26:33.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.594000 audit: BPF prog-id=122 op=LOAD Oct 2 19:26:33.599000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.599000 audit[3172]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3158 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137353861313465646462333563336665333861383562646662353665 Oct 2 19:26:33.599000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.599000 audit[3172]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3158 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137353861313465646462333563336665333861383562646662353665 Oct 2 19:26:33.600000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.600000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.600000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.600000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.600000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.600000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.600000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.600000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.600000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.600000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.600000 audit: BPF prog-id=123 op=LOAD Oct 2 19:26:33.600000 audit[3172]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3158 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137353861313465646462333563336665333861383562646662353665 Oct 2 19:26:33.602000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.602000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.602000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.602000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.602000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.602000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.602000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.602000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.602000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.602000 audit: BPF prog-id=124 op=LOAD Oct 2 19:26:33.602000 audit[3172]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3158 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137353861313465646462333563336665333861383562646662353665 Oct 2 19:26:33.613000 audit: BPF prog-id=124 op=UNLOAD Oct 2 19:26:33.614000 audit: BPF prog-id=123 op=UNLOAD Oct 2 19:26:33.615000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.615000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.615000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.615000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.615000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.615000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.615000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.615000 audit[3172]: AVC avc: denied { perfmon } for pid=3172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.615000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.615000 audit[3172]: AVC avc: denied { bpf } for pid=3172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.615000 audit: BPF prog-id=125 op=LOAD Oct 2 19:26:33.615000 audit[3172]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3158 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137353861313465646462333563336665333861383562646662353665 Oct 2 19:26:33.631383 systemd[1]: Started cri-containerd-1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe.scope. Oct 2 19:26:33.668366 env[1732]: time="2023-10-02T19:26:33.668284470Z" level=info msg="StartContainer for \"0bd9885ecfa43cebbd9342f90d213a8a94ded309c24ac2c2a3025019bb22b833\" returns successfully" Oct 2 19:26:33.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.680000 audit: BPF prog-id=126 op=LOAD Oct 2 19:26:33.681000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.681000 audit[3209]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3199 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166353739386565343463643863343530363437366534616632353634 Oct 2 19:26:33.681000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.681000 audit[3209]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3199 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166353739386565343463643863343530363437366534616632353634 Oct 2 19:26:33.681000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.681000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.681000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.681000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.681000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.681000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.681000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.681000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.681000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.681000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.681000 audit: BPF prog-id=127 op=LOAD Oct 2 19:26:33.681000 audit[3209]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3199 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166353739386565343463643863343530363437366534616632353634 Oct 2 19:26:33.682000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.682000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.682000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.682000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.682000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.682000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.682000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.682000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.682000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.682000 audit: BPF prog-id=128 op=LOAD Oct 2 19:26:33.682000 audit[3209]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3199 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166353739386565343463643863343530363437366534616632353634 Oct 2 19:26:33.682000 audit: BPF prog-id=128 op=UNLOAD Oct 2 19:26:33.682000 audit: BPF prog-id=127 op=UNLOAD Oct 2 19:26:33.682000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.682000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.682000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.682000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.682000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.682000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.682000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.682000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.682000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.682000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:33.682000 audit: BPF prog-id=129 op=LOAD Oct 2 19:26:33.682000 audit[3209]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3199 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166353739386565343463643863343530363437366534616632353634 Oct 2 19:26:33.755872 env[1732]: time="2023-10-02T19:26:33.755638284Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:cilium-operator-6bc8ccdb58-ww47l,Uid:2e8cd754-25e0-40bb-828c-751ddf3559bc,Namespace:kube-system,Attempt:0,} returns sandbox id \"1758a14eddb35c3fe38a85bdfb56e839651edef90cd6879d886604119bd4dec5\"" Oct 2 19:26:33.769950 env[1732]: time="2023-10-02T19:26:33.768011150Z" level=info msg="PullImage \"quay.io/cilium/operator-generic:v1.12.5@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e\"" Oct 2 19:26:33.782960 env[1732]: time="2023-10-02T19:26:33.781887267Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:cilium-r2wml,Uid:74fc5ce2-141a-4229-be64-48dc72ee9d6a,Namespace:kube-system,Attempt:0,} returns sandbox id \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\"" Oct 2 19:26:33.935000 audit[3285]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=3285 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:33.935000 audit[3285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff75adca0 a2=0 a3=ffffbdc216c0 items=0 ppid=3186 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.935000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:26:33.937000 audit[3286]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=3286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:33.937000 audit[3286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc61ef4f0 a2=0 a3=ffff9b27c6c0 items=0 ppid=3186 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.937000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:26:33.939000 audit[3287]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=3287 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:33.939000 audit[3287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffa98bab0 a2=0 a3=ffffb155b6c0 items=0 ppid=3186 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.939000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:26:33.942000 audit[3288]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=3288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:33.942000 audit[3288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcaf156a0 a2=0 a3=ffffb9d3a6c0 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.942000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:26:33.953000 audit[3290]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=3290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:33.953000 audit[3290]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeb24b070 a2=0 a3=ffffb35996c0 items=0 ppid=3186 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.953000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:26:33.955000 audit[3289]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=3289 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:33.955000 audit[3289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffda0d10b0 a2=0 a3=ffffaeeee6c0 items=0 ppid=3186 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:33.955000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:26:34.050000 audit[3291]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3291 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:34.050000 audit[3291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffcb515aa0 a2=0 a3=ffffa6f8d6c0 items=0 ppid=3186 pid=3291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.050000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:26:34.061000 audit[3293]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3293 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:34.061000 audit[3293]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe9813ab0 a2=0 a3=ffff8ab3d6c0 items=0 ppid=3186 pid=3293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.061000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:26:34.076000 audit[3296]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3296 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:34.076000 audit[3296]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffffdb5c8b0 a2=0 a3=ffffbc84f6c0 items=0 ppid=3186 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.076000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:26:34.089000 audit[3297]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3297 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:34.089000 audit[3297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdc6944f0 a2=0 a3=ffffbdb506c0 items=0 ppid=3186 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.089000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:26:34.097000 audit[3299]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3299 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:34.097000 audit[3299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd8469590 a2=0 a3=ffffa44946c0 items=0 ppid=3186 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.097000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:26:34.102000 audit[3300]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3300 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:34.102000 audit[3300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdb0689f0 a2=0 a3=ffff9e94c6c0 items=0 ppid=3186 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.102000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:26:34.111000 audit[3302]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3302 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:34.111000 audit[3302]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffa4b74a0 a2=0 a3=ffffa73906c0 items=0 ppid=3186 pid=3302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:26:34.127000 audit[3305]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3305 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:34.127000 audit[3305]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff5f08530 a2=0 a3=ffffae7d16c0 items=0 ppid=3186 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:26:34.132000 audit[3306]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3306 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:34.132000 audit[3306]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff1aa9390 a2=0 a3=ffff97dfa6c0 items=0 ppid=3186 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.132000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:26:34.141000 audit[3308]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:34.141000 audit[3308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffd1dc430 a2=0 a3=ffff94efa6c0 items=0 ppid=3186 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.141000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:26:34.146000 audit[3309]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3309 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:34.146000 audit[3309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd8f209f0 a2=0 a3=ffffb174b6c0 items=0 ppid=3186 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.146000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:26:34.156000 audit[3311]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3311 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:34.156000 audit[3311]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff1ca2690 a2=0 a3=ffffb40a76c0 items=0 ppid=3186 pid=3311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:26:34.170000 audit[3314]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:34.170000 audit[3314]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff31e6440 a2=0 a3=ffffadf226c0 items=0 ppid=3186 pid=3314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:26:34.184000 audit[3317]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:34.184000 audit[3317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff13f8240 a2=0 a3=ffff9dff86c0 items=0 ppid=3186 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.184000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:26:34.189000 audit[3318]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:34.189000 audit[3318]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc6139810 a2=0 a3=ffff973416c0 items=0 ppid=3186 pid=3318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.189000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:26:34.198000 audit[3320]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:34.198000 audit[3320]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffdc264830 a2=0 a3=ffffbad5d6c0 items=0 ppid=3186 pid=3320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.198000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:26:34.212000 audit[3323]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:34.212000 audit[3323]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffed87e4e0 a2=0 a3=ffff8c6306c0 items=0 ppid=3186 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.212000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:26:34.216000 audit[3324]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:34.216000 audit[3324]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc1ddb190 a2=0 a3=ffff866de6c0 items=0 ppid=3186 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.216000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:26:34.230000 audit[3326]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:34.230000 audit[3326]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffdac86120 a2=0 a3=ffffb66dd6c0 items=0 ppid=3186 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.230000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:26:34.312000 audit[3332]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:26:34.312000 audit[3332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=fffff9df05c0 a2=0 a3=ffff80f2f6c0 items=0 ppid=3186 pid=3332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.312000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:26:34.353000 audit[3332]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:26:34.353000 audit[3332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=fffff9df05c0 a2=0 a3=ffff80f2f6c0 items=0 ppid=3186 pid=3332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.353000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:26:34.362000 audit[3337]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3337 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.362000 audit[3337]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd3b28c70 a2=0 a3=ffffb57756c0 items=0 ppid=3186 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.362000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:26:34.372000 audit[3339]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3339 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.372000 audit[3339]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe4c6ac80 a2=0 a3=ffffb66b36c0 items=0 ppid=3186 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.372000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:26:34.389000 audit[3342]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3342 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.389000 audit[3342]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffdf823b60 a2=0 a3=ffffbd86a6c0 items=0 ppid=3186 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.389000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:26:34.393000 audit[3343]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.393000 audit[3343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffebdeb130 a2=0 a3=ffffacc986c0 items=0 ppid=3186 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.393000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:26:34.401000 audit[3345]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.401000 audit[3345]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc4fc2080 a2=0 a3=ffff9cb896c0 items=0 ppid=3186 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.401000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:26:34.405000 audit[3346]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.405000 audit[3346]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdb5d62a0 a2=0 a3=ffffb860b6c0 items=0 ppid=3186 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.405000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:26:34.415000 audit[3348]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.415000 audit[3348]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff6f800b0 a2=0 a3=ffffb26446c0 items=0 ppid=3186 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.415000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:26:34.427000 audit[3351]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3351 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.427000 audit[3351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffffe139a30 a2=0 a3=ffff9cec16c0 items=0 ppid=3186 pid=3351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.427000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:26:34.433000 audit[3352]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3352 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.433000 audit[3352]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeda26e70 a2=0 a3=ffffb523e6c0 items=0 ppid=3186 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:26:34.448000 audit[3354]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3354 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.448000 audit[3354]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff877d0f0 a2=0 a3=ffffa41066c0 items=0 ppid=3186 pid=3354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.448000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:26:34.453000 audit[3355]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3355 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.453000 audit[3355]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc20a1d60 a2=0 a3=ffffb2ff66c0 items=0 ppid=3186 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.453000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:26:34.469000 audit[3357]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3357 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.469000 audit[3357]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff80dfb30 a2=0 a3=ffff9cd926c0 items=0 ppid=3186 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.469000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:26:34.489000 audit[3360]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3360 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.489000 audit[3360]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcfa397b0 a2=0 a3=ffff898f36c0 items=0 ppid=3186 pid=3360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.489000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:26:34.507000 audit[3363]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.507000 audit[3363]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd91c9340 a2=0 a3=ffff92b176c0 items=0 ppid=3186 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.507000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:26:34.511000 audit[3364]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.511000 audit[3364]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdf8392b0 a2=0 a3=ffffbed3e6c0 items=0 ppid=3186 pid=3364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.511000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:26:34.521000 audit[3366]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.521000 audit[3366]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffffd26b7a0 a2=0 a3=ffffbcb8c6c0 items=0 ppid=3186 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:26:34.537000 audit[3369]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3369 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.537000 audit[3369]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffced0a7d0 a2=0 a3=ffffb06ec6c0 items=0 ppid=3186 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.537000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:26:34.543000 audit[3370]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.543000 audit[3370]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdd88bd50 a2=0 a3=ffffaa5146c0 items=0 ppid=3186 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:26:34.553000 audit[3372]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.553000 audit[3372]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd9abdaa0 a2=0 a3=ffffad0a76c0 items=0 ppid=3186 pid=3372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.553000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:26:34.559000 audit[3373]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.559000 audit[3373]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff0826880 a2=0 a3=ffff925286c0 items=0 ppid=3186 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:26:34.571000 audit[3375]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.571000 audit[3375]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff06594d0 a2=0 a3=ffff96d1d6c0 items=0 ppid=3186 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.571000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:26:34.586000 audit[3378]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:34.586000 audit[3378]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffef675450 a2=0 a3=ffffb7a976c0 items=0 ppid=3186 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.586000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:26:34.596000 audit[3380]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:26:34.596000 audit[3380]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffff6012e20 a2=0 a3=ffffa4eea6c0 items=0 ppid=3186 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.596000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:26:34.597000 audit[3380]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:26:34.597000 audit[3380]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=fffff6012e20 a2=0 a3=ffffa4eea6c0 items=0 ppid=3186 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:34.597000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:26:35.120634 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2106940838.mount: Deactivated successfully. Oct 2 19:26:36.204975 env[1732]: time="2023-10-02T19:26:36.204913827Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/cilium/operator-generic@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:36.209577 env[1732]: time="2023-10-02T19:26:36.209506169Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:59357949c22410bca94f8bb5a7a7f73d575949bc16ddc4bd8c740843d4254180,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:36.212920 env[1732]: time="2023-10-02T19:26:36.212860440Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/cilium/operator-generic@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:36.214115 env[1732]: time="2023-10-02T19:26:36.214054243Z" level=info msg="PullImage \"quay.io/cilium/operator-generic:v1.12.5@sha256:b296eb7f0f7656a5cc19724f40a8a7121b7fd725278b7d61dc91fe0b7ffd7c0e\" returns image reference \"sha256:59357949c22410bca94f8bb5a7a7f73d575949bc16ddc4bd8c740843d4254180\"" Oct 2 19:26:36.220019 env[1732]: time="2023-10-02T19:26:36.219961025Z" level=info msg="PullImage \"quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\"" Oct 2 19:26:36.221659 env[1732]: time="2023-10-02T19:26:36.221601290Z" level=info msg="CreateContainer within sandbox \"1758a14eddb35c3fe38a85bdfb56e839651edef90cd6879d886604119bd4dec5\" for container &ContainerMetadata{Name:cilium-operator,Attempt:0,}" Oct 2 19:26:36.247613 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2903487778.mount: Deactivated successfully. Oct 2 19:26:36.262263 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2709881304.mount: Deactivated successfully. Oct 2 19:26:36.265890 env[1732]: time="2023-10-02T19:26:36.265807119Z" level=info msg="CreateContainer within sandbox \"1758a14eddb35c3fe38a85bdfb56e839651edef90cd6879d886604119bd4dec5\" for &ContainerMetadata{Name:cilium-operator,Attempt:0,} returns container id \"ae03908b24d3aaf86ed9d1a30038b568dca37ab547848d48939dbfde048575ce\"" Oct 2 19:26:36.268049 env[1732]: time="2023-10-02T19:26:36.266888362Z" level=info msg="StartContainer for \"ae03908b24d3aaf86ed9d1a30038b568dca37ab547848d48939dbfde048575ce\"" Oct 2 19:26:36.326293 systemd[1]: Started cri-containerd-ae03908b24d3aaf86ed9d1a30038b568dca37ab547848d48939dbfde048575ce.scope. Oct 2 19:26:36.384375 kernel: kauditd_printk_skb: 369 callbacks suppressed Oct 2 19:26:36.384565 kernel: audit: type=1400 audit(1696274796.372:1107): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.392671 kernel: audit: type=1400 audit(1696274796.374:1108): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.401793 kernel: audit: type=1400 audit(1696274796.374:1109): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.401985 kernel: audit: type=1400 audit(1696274796.374:1110): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.418016 kernel: audit: type=1400 audit(1696274796.374:1111): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.426646 kernel: audit: type=1400 audit(1696274796.374:1112): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.428880 kernel: audit: type=1400 audit(1696274796.374:1113): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.443008 kernel: audit: type=1400 audit(1696274796.374:1114): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.452215 kernel: audit: type=1400 audit(1696274796.374:1115): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.460234 kernel: audit: type=1400 audit(1696274796.383:1116): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.383000 audit: BPF prog-id=130 op=LOAD Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=3158 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:36.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165303339303862323464336161663836656439643161333030333862 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3158 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:36.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165303339303862323464336161663836656439643161333030333862 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit: BPF prog-id=131 op=LOAD Oct 2 19:26:36.391000 audit[3387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3158 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:36.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165303339303862323464336161663836656439643161333030333862 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit: BPF prog-id=132 op=LOAD Oct 2 19:26:36.391000 audit[3387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3158 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:36.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165303339303862323464336161663836656439643161333030333862 Oct 2 19:26:36.391000 audit: BPF prog-id=132 op=UNLOAD Oct 2 19:26:36.391000 audit: BPF prog-id=131 op=UNLOAD Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.391000 audit: BPF prog-id=133 op=LOAD Oct 2 19:26:36.391000 audit[3387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3158 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:36.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165303339303862323464336161663836656439643161333030333862 Oct 2 19:26:36.493926 env[1732]: time="2023-10-02T19:26:36.493852681Z" level=info msg="StartContainer for \"ae03908b24d3aaf86ed9d1a30038b568dca37ab547848d48939dbfde048575ce\" returns successfully" Oct 2 19:26:36.580000 audit[3398]: AVC avc: denied { map_create } for pid=3398 comm="cilium-operator" scontext=system_u:system_r:svirt_lxc_net_t:s0:c307,c999 tcontext=system_u:system_r:svirt_lxc_net_t:s0:c307,c999 tclass=bpf permissive=0 Oct 2 19:26:36.580000 audit[3398]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-13 a0=0 a1=400068f768 a2=48 a3=0 items=0 ppid=3158 pid=3398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cilium-operator" exe="/usr/bin/cilium-operator-generic" subj=system_u:system_r:svirt_lxc_net_t:s0:c307,c999 key=(null) Oct 2 19:26:36.580000 audit: PROCTITLE proctitle=63696C69756D2D6F70657261746F722D67656E65726963002D2D636F6E6669672D6469723D2F746D702F63696C69756D2F636F6E6669672D6D6170002D2D64656275673D66616C7365 Oct 2 19:26:37.676051 kubelet[3033]: I1002 19:26:37.675993 3033 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-fvnql" podStartSLOduration=5.675935048 podCreationTimestamp="2023-10-02 19:26:32 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:26:34.469573862 +0000 UTC m=+13.693831526" watchObservedRunningTime="2023-10-02 19:26:37.675935048 +0000 UTC m=+16.900192712" Oct 2 19:26:41.316455 kubelet[3033]: I1002 19:26:41.316347 3033 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/cilium-operator-6bc8ccdb58-ww47l" podStartSLOduration=5.86536548 podCreationTimestamp="2023-10-02 19:26:33 +0000 UTC" firstStartedPulling="2023-10-02 19:26:33.764117603 +0000 UTC m=+12.988375267" lastFinishedPulling="2023-10-02 19:26:36.215033341 +0000 UTC m=+15.439291005" observedRunningTime="2023-10-02 19:26:37.679714265 +0000 UTC m=+16.903971953" watchObservedRunningTime="2023-10-02 19:26:41.316281218 +0000 UTC m=+20.540538870" Oct 2 19:26:44.359646 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1756308593.mount: Deactivated successfully. Oct 2 19:26:48.580868 env[1732]: time="2023-10-02T19:26:48.580709657Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/cilium/cilium@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:48.584505 env[1732]: time="2023-10-02T19:26:48.584432967Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b69cb5ebb22d9b4f9c460a6587a0c4285d57a2bff59e4e439ad065a3f684948f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:48.588215 env[1732]: time="2023-10-02T19:26:48.588153613Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/cilium/cilium@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:48.589379 env[1732]: time="2023-10-02T19:26:48.589322464Z" level=info msg="PullImage \"quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5\" returns image reference \"sha256:b69cb5ebb22d9b4f9c460a6587a0c4285d57a2bff59e4e439ad065a3f684948f\"" Oct 2 19:26:48.594309 env[1732]: time="2023-10-02T19:26:48.594250673Z" level=info msg="CreateContainer within sandbox \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:0,}" Oct 2 19:26:48.620624 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2356398226.mount: Deactivated successfully. Oct 2 19:26:48.638321 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4216176204.mount: Deactivated successfully. Oct 2 19:26:48.646377 env[1732]: time="2023-10-02T19:26:48.646198018Z" level=info msg="CreateContainer within sandbox \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\" for &ContainerMetadata{Name:mount-cgroup,Attempt:0,} returns container id \"e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285\"" Oct 2 19:26:48.649295 env[1732]: time="2023-10-02T19:26:48.649176198Z" level=info msg="StartContainer for \"e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285\"" Oct 2 19:26:48.705152 systemd[1]: Started cri-containerd-e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285.scope. Oct 2 19:26:48.740775 systemd[1]: cri-containerd-e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285.scope: Deactivated successfully. Oct 2 19:26:49.442861 env[1732]: time="2023-10-02T19:26:49.442779382Z" level=info msg="shim disconnected" id=e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285 Oct 2 19:26:49.442861 env[1732]: time="2023-10-02T19:26:49.442854946Z" level=warning msg="cleaning up after shim disconnected" id=e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285 namespace=k8s.io Oct 2 19:26:49.443232 env[1732]: time="2023-10-02T19:26:49.442877938Z" level=info msg="cleaning up dead shim" Oct 2 19:26:49.471985 env[1732]: time="2023-10-02T19:26:49.471904666Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:26:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3442 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:26:49Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:26:49.472727 env[1732]: time="2023-10-02T19:26:49.472394399Z" level=error msg="copy shim log" error="read /proc/self/fd/49: file already closed" Oct 2 19:26:49.473045 env[1732]: time="2023-10-02T19:26:49.472966225Z" level=error msg="Failed to pipe stdout of container \"e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285\"" error="reading from a closed fifo" Oct 2 19:26:49.473244 env[1732]: time="2023-10-02T19:26:49.473183869Z" level=error msg="Failed to pipe stderr of container \"e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285\"" error="reading from a closed fifo" Oct 2 19:26:49.479490 env[1732]: time="2023-10-02T19:26:49.479385581Z" level=error msg="StartContainer for \"e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:26:49.480779 kubelet[3033]: E1002 19:26:49.480024 3033 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285" Oct 2 19:26:49.480779 kubelet[3033]: E1002 19:26:49.480378 3033 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:26:49.480779 kubelet[3033]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:26:49.480779 kubelet[3033]: rm /hostbin/cilium-mount Oct 2 19:26:49.481546 kubelet[3033]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-9xvjc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:26:49.481743 kubelet[3033]: E1002 19:26:49.480446 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:26:49.531290 env[1732]: time="2023-10-02T19:26:49.531213601Z" level=info msg="CreateContainer within sandbox \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:1,}" Oct 2 19:26:49.556330 env[1732]: time="2023-10-02T19:26:49.556257315Z" level=info msg="CreateContainer within sandbox \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\" for &ContainerMetadata{Name:mount-cgroup,Attempt:1,} returns container id \"dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95\"" Oct 2 19:26:49.560962 env[1732]: time="2023-10-02T19:26:49.558026155Z" level=info msg="StartContainer for \"dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95\"" Oct 2 19:26:49.613791 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285-rootfs.mount: Deactivated successfully. Oct 2 19:26:49.630155 systemd[1]: run-containerd-runc-k8s.io-dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95-runc.PPT20c.mount: Deactivated successfully. Oct 2 19:26:49.635649 systemd[1]: Started cri-containerd-dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95.scope. Oct 2 19:26:49.672266 systemd[1]: cri-containerd-dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95.scope: Deactivated successfully. Oct 2 19:26:49.681498 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95-rootfs.mount: Deactivated successfully. Oct 2 19:26:49.698365 env[1732]: time="2023-10-02T19:26:49.697136692Z" level=info msg="shim disconnected" id=dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95 Oct 2 19:26:49.698365 env[1732]: time="2023-10-02T19:26:49.697219228Z" level=warning msg="cleaning up after shim disconnected" id=dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95 namespace=k8s.io Oct 2 19:26:49.698365 env[1732]: time="2023-10-02T19:26:49.697244320Z" level=info msg="cleaning up dead shim" Oct 2 19:26:49.726551 env[1732]: time="2023-10-02T19:26:49.726459677Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:26:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3480 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:26:49Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:26:49.727091 env[1732]: time="2023-10-02T19:26:49.726981390Z" level=error msg="copy shim log" error="read /proc/self/fd/49: file already closed" Oct 2 19:26:49.727534 env[1732]: time="2023-10-02T19:26:49.727452307Z" level=error msg="Failed to pipe stdout of container \"dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95\"" error="reading from a closed fifo" Oct 2 19:26:49.727649 env[1732]: time="2023-10-02T19:26:49.727566883Z" level=error msg="Failed to pipe stderr of container \"dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95\"" error="reading from a closed fifo" Oct 2 19:26:49.729959 env[1732]: time="2023-10-02T19:26:49.729860941Z" level=error msg="StartContainer for \"dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:26:49.731155 kubelet[3033]: E1002 19:26:49.730229 3033 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95" Oct 2 19:26:49.731155 kubelet[3033]: E1002 19:26:49.730377 3033 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:26:49.731155 kubelet[3033]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:26:49.731155 kubelet[3033]: rm /hostbin/cilium-mount Oct 2 19:26:49.731732 kubelet[3033]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-9xvjc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:26:49.732019 kubelet[3033]: E1002 19:26:49.730439 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:26:50.528990 kubelet[3033]: I1002 19:26:50.528954 3033 scope.go:117] "RemoveContainer" containerID="e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285" Oct 2 19:26:50.529901 kubelet[3033]: I1002 19:26:50.529849 3033 scope.go:117] "RemoveContainer" containerID="e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285" Oct 2 19:26:50.534174 env[1732]: time="2023-10-02T19:26:50.534089999Z" level=info msg="RemoveContainer for \"e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285\"" Oct 2 19:26:50.538155 env[1732]: time="2023-10-02T19:26:50.537857036Z" level=info msg="RemoveContainer for \"e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285\"" Oct 2 19:26:50.538155 env[1732]: time="2023-10-02T19:26:50.538009748Z" level=error msg="RemoveContainer for \"e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285\" failed" error="failed to set removing state for container \"e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285\": container is already in removing state" Oct 2 19:26:50.542612 env[1732]: time="2023-10-02T19:26:50.542536483Z" level=info msg="RemoveContainer for \"e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285\" returns successfully" Oct 2 19:26:50.543417 kubelet[3033]: E1002 19:26:50.543355 3033 remote_runtime.go:385] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285\": container is already in removing state" containerID="e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285" Oct 2 19:26:50.545056 kubelet[3033]: E1002 19:26:50.544997 3033 kuberuntime_container.go:820] failed to remove pod init container "mount-cgroup": rpc error: code = Unknown desc = failed to set removing state for container "e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285": container is already in removing state; Skipping pod "cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a)" Oct 2 19:26:50.549104 kubelet[3033]: E1002 19:26:50.549042 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 10s restarting failed container=mount-cgroup pod=cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a)\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:26:51.536411 kubelet[3033]: E1002 19:26:51.536366 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 10s restarting failed container=mount-cgroup pod=cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a)\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:26:52.549664 kubelet[3033]: W1002 19:26:52.549600 3033 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod74fc5ce2_141a_4229_be64_48dc72ee9d6a.slice/cri-containerd-e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285.scope WatchSource:0}: container "e62d614491521c89056d45a16d8ccf1f0de5af3b3f4285929b427521f1cde285" in namespace "k8s.io": not found Oct 2 19:26:55.660386 kubelet[3033]: W1002 19:26:55.660332 3033 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod74fc5ce2_141a_4229_be64_48dc72ee9d6a.slice/cri-containerd-dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95.scope WatchSource:0}: task dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95 not found: not found Oct 2 19:27:05.302230 env[1732]: time="2023-10-02T19:27:05.301985241Z" level=info msg="CreateContainer within sandbox \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:2,}" Oct 2 19:27:05.321009 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3838980872.mount: Deactivated successfully. Oct 2 19:27:05.337300 env[1732]: time="2023-10-02T19:27:05.337229956Z" level=info msg="CreateContainer within sandbox \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\" for &ContainerMetadata{Name:mount-cgroup,Attempt:2,} returns container id \"ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519\"" Oct 2 19:27:05.338783 env[1732]: time="2023-10-02T19:27:05.338666033Z" level=info msg="StartContainer for \"ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519\"" Oct 2 19:27:05.390974 systemd[1]: Started cri-containerd-ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519.scope. Oct 2 19:27:05.431535 systemd[1]: cri-containerd-ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519.scope: Deactivated successfully. Oct 2 19:27:05.452742 env[1732]: time="2023-10-02T19:27:05.452606398Z" level=info msg="shim disconnected" id=ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519 Oct 2 19:27:05.453077 env[1732]: time="2023-10-02T19:27:05.452743294Z" level=warning msg="cleaning up after shim disconnected" id=ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519 namespace=k8s.io Oct 2 19:27:05.453077 env[1732]: time="2023-10-02T19:27:05.452769238Z" level=info msg="cleaning up dead shim" Oct 2 19:27:05.483512 env[1732]: time="2023-10-02T19:27:05.483437773Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:27:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3521 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:27:05Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:27:05.484021 env[1732]: time="2023-10-02T19:27:05.483931514Z" level=error msg="copy shim log" error="read /proc/self/fd/48: file already closed" Oct 2 19:27:05.486747 env[1732]: time="2023-10-02T19:27:05.486598864Z" level=error msg="Failed to pipe stdout of container \"ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519\"" error="reading from a closed fifo" Oct 2 19:27:05.487033 env[1732]: time="2023-10-02T19:27:05.486937613Z" level=error msg="Failed to pipe stderr of container \"ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519\"" error="reading from a closed fifo" Oct 2 19:27:05.489103 env[1732]: time="2023-10-02T19:27:05.489012786Z" level=error msg="StartContainer for \"ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:27:05.489511 kubelet[3033]: E1002 19:27:05.489470 3033 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519" Oct 2 19:27:05.492765 kubelet[3033]: E1002 19:27:05.489632 3033 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:27:05.492765 kubelet[3033]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:27:05.492765 kubelet[3033]: rm /hostbin/cilium-mount Oct 2 19:27:05.494437 kubelet[3033]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-9xvjc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:27:05.494437 kubelet[3033]: E1002 19:27:05.489721 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:27:05.573647 kubelet[3033]: I1002 19:27:05.572495 3033 scope.go:117] "RemoveContainer" containerID="dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95" Oct 2 19:27:05.576020 kubelet[3033]: I1002 19:27:05.575983 3033 scope.go:117] "RemoveContainer" containerID="dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95" Oct 2 19:27:05.577874 env[1732]: time="2023-10-02T19:27:05.577258693Z" level=info msg="RemoveContainer for \"dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95\"" Oct 2 19:27:05.581464 env[1732]: time="2023-10-02T19:27:05.581033128Z" level=info msg="RemoveContainer for \"dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95\"" Oct 2 19:27:05.581695 env[1732]: time="2023-10-02T19:27:05.581611864Z" level=error msg="RemoveContainer for \"dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95\" failed" error="failed to set removing state for container \"dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95\": container is already in removing state" Oct 2 19:27:05.588721 kubelet[3033]: E1002 19:27:05.582030 3033 remote_runtime.go:385] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95\": container is already in removing state" containerID="dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95" Oct 2 19:27:05.588721 kubelet[3033]: E1002 19:27:05.582128 3033 kuberuntime_container.go:820] failed to remove pod init container "mount-cgroup": rpc error: code = Unknown desc = failed to set removing state for container "dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95": container is already in removing state; Skipping pod "cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a)" Oct 2 19:27:05.588721 kubelet[3033]: E1002 19:27:05.582794 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 20s restarting failed container=mount-cgroup pod=cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a)\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:27:05.592278 env[1732]: time="2023-10-02T19:27:05.592174778Z" level=info msg="RemoveContainer for \"dde7d0a5983acf544c5b3ea0c6ece75cd84ff8edf9172881d3bc490181331d95\" returns successfully" Oct 2 19:27:06.316098 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519-rootfs.mount: Deactivated successfully. Oct 2 19:27:08.558695 kubelet[3033]: W1002 19:27:08.558613 3033 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod74fc5ce2_141a_4229_be64_48dc72ee9d6a.slice/cri-containerd-ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519.scope WatchSource:0}: task ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519 not found: not found Oct 2 19:27:15.792000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:15.796768 kernel: kauditd_printk_skb: 50 callbacks suppressed Oct 2 19:27:15.796941 kernel: audit: type=1400 audit(1696274835.792:1126): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:15.792000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40004d8c30 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:27:15.819323 kernel: audit: type=1300 audit(1696274835.792:1126): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40004d8c30 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:27:15.819726 kernel: audit: type=1327 audit(1696274835.792:1126): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:27:15.792000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:27:15.810000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:15.839833 kernel: audit: type=1400 audit(1696274835.810:1127): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:15.840002 kernel: audit: type=1300 audit(1696274835.810:1127): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001c61ee0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:27:15.810000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001c61ee0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:27:15.810000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:27:15.863381 kernel: audit: type=1327 audit(1696274835.810:1127): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:27:15.912584 systemd[1]: Started sshd@7-172.31.27.184:22-139.178.89.65:39156.service. Oct 2 19:27:15.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.27.184:22-139.178.89.65:39156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:27:15.924886 kernel: audit: type=1130 audit(1696274835.912:1128): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.27.184:22-139.178.89.65:39156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:27:16.106000 audit[3535]: USER_ACCT pid=3535 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:16.109182 sshd[3535]: Accepted publickey for core from 139.178.89.65 port 39156 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:27:16.113408 sshd[3535]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:27:16.110000 audit[3535]: CRED_ACQ pid=3535 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:16.129542 kernel: audit: type=1101 audit(1696274836.106:1129): pid=3535 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:16.129804 kernel: audit: type=1103 audit(1696274836.110:1130): pid=3535 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:16.129873 kernel: audit: type=1006 audit(1696274836.111:1131): pid=3535 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Oct 2 19:27:16.128646 systemd[1]: Started session-8.scope. Oct 2 19:27:16.133354 systemd-logind[1722]: New session 8 of user core. Oct 2 19:27:16.111000 audit[3535]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffdf95c40 a2=3 a3=1 items=0 ppid=1 pid=3535 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:16.111000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:27:16.146000 audit[3535]: USER_START pid=3535 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:16.153000 audit[3537]: CRED_ACQ pid=3537 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:16.475086 sshd[3535]: pam_unix(sshd:session): session closed for user core Oct 2 19:27:16.477000 audit[3535]: USER_END pid=3535 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:16.478000 audit[3535]: CRED_DISP pid=3535 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:16.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.27.184:22-139.178.89.65:39156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:27:16.483448 systemd-logind[1722]: Session 8 logged out. Waiting for processes to exit. Oct 2 19:27:16.483932 systemd[1]: sshd@7-172.31.27.184:22-139.178.89.65:39156.service: Deactivated successfully. Oct 2 19:27:16.485416 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 19:27:16.487530 systemd-logind[1722]: Removed session 8. Oct 2 19:27:16.860000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:16.860000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:16.860000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=400612a1b0 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:27:16.860000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:27:16.860000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=4007577c40 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:27:16.860000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:27:16.863000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:16.863000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=400612a270 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:27:16.863000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:27:16.874000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:16.874000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=4005bff380 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:27:16.874000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:27:17.040000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:17.040000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=4005bff4d0 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:27:17.040000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:27:17.040000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:17.040000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=40079865a0 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:27:17.040000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:27:21.298864 kubelet[3033]: E1002 19:27:21.298813 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 20s restarting failed container=mount-cgroup pod=cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a)\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:27:26.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.27.184:22-139.178.89.65:53706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:27:26.506075 systemd[1]: Started sshd@8-172.31.27.184:22-139.178.89.65:53706.service. Oct 2 19:27:26.509704 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 2 19:27:26.509825 kernel: audit: type=1130 audit(1696274846.504:1143): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.27.184:22-139.178.89.65:53706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:27:26.692000 audit[3553]: USER_ACCT pid=3553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:26.694598 sshd[3553]: Accepted publickey for core from 139.178.89.65 port 53706 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:27:26.705719 kernel: audit: type=1101 audit(1696274846.692:1144): pid=3553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:26.705000 audit[3553]: CRED_ACQ pid=3553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:26.708186 sshd[3553]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:27:26.723357 kernel: audit: type=1103 audit(1696274846.705:1145): pid=3553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:26.723537 kernel: audit: type=1006 audit(1696274846.705:1146): pid=3553 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Oct 2 19:27:26.705000 audit[3553]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc3606680 a2=3 a3=1 items=0 ppid=1 pid=3553 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:26.734174 kernel: audit: type=1300 audit(1696274846.705:1146): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc3606680 a2=3 a3=1 items=0 ppid=1 pid=3553 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:26.705000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:27:26.738366 kernel: audit: type=1327 audit(1696274846.705:1146): proctitle=737368643A20636F7265205B707269765D Oct 2 19:27:26.743970 systemd-logind[1722]: New session 9 of user core. Oct 2 19:27:26.745046 systemd[1]: Started session-9.scope. Oct 2 19:27:26.753000 audit[3553]: USER_START pid=3553 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:26.767801 kernel: audit: type=1105 audit(1696274846.753:1147): pid=3553 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:26.767919 kernel: audit: type=1103 audit(1696274846.760:1148): pid=3555 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:26.760000 audit[3555]: CRED_ACQ pid=3555 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:27.033025 sshd[3553]: pam_unix(sshd:session): session closed for user core Oct 2 19:27:27.033000 audit[3553]: USER_END pid=3553 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:27.041459 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 19:27:27.043340 systemd[1]: sshd@8-172.31.27.184:22-139.178.89.65:53706.service: Deactivated successfully. Oct 2 19:27:27.037000 audit[3553]: CRED_DISP pid=3553 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:27.057073 kernel: audit: type=1106 audit(1696274847.033:1149): pid=3553 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:27.057218 kernel: audit: type=1104 audit(1696274847.037:1150): pid=3553 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:27.057137 systemd-logind[1722]: Session 9 logged out. Waiting for processes to exit. Oct 2 19:27:27.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.27.184:22-139.178.89.65:53706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:27:27.060102 systemd-logind[1722]: Removed session 9. Oct 2 19:27:31.339000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:31.339000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000249c20 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:27:31.339000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:27:31.342000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:31.342000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000249c60 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:27:31.342000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:27:31.346000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:31.346000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40009d6920 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:27:31.346000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:27:31.349000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:31.349000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000588140 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:27:31.349000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:27:34.300474 env[1732]: time="2023-10-02T19:27:34.299912711Z" level=info msg="CreateContainer within sandbox \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:3,}" Oct 2 19:27:34.323633 env[1732]: time="2023-10-02T19:27:34.323132674Z" level=info msg="CreateContainer within sandbox \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\" for &ContainerMetadata{Name:mount-cgroup,Attempt:3,} returns container id \"f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba\"" Oct 2 19:27:34.324830 env[1732]: time="2023-10-02T19:27:34.324780329Z" level=info msg="StartContainer for \"f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba\"" Oct 2 19:27:34.395166 systemd[1]: run-containerd-runc-k8s.io-f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba-runc.aFUZGK.mount: Deactivated successfully. Oct 2 19:27:34.413125 systemd[1]: Started cri-containerd-f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba.scope. Oct 2 19:27:34.454876 systemd[1]: cri-containerd-f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba.scope: Deactivated successfully. Oct 2 19:27:34.483745 env[1732]: time="2023-10-02T19:27:34.483630836Z" level=info msg="shim disconnected" id=f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba Oct 2 19:27:34.484139 env[1732]: time="2023-10-02T19:27:34.484099905Z" level=warning msg="cleaning up after shim disconnected" id=f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba namespace=k8s.io Oct 2 19:27:34.484265 env[1732]: time="2023-10-02T19:27:34.484236898Z" level=info msg="cleaning up dead shim" Oct 2 19:27:34.512001 env[1732]: time="2023-10-02T19:27:34.511925271Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:27:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3592 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:27:34Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:27:34.512458 env[1732]: time="2023-10-02T19:27:34.512372705Z" level=error msg="copy shim log" error="read /proc/self/fd/48: file already closed" Oct 2 19:27:34.512836 env[1732]: time="2023-10-02T19:27:34.512777479Z" level=error msg="Failed to pipe stdout of container \"f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba\"" error="reading from a closed fifo" Oct 2 19:27:34.517400 env[1732]: time="2023-10-02T19:27:34.517330130Z" level=error msg="Failed to pipe stderr of container \"f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba\"" error="reading from a closed fifo" Oct 2 19:27:34.520238 env[1732]: time="2023-10-02T19:27:34.520139545Z" level=error msg="StartContainer for \"f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:27:34.520984 kubelet[3033]: E1002 19:27:34.520938 3033 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba" Oct 2 19:27:34.525244 kubelet[3033]: E1002 19:27:34.521558 3033 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:27:34.525244 kubelet[3033]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:27:34.525244 kubelet[3033]: rm /hostbin/cilium-mount Oct 2 19:27:34.525244 kubelet[3033]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-9xvjc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:27:34.525244 kubelet[3033]: E1002 19:27:34.521627 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:27:34.649505 kubelet[3033]: I1002 19:27:34.648534 3033 scope.go:117] "RemoveContainer" containerID="ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519" Oct 2 19:27:34.651900 kubelet[3033]: I1002 19:27:34.651842 3033 scope.go:117] "RemoveContainer" containerID="ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519" Oct 2 19:27:34.654626 env[1732]: time="2023-10-02T19:27:34.654564023Z" level=info msg="RemoveContainer for \"ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519\"" Oct 2 19:27:34.656261 env[1732]: time="2023-10-02T19:27:34.656195130Z" level=info msg="RemoveContainer for \"ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519\"" Oct 2 19:27:34.656894 env[1732]: time="2023-10-02T19:27:34.656793669Z" level=error msg="RemoveContainer for \"ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519\" failed" error="failed to set removing state for container \"ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519\": container is already in removing state" Oct 2 19:27:34.657799 kubelet[3033]: E1002 19:27:34.657753 3033 remote_runtime.go:385] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519\": container is already in removing state" containerID="ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519" Oct 2 19:27:34.658119 kubelet[3033]: E1002 19:27:34.658079 3033 kuberuntime_container.go:820] failed to remove pod init container "mount-cgroup": rpc error: code = Unknown desc = failed to set removing state for container "ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519": container is already in removing state; Skipping pod "cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a)" Oct 2 19:27:34.658895 kubelet[3033]: E1002 19:27:34.658865 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 40s restarting failed container=mount-cgroup pod=cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a)\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:27:34.663791 env[1732]: time="2023-10-02T19:27:34.663710473Z" level=info msg="RemoveContainer for \"ec426f97c0627d8793dcc51e8fc2ab50813669c9f85e241406ac60122e111519\" returns successfully" Oct 2 19:27:35.313547 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba-rootfs.mount: Deactivated successfully. Oct 2 19:27:37.065447 systemd[1]: Started sshd@9-172.31.27.184:22-139.178.89.65:37636.service. Oct 2 19:27:37.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.27.184:22-139.178.89.65:37636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:27:37.068759 kernel: kauditd_printk_skb: 13 callbacks suppressed Oct 2 19:27:37.068893 kernel: audit: type=1130 audit(1696274857.064:1156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.27.184:22-139.178.89.65:37636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:27:37.254000 audit[3606]: USER_ACCT pid=3606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:37.256900 sshd[3606]: Accepted publickey for core from 139.178.89.65 port 37636 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:27:37.268835 kernel: audit: type=1101 audit(1696274857.254:1157): pid=3606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:37.271614 sshd[3606]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:27:37.269000 audit[3606]: CRED_ACQ pid=3606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:37.288032 kernel: audit: type=1103 audit(1696274857.269:1158): pid=3606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:37.288191 kernel: audit: type=1006 audit(1696274857.269:1159): pid=3606 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 2 19:27:37.269000 audit[3606]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc5d1f9d0 a2=3 a3=1 items=0 ppid=1 pid=3606 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:37.299657 kernel: audit: type=1300 audit(1696274857.269:1159): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc5d1f9d0 a2=3 a3=1 items=0 ppid=1 pid=3606 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:37.269000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:27:37.309727 kernel: audit: type=1327 audit(1696274857.269:1159): proctitle=737368643A20636F7265205B707269765D Oct 2 19:27:37.306450 systemd[1]: Started session-10.scope. Oct 2 19:27:37.307416 systemd-logind[1722]: New session 10 of user core. Oct 2 19:27:37.320000 audit[3606]: USER_START pid=3606 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:37.334000 audit[3608]: CRED_ACQ pid=3608 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:37.345382 kernel: audit: type=1105 audit(1696274857.320:1160): pid=3606 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:37.345527 kernel: audit: type=1103 audit(1696274857.334:1161): pid=3608 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:37.590497 kubelet[3033]: W1002 19:27:37.590311 3033 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod74fc5ce2_141a_4229_be64_48dc72ee9d6a.slice/cri-containerd-f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba.scope WatchSource:0}: task f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba not found: not found Oct 2 19:27:37.614852 sshd[3606]: pam_unix(sshd:session): session closed for user core Oct 2 19:27:37.615000 audit[3606]: USER_END pid=3606 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:37.615000 audit[3606]: CRED_DISP pid=3606 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:37.629350 systemd[1]: sshd@9-172.31.27.184:22-139.178.89.65:37636.service: Deactivated successfully. Oct 2 19:27:37.630708 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 19:27:37.634320 systemd-logind[1722]: Session 10 logged out. Waiting for processes to exit. Oct 2 19:27:37.638042 kernel: audit: type=1106 audit(1696274857.615:1162): pid=3606 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:37.638176 kernel: audit: type=1104 audit(1696274857.615:1163): pid=3606 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:37.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.27.184:22-139.178.89.65:37636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:27:37.637279 systemd-logind[1722]: Removed session 10. Oct 2 19:27:47.646093 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:27:47.646332 kernel: audit: type=1130 audit(1696274867.643:1165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.27.184:22-139.178.89.65:45982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:27:47.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.27.184:22-139.178.89.65:45982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:27:47.645336 systemd[1]: Started sshd@10-172.31.27.184:22-139.178.89.65:45982.service. Oct 2 19:27:47.834000 audit[3619]: USER_ACCT pid=3619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:47.836330 sshd[3619]: Accepted publickey for core from 139.178.89.65 port 45982 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:27:47.847723 kernel: audit: type=1101 audit(1696274867.834:1166): pid=3619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:47.847000 audit[3619]: CRED_ACQ pid=3619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:47.853981 sshd[3619]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:27:47.865972 kernel: audit: type=1103 audit(1696274867.847:1167): pid=3619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:47.866103 kernel: audit: type=1006 audit(1696274867.847:1168): pid=3619 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Oct 2 19:27:47.847000 audit[3619]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4cdad70 a2=3 a3=1 items=0 ppid=1 pid=3619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:47.876607 kernel: audit: type=1300 audit(1696274867.847:1168): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4cdad70 a2=3 a3=1 items=0 ppid=1 pid=3619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:47.880888 kernel: audit: type=1327 audit(1696274867.847:1168): proctitle=737368643A20636F7265205B707269765D Oct 2 19:27:47.847000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:27:47.887506 systemd-logind[1722]: New session 11 of user core. Oct 2 19:27:47.887644 systemd[1]: Started session-11.scope. Oct 2 19:27:47.897000 audit[3619]: USER_START pid=3619 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:47.911754 kernel: audit: type=1105 audit(1696274867.897:1169): pid=3619 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:47.911000 audit[3621]: CRED_ACQ pid=3621 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:47.922787 kernel: audit: type=1103 audit(1696274867.911:1170): pid=3621 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:48.199314 sshd[3619]: pam_unix(sshd:session): session closed for user core Oct 2 19:27:48.199000 audit[3619]: USER_END pid=3619 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:48.206314 systemd-logind[1722]: Session 11 logged out. Waiting for processes to exit. Oct 2 19:27:48.208923 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 19:27:48.211124 systemd-logind[1722]: Removed session 11. Oct 2 19:27:48.212904 systemd[1]: sshd@10-172.31.27.184:22-139.178.89.65:45982.service: Deactivated successfully. Oct 2 19:27:48.199000 audit[3619]: CRED_DISP pid=3619 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:48.213857 kernel: audit: type=1106 audit(1696274868.199:1171): pid=3619 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:48.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.27.184:22-139.178.89.65:45982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:27:48.223720 kernel: audit: type=1104 audit(1696274868.199:1172): pid=3619 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:48.295399 kubelet[3033]: E1002 19:27:48.295361 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 40s restarting failed container=mount-cgroup pod=cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a)\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:27:58.230206 systemd[1]: Started sshd@11-172.31.27.184:22-139.178.89.65:53680.service. Oct 2 19:27:58.242593 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:27:58.242720 kernel: audit: type=1130 audit(1696274878.229:1174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.27.184:22-139.178.89.65:53680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:27:58.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.27.184:22-139.178.89.65:53680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:27:58.413000 audit[3631]: USER_ACCT pid=3631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:58.415307 sshd[3631]: Accepted publickey for core from 139.178.89.65 port 53680 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:27:58.426732 kernel: audit: type=1101 audit(1696274878.413:1175): pid=3631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:58.426000 audit[3631]: CRED_ACQ pid=3631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:58.429863 sshd[3631]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:27:58.444500 kernel: audit: type=1103 audit(1696274878.426:1176): pid=3631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:58.444667 kernel: audit: type=1006 audit(1696274878.426:1177): pid=3631 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Oct 2 19:27:58.426000 audit[3631]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc7a9c770 a2=3 a3=1 items=0 ppid=1 pid=3631 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:58.455274 kernel: audit: type=1300 audit(1696274878.426:1177): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc7a9c770 a2=3 a3=1 items=0 ppid=1 pid=3631 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:58.426000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:27:58.459356 kernel: audit: type=1327 audit(1696274878.426:1177): proctitle=737368643A20636F7265205B707269765D Oct 2 19:27:58.464784 systemd-logind[1722]: New session 12 of user core. Oct 2 19:27:58.466966 systemd[1]: Started session-12.scope. Oct 2 19:27:58.475000 audit[3631]: USER_START pid=3631 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:58.487000 audit[3633]: CRED_ACQ pid=3633 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:58.498798 kernel: audit: type=1105 audit(1696274878.475:1178): pid=3631 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:58.498930 kernel: audit: type=1103 audit(1696274878.487:1179): pid=3633 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:58.763002 sshd[3631]: pam_unix(sshd:session): session closed for user core Oct 2 19:27:58.763000 audit[3631]: USER_END pid=3631 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:58.779069 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 19:27:58.780271 systemd[1]: sshd@11-172.31.27.184:22-139.178.89.65:53680.service: Deactivated successfully. Oct 2 19:27:58.763000 audit[3631]: CRED_DISP pid=3631 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:58.783357 systemd-logind[1722]: Session 12 logged out. Waiting for processes to exit. Oct 2 19:27:58.792536 kernel: audit: type=1106 audit(1696274878.763:1180): pid=3631 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:58.792752 kernel: audit: type=1104 audit(1696274878.763:1181): pid=3631 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:27:58.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.27.184:22-139.178.89.65:53680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:27:58.794291 systemd-logind[1722]: Removed session 12. Oct 2 19:28:03.296330 kubelet[3033]: E1002 19:28:03.296278 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 40s restarting failed container=mount-cgroup pod=cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a)\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:28:08.805524 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:28:08.808154 kernel: audit: type=1130 audit(1696274888.792:1183): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.27.184:22-139.178.89.65:57624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:08.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.27.184:22-139.178.89.65:57624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:08.793517 systemd[1]: Started sshd@12-172.31.27.184:22-139.178.89.65:57624.service. Oct 2 19:28:08.995000 audit[3646]: USER_ACCT pid=3646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:09.008551 sshd[3646]: Accepted publickey for core from 139.178.89.65 port 57624 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:28:09.006000 audit[3646]: CRED_ACQ pid=3646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:09.009423 sshd[3646]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:28:09.019135 kernel: audit: type=1101 audit(1696274888.995:1184): pid=3646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:09.020186 kernel: audit: type=1103 audit(1696274889.006:1185): pid=3646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:09.020399 kernel: audit: type=1006 audit(1696274889.007:1186): pid=3646 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Oct 2 19:28:09.007000 audit[3646]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffebb3f610 a2=3 a3=1 items=0 ppid=1 pid=3646 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:28:09.035887 kernel: audit: type=1300 audit(1696274889.007:1186): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffebb3f610 a2=3 a3=1 items=0 ppid=1 pid=3646 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:28:09.007000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:28:09.039748 kernel: audit: type=1327 audit(1696274889.007:1186): proctitle=737368643A20636F7265205B707269765D Oct 2 19:28:09.045548 systemd-logind[1722]: New session 13 of user core. Oct 2 19:28:09.046505 systemd[1]: Started session-13.scope. Oct 2 19:28:09.057000 audit[3646]: USER_START pid=3646 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:09.071865 kernel: audit: type=1105 audit(1696274889.057:1187): pid=3646 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:09.070000 audit[3648]: CRED_ACQ pid=3648 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:09.082717 kernel: audit: type=1103 audit(1696274889.070:1188): pid=3648 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:09.364109 sshd[3646]: pam_unix(sshd:session): session closed for user core Oct 2 19:28:09.365000 audit[3646]: USER_END pid=3646 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:09.366000 audit[3646]: CRED_DISP pid=3646 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:09.389839 kernel: audit: type=1106 audit(1696274889.365:1189): pid=3646 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:09.389967 kernel: audit: type=1104 audit(1696274889.366:1190): pid=3646 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:09.380253 systemd[1]: sshd@12-172.31.27.184:22-139.178.89.65:57624.service: Deactivated successfully. Oct 2 19:28:09.381507 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 19:28:09.389395 systemd-logind[1722]: Session 13 logged out. Waiting for processes to exit. Oct 2 19:28:09.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.27.184:22-139.178.89.65:57624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:09.391620 systemd-logind[1722]: Removed session 13. Oct 2 19:28:14.296156 kubelet[3033]: E1002 19:28:14.296096 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 40s restarting failed container=mount-cgroup pod=cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a)\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:28:15.795000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:28:15.798236 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:28:15.798328 kernel: audit: type=1400 audit(1696274895.795:1192): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:28:15.795000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001673470 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:28:15.820586 kernel: audit: type=1300 audit(1696274895.795:1192): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001673470 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:28:15.820759 kernel: audit: type=1327 audit(1696274895.795:1192): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:28:15.795000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:28:15.811000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:28:15.840480 kernel: audit: type=1400 audit(1696274895.811:1193): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:28:15.840647 kernel: audit: type=1300 audit(1696274895.811:1193): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e66aa0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:28:15.811000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e66aa0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:28:15.811000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:28:15.863180 kernel: audit: type=1327 audit(1696274895.811:1193): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:28:16.861000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:28:16.861000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:28:16.882005 kernel: audit: type=1400 audit(1696274896.861:1195): avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:28:16.882150 kernel: audit: type=1400 audit(1696274896.861:1194): avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:28:16.882197 kernel: audit: type=1300 audit(1696274896.861:1194): arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=400ba4a900 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:28:16.861000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=400ba4a900 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:28:16.861000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:28:16.904722 kernel: audit: type=1327 audit(1696274896.861:1194): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:28:16.861000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=52 a1=400b7f40c0 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:28:16.861000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:28:16.863000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:28:16.863000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=400b9001e0 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:28:16.863000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:28:16.874000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:28:16.874000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=400b7f4210 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:28:16.874000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:28:17.040000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:28:17.040000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=400ba4ab00 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:28:17.040000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:28:17.040000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:28:17.040000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=400b900630 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:28:17.040000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:28:19.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.27.184:22-139.178.89.65:44362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:19.392261 systemd[1]: Started sshd@13-172.31.27.184:22-139.178.89.65:44362.service. Oct 2 19:28:19.575000 audit[3659]: USER_ACCT pid=3659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:19.578513 sshd[3659]: Accepted publickey for core from 139.178.89.65 port 44362 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:28:19.578000 audit[3659]: CRED_ACQ pid=3659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:19.578000 audit[3659]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe2153130 a2=3 a3=1 items=0 ppid=1 pid=3659 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:28:19.578000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:28:19.581128 sshd[3659]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:28:19.589838 systemd-logind[1722]: New session 14 of user core. Oct 2 19:28:19.589884 systemd[1]: Started session-14.scope. Oct 2 19:28:19.598000 audit[3659]: USER_START pid=3659 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:19.605000 audit[3661]: CRED_ACQ pid=3661 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:19.892228 sshd[3659]: pam_unix(sshd:session): session closed for user core Oct 2 19:28:19.893000 audit[3659]: USER_END pid=3659 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:19.893000 audit[3659]: CRED_DISP pid=3659 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:19.898520 systemd-logind[1722]: Session 14 logged out. Waiting for processes to exit. Oct 2 19:28:19.899756 systemd[1]: sshd@13-172.31.27.184:22-139.178.89.65:44362.service: Deactivated successfully. Oct 2 19:28:19.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.27.184:22-139.178.89.65:44362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:19.901161 systemd[1]: session-14.scope: Deactivated successfully. Oct 2 19:28:19.902768 systemd-logind[1722]: Removed session 14. Oct 2 19:28:21.185431 kubelet[3033]: E1002 19:28:21.185363 3033 kubelet_node_status.go:452] "Node not becoming ready in time after startup" Oct 2 19:28:21.579770 kubelet[3033]: E1002 19:28:21.579714 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:28:25.301920 env[1732]: time="2023-10-02T19:28:25.300562779Z" level=info msg="CreateContainer within sandbox \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:4,}" Oct 2 19:28:25.321592 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount133072222.mount: Deactivated successfully. Oct 2 19:28:25.332473 env[1732]: time="2023-10-02T19:28:25.332245573Z" level=info msg="CreateContainer within sandbox \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\" for &ContainerMetadata{Name:mount-cgroup,Attempt:4,} returns container id \"d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692\"" Oct 2 19:28:25.333480 env[1732]: time="2023-10-02T19:28:25.333432087Z" level=info msg="StartContainer for \"d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692\"" Oct 2 19:28:25.335035 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2502997602.mount: Deactivated successfully. Oct 2 19:28:25.387236 systemd[1]: Started cri-containerd-d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692.scope. Oct 2 19:28:25.424659 systemd[1]: cri-containerd-d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692.scope: Deactivated successfully. Oct 2 19:28:25.460197 env[1732]: time="2023-10-02T19:28:25.460108918Z" level=info msg="shim disconnected" id=d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692 Oct 2 19:28:25.460197 env[1732]: time="2023-10-02T19:28:25.460185994Z" level=warning msg="cleaning up after shim disconnected" id=d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692 namespace=k8s.io Oct 2 19:28:25.460527 env[1732]: time="2023-10-02T19:28:25.460207858Z" level=info msg="cleaning up dead shim" Oct 2 19:28:25.487440 env[1732]: time="2023-10-02T19:28:25.487314410Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:28:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3698 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:28:25Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:28:25.487961 env[1732]: time="2023-10-02T19:28:25.487863903Z" level=error msg="copy shim log" error="read /proc/self/fd/48: file already closed" Oct 2 19:28:25.488353 env[1732]: time="2023-10-02T19:28:25.488299875Z" level=error msg="Failed to pipe stderr of container \"d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692\"" error="reading from a closed fifo" Oct 2 19:28:25.488516 env[1732]: time="2023-10-02T19:28:25.488397364Z" level=error msg="Failed to pipe stdout of container \"d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692\"" error="reading from a closed fifo" Oct 2 19:28:25.490740 env[1732]: time="2023-10-02T19:28:25.490594975Z" level=error msg="StartContainer for \"d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:28:25.491126 kubelet[3033]: E1002 19:28:25.491073 3033 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692" Oct 2 19:28:25.491655 kubelet[3033]: E1002 19:28:25.491271 3033 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:28:25.491655 kubelet[3033]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:28:25.491655 kubelet[3033]: rm /hostbin/cilium-mount Oct 2 19:28:25.491655 kubelet[3033]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-9xvjc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:28:25.491655 kubelet[3033]: E1002 19:28:25.491362 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:28:25.780641 kubelet[3033]: I1002 19:28:25.780559 3033 scope.go:117] "RemoveContainer" containerID="f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba" Oct 2 19:28:25.783863 kubelet[3033]: I1002 19:28:25.781911 3033 scope.go:117] "RemoveContainer" containerID="f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba" Oct 2 19:28:25.793493 env[1732]: time="2023-10-02T19:28:25.793410309Z" level=info msg="RemoveContainer for \"f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba\"" Oct 2 19:28:25.794351 env[1732]: time="2023-10-02T19:28:25.794300218Z" level=info msg="RemoveContainer for \"f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba\"" Oct 2 19:28:25.794695 env[1732]: time="2023-10-02T19:28:25.794619923Z" level=error msg="RemoveContainer for \"f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba\" failed" error="failed to set removing state for container \"f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba\": container is already in removing state" Oct 2 19:28:25.796061 kubelet[3033]: E1002 19:28:25.795915 3033 remote_runtime.go:385] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba\": container is already in removing state" containerID="f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba" Oct 2 19:28:25.796061 kubelet[3033]: I1002 19:28:25.796017 3033 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba"} err="rpc error: code = Unknown desc = failed to set removing state for container \"f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba\": container is already in removing state" Oct 2 19:28:25.800630 env[1732]: time="2023-10-02T19:28:25.800544524Z" level=info msg="RemoveContainer for \"f1d66f23a13e5a955215d9dd0f0fa3902e40381dac72479e4169da3c247560ba\" returns successfully" Oct 2 19:28:25.802498 kubelet[3033]: E1002 19:28:25.801857 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 1m20s restarting failed container=mount-cgroup pod=cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a)\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:28:26.314908 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692-rootfs.mount: Deactivated successfully. Oct 2 19:28:26.581308 kubelet[3033]: E1002 19:28:26.581166 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:28:28.566847 kubelet[3033]: W1002 19:28:28.566715 3033 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod74fc5ce2_141a_4229_be64_48dc72ee9d6a.slice/cri-containerd-d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692.scope WatchSource:0}: task d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692 not found: not found Oct 2 19:28:29.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.27.184:22-139.178.89.65:57256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:29.924197 systemd[1]: Started sshd@14-172.31.27.184:22-139.178.89.65:57256.service. Oct 2 19:28:29.926599 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 2 19:28:29.926672 kernel: audit: type=1130 audit(1696274909.922:1209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.27.184:22-139.178.89.65:57256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:30.109000 audit[3712]: USER_ACCT pid=3712 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:30.113624 sshd[3712]: Accepted publickey for core from 139.178.89.65 port 57256 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:28:30.123731 kernel: audit: type=1101 audit(1696274910.109:1210): pid=3712 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:30.122000 audit[3712]: CRED_ACQ pid=3712 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:30.125371 sshd[3712]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:28:30.140756 kernel: audit: type=1103 audit(1696274910.122:1211): pid=3712 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:30.140897 kernel: audit: type=1006 audit(1696274910.122:1212): pid=3712 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Oct 2 19:28:30.122000 audit[3712]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff6416e10 a2=3 a3=1 items=0 ppid=1 pid=3712 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:28:30.151867 kernel: audit: type=1300 audit(1696274910.122:1212): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff6416e10 a2=3 a3=1 items=0 ppid=1 pid=3712 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:28:30.122000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:28:30.156146 kernel: audit: type=1327 audit(1696274910.122:1212): proctitle=737368643A20636F7265205B707269765D Oct 2 19:28:30.160662 systemd-logind[1722]: New session 15 of user core. Oct 2 19:28:30.161518 systemd[1]: Started session-15.scope. Oct 2 19:28:30.170000 audit[3712]: USER_START pid=3712 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:30.176000 audit[3714]: CRED_ACQ pid=3714 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:30.193315 kernel: audit: type=1105 audit(1696274910.170:1213): pid=3712 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:30.193441 kernel: audit: type=1103 audit(1696274910.176:1214): pid=3714 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:30.440383 sshd[3712]: pam_unix(sshd:session): session closed for user core Oct 2 19:28:30.441000 audit[3712]: USER_END pid=3712 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:30.446141 systemd[1]: session-15.scope: Deactivated successfully. Oct 2 19:28:30.447321 systemd[1]: sshd@14-172.31.27.184:22-139.178.89.65:57256.service: Deactivated successfully. Oct 2 19:28:30.441000 audit[3712]: CRED_DISP pid=3712 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:30.464164 kernel: audit: type=1106 audit(1696274910.441:1215): pid=3712 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:30.464277 kernel: audit: type=1104 audit(1696274910.441:1216): pid=3712 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:30.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.27.184:22-139.178.89.65:57256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:30.464801 systemd-logind[1722]: Session 15 logged out. Waiting for processes to exit. Oct 2 19:28:30.466613 systemd-logind[1722]: Removed session 15. Oct 2 19:28:31.341000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:28:31.341000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400167f360 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:28:31.341000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:28:31.343000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:28:31.343000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400167f740 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:28:31.343000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:28:31.347000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:28:31.347000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400167f760 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:28:31.347000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:28:31.350000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:28:31.350000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000f2d4a0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:28:31.350000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:28:31.582529 kubelet[3033]: E1002 19:28:31.582490 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:28:36.584283 kubelet[3033]: E1002 19:28:36.584209 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:28:38.295831 kubelet[3033]: E1002 19:28:38.295793 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 1m20s restarting failed container=mount-cgroup pod=cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a)\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:28:40.480706 kernel: kauditd_printk_skb: 13 callbacks suppressed Oct 2 19:28:40.480852 kernel: audit: type=1130 audit(1696274920.473:1222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.27.184:22-139.178.89.65:59740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:40.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.27.184:22-139.178.89.65:59740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:40.474778 systemd[1]: Started sshd@15-172.31.27.184:22-139.178.89.65:59740.service. Oct 2 19:28:40.664000 audit[3727]: USER_ACCT pid=3727 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:40.671837 sshd[3727]: Accepted publickey for core from 139.178.89.65 port 59740 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:28:40.675816 sshd[3727]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:28:40.670000 audit[3727]: CRED_ACQ pid=3727 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:40.686144 kernel: audit: type=1101 audit(1696274920.664:1223): pid=3727 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:40.686292 kernel: audit: type=1103 audit(1696274920.670:1224): pid=3727 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:40.692405 kernel: audit: type=1006 audit(1696274920.670:1225): pid=3727 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Oct 2 19:28:40.670000 audit[3727]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9e9f540 a2=3 a3=1 items=0 ppid=1 pid=3727 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:28:40.702930 kernel: audit: type=1300 audit(1696274920.670:1225): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9e9f540 a2=3 a3=1 items=0 ppid=1 pid=3727 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:28:40.670000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:28:40.707072 kernel: audit: type=1327 audit(1696274920.670:1225): proctitle=737368643A20636F7265205B707269765D Oct 2 19:28:40.712865 systemd-logind[1722]: New session 16 of user core. Oct 2 19:28:40.714328 systemd[1]: Started session-16.scope. Oct 2 19:28:40.722000 audit[3727]: USER_START pid=3727 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:40.736742 kernel: audit: type=1105 audit(1696274920.722:1226): pid=3727 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:40.735000 audit[3729]: CRED_ACQ pid=3729 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:40.747710 kernel: audit: type=1103 audit(1696274920.735:1227): pid=3729 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:41.005935 sshd[3727]: pam_unix(sshd:session): session closed for user core Oct 2 19:28:41.013000 audit[3727]: USER_END pid=3727 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:41.027065 systemd[1]: sshd@15-172.31.27.184:22-139.178.89.65:59740.service: Deactivated successfully. Oct 2 19:28:41.014000 audit[3727]: CRED_DISP pid=3727 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:41.028331 systemd[1]: session-16.scope: Deactivated successfully. Oct 2 19:28:41.036389 kernel: audit: type=1106 audit(1696274921.013:1228): pid=3727 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:41.036496 kernel: audit: type=1104 audit(1696274921.014:1229): pid=3727 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:41.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.27.184:22-139.178.89.65:59740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:41.037436 systemd-logind[1722]: Session 16 logged out. Waiting for processes to exit. Oct 2 19:28:41.039119 systemd-logind[1722]: Removed session 16. Oct 2 19:28:41.585174 kubelet[3033]: E1002 19:28:41.585102 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:28:46.586417 kubelet[3033]: E1002 19:28:46.586374 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:28:51.037205 systemd[1]: Started sshd@16-172.31.27.184:22-139.178.89.65:55464.service. Oct 2 19:28:51.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.27.184:22-139.178.89.65:55464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:51.042712 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:28:51.042861 kernel: audit: type=1130 audit(1696274931.036:1231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.27.184:22-139.178.89.65:55464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:51.223000 audit[3740]: USER_ACCT pid=3740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:51.225199 sshd[3740]: Accepted publickey for core from 139.178.89.65 port 55464 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:28:51.236765 kernel: audit: type=1101 audit(1696274931.223:1232): pid=3740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:51.236000 audit[3740]: CRED_ACQ pid=3740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:51.244040 sshd[3740]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:28:51.254635 kernel: audit: type=1103 audit(1696274931.236:1233): pid=3740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:51.254855 kernel: audit: type=1006 audit(1696274931.236:1234): pid=3740 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Oct 2 19:28:51.236000 audit[3740]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcda8d300 a2=3 a3=1 items=0 ppid=1 pid=3740 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:28:51.266476 kernel: audit: type=1300 audit(1696274931.236:1234): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcda8d300 a2=3 a3=1 items=0 ppid=1 pid=3740 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:28:51.236000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:28:51.270465 kernel: audit: type=1327 audit(1696274931.236:1234): proctitle=737368643A20636F7265205B707269765D Oct 2 19:28:51.275923 systemd[1]: Started session-17.scope. Oct 2 19:28:51.278010 systemd-logind[1722]: New session 17 of user core. Oct 2 19:28:51.290000 audit[3740]: USER_START pid=3740 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:51.305000 audit[3742]: CRED_ACQ pid=3742 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:51.318308 kernel: audit: type=1105 audit(1696274931.290:1235): pid=3740 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:51.318498 kernel: audit: type=1103 audit(1696274931.305:1236): pid=3742 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:51.576208 sshd[3740]: pam_unix(sshd:session): session closed for user core Oct 2 19:28:51.578000 audit[3740]: USER_END pid=3740 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:51.592608 systemd[1]: sshd@16-172.31.27.184:22-139.178.89.65:55464.service: Deactivated successfully. Oct 2 19:28:51.593059 kubelet[3033]: E1002 19:28:51.592697 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:28:51.579000 audit[3740]: CRED_DISP pid=3740 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:51.604006 kernel: audit: type=1106 audit(1696274931.578:1237): pid=3740 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:51.604164 kernel: audit: type=1104 audit(1696274931.579:1238): pid=3740 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:51.595020 systemd[1]: session-17.scope: Deactivated successfully. Oct 2 19:28:51.603192 systemd-logind[1722]: Session 17 logged out. Waiting for processes to exit. Oct 2 19:28:51.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.27.184:22-139.178.89.65:55464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:51.607940 systemd-logind[1722]: Removed session 17. Oct 2 19:28:51.612524 systemd[1]: Started sshd@17-172.31.27.184:22-139.178.89.65:55466.service. Oct 2 19:28:51.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.27.184:22-139.178.89.65:55466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:51.798000 audit[3753]: USER_ACCT pid=3753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:51.800177 sshd[3753]: Accepted publickey for core from 139.178.89.65 port 55466 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:28:51.801000 audit[3753]: CRED_ACQ pid=3753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:51.801000 audit[3753]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff80b5360 a2=3 a3=1 items=0 ppid=1 pid=3753 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:28:51.801000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:28:51.803788 sshd[3753]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:28:51.811782 systemd-logind[1722]: New session 18 of user core. Oct 2 19:28:51.812823 systemd[1]: Started session-18.scope. Oct 2 19:28:51.824000 audit[3753]: USER_START pid=3753 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:51.831000 audit[3755]: CRED_ACQ pid=3755 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:53.295611 kubelet[3033]: E1002 19:28:53.295551 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 1m20s restarting failed container=mount-cgroup pod=cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a)\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:28:53.436068 sshd[3753]: pam_unix(sshd:session): session closed for user core Oct 2 19:28:53.436000 audit[3753]: USER_END pid=3753 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:53.437000 audit[3753]: CRED_DISP pid=3753 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:53.441452 systemd[1]: session-18.scope: Deactivated successfully. Oct 2 19:28:53.443128 systemd[1]: sshd@17-172.31.27.184:22-139.178.89.65:55466.service: Deactivated successfully. Oct 2 19:28:53.443640 systemd-logind[1722]: Session 18 logged out. Waiting for processes to exit. Oct 2 19:28:53.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.27.184:22-139.178.89.65:55466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:53.446603 systemd-logind[1722]: Removed session 18. Oct 2 19:28:53.467385 systemd[1]: Started sshd@18-172.31.27.184:22-139.178.89.65:55472.service. Oct 2 19:28:53.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.27.184:22-139.178.89.65:55472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:53.655000 audit[3763]: USER_ACCT pid=3763 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:53.658131 sshd[3763]: Accepted publickey for core from 139.178.89.65 port 55472 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:28:53.658000 audit[3763]: CRED_ACQ pid=3763 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:53.659000 audit[3763]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffddc0f570 a2=3 a3=1 items=0 ppid=1 pid=3763 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:28:53.659000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:28:53.661433 sshd[3763]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:28:53.670201 systemd-logind[1722]: New session 19 of user core. Oct 2 19:28:53.671352 systemd[1]: Started session-19.scope. Oct 2 19:28:53.679000 audit[3763]: USER_START pid=3763 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:53.686000 audit[3765]: CRED_ACQ pid=3765 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:53.948663 sshd[3763]: pam_unix(sshd:session): session closed for user core Oct 2 19:28:53.948000 audit[3763]: USER_END pid=3763 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:53.949000 audit[3763]: CRED_DISP pid=3763 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:28:53.954895 systemd[1]: session-19.scope: Deactivated successfully. Oct 2 19:28:53.956363 systemd-logind[1722]: Session 19 logged out. Waiting for processes to exit. Oct 2 19:28:53.957113 systemd[1]: sshd@18-172.31.27.184:22-139.178.89.65:55472.service: Deactivated successfully. Oct 2 19:28:53.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.27.184:22-139.178.89.65:55472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:53.960292 systemd-logind[1722]: Removed session 19. Oct 2 19:28:56.593720 kubelet[3033]: E1002 19:28:56.593669 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:29:01.595615 kubelet[3033]: E1002 19:29:01.595555 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:29:03.991882 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 19:29:03.992040 kernel: audit: type=1130 audit(1696274943.979:1258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.27.184:22-139.178.89.65:53874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:29:03.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.27.184:22-139.178.89.65:53874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:29:03.979814 systemd[1]: Started sshd@19-172.31.27.184:22-139.178.89.65:53874.service. Oct 2 19:29:04.160000 audit[3776]: USER_ACCT pid=3776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:04.161964 sshd[3776]: Accepted publickey for core from 139.178.89.65 port 53874 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:29:04.172749 kernel: audit: type=1101 audit(1696274944.160:1259): pid=3776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:04.173000 audit[3776]: CRED_ACQ pid=3776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:04.175701 sshd[3776]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:29:04.190859 kernel: audit: type=1103 audit(1696274944.173:1260): pid=3776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:04.190992 kernel: audit: type=1006 audit(1696274944.174:1261): pid=3776 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Oct 2 19:29:04.174000 audit[3776]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcae0a3e0 a2=3 a3=1 items=0 ppid=1 pid=3776 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:29:04.199189 systemd[1]: Started session-20.scope. Oct 2 19:29:04.200897 systemd-logind[1722]: New session 20 of user core. Oct 2 19:29:04.202042 kernel: audit: type=1300 audit(1696274944.174:1261): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcae0a3e0 a2=3 a3=1 items=0 ppid=1 pid=3776 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:29:04.202110 kernel: audit: type=1327 audit(1696274944.174:1261): proctitle=737368643A20636F7265205B707269765D Oct 2 19:29:04.174000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:29:04.214000 audit[3776]: USER_START pid=3776 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:04.221000 audit[3778]: CRED_ACQ pid=3778 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:04.235949 kernel: audit: type=1105 audit(1696274944.214:1262): pid=3776 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:04.236029 kernel: audit: type=1103 audit(1696274944.221:1263): pid=3778 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:04.497496 sshd[3776]: pam_unix(sshd:session): session closed for user core Oct 2 19:29:04.498000 audit[3776]: USER_END pid=3776 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:04.506222 systemd[1]: session-20.scope: Deactivated successfully. Oct 2 19:29:04.507562 systemd[1]: sshd@19-172.31.27.184:22-139.178.89.65:53874.service: Deactivated successfully. Oct 2 19:29:04.499000 audit[3776]: CRED_DISP pid=3776 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:04.521836 kernel: audit: type=1106 audit(1696274944.498:1264): pid=3776 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:04.521989 kernel: audit: type=1104 audit(1696274944.499:1265): pid=3776 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:04.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.27.184:22-139.178.89.65:53874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:29:04.522234 systemd-logind[1722]: Session 20 logged out. Waiting for processes to exit. Oct 2 19:29:04.523849 systemd-logind[1722]: Removed session 20. Oct 2 19:29:06.597086 kubelet[3033]: E1002 19:29:06.597031 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:29:08.296281 kubelet[3033]: E1002 19:29:08.296235 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 1m20s restarting failed container=mount-cgroup pod=cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a)\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:29:11.598776 kubelet[3033]: E1002 19:29:11.598723 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:29:14.542406 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:29:14.542565 kernel: audit: type=1130 audit(1696274954.530:1267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.27.184:22-139.178.89.65:60664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:29:14.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.27.184:22-139.178.89.65:60664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:29:14.530916 systemd[1]: Started sshd@20-172.31.27.184:22-139.178.89.65:60664.service. Oct 2 19:29:14.713000 audit[3788]: USER_ACCT pid=3788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:14.714554 sshd[3788]: Accepted publickey for core from 139.178.89.65 port 60664 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:29:14.726816 kernel: audit: type=1101 audit(1696274954.713:1268): pid=3788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:14.726000 audit[3788]: CRED_ACQ pid=3788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:14.728512 sshd[3788]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:29:14.743696 kernel: audit: type=1103 audit(1696274954.726:1269): pid=3788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:14.743824 kernel: audit: type=1006 audit(1696274954.726:1270): pid=3788 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Oct 2 19:29:14.726000 audit[3788]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd78c5bc0 a2=3 a3=1 items=0 ppid=1 pid=3788 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:29:14.754913 kernel: audit: type=1300 audit(1696274954.726:1270): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd78c5bc0 a2=3 a3=1 items=0 ppid=1 pid=3788 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:29:14.726000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:29:14.759141 kernel: audit: type=1327 audit(1696274954.726:1270): proctitle=737368643A20636F7265205B707269765D Oct 2 19:29:14.762885 systemd-logind[1722]: New session 21 of user core. Oct 2 19:29:14.764265 systemd[1]: Started session-21.scope. Oct 2 19:29:14.774000 audit[3788]: USER_START pid=3788 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:14.781000 audit[3790]: CRED_ACQ pid=3790 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:14.796699 kernel: audit: type=1105 audit(1696274954.774:1271): pid=3788 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:14.796846 kernel: audit: type=1103 audit(1696274954.781:1272): pid=3790 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:15.052326 sshd[3788]: pam_unix(sshd:session): session closed for user core Oct 2 19:29:15.053000 audit[3788]: USER_END pid=3788 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:15.059637 systemd[1]: session-21.scope: Deactivated successfully. Oct 2 19:29:15.061017 systemd[1]: sshd@20-172.31.27.184:22-139.178.89.65:60664.service: Deactivated successfully. Oct 2 19:29:15.053000 audit[3788]: CRED_DISP pid=3788 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:15.067781 systemd-logind[1722]: Session 21 logged out. Waiting for processes to exit. Oct 2 19:29:15.069716 systemd-logind[1722]: Removed session 21. Oct 2 19:29:15.075736 kernel: audit: type=1106 audit(1696274955.053:1273): pid=3788 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:15.075842 kernel: audit: type=1104 audit(1696274955.053:1274): pid=3788 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:15.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.27.184:22-139.178.89.65:60664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:29:15.796000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:29:15.796000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400215f3e0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:29:15.796000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:29:15.813000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:29:15.813000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029435e0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:29:15.813000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:29:16.600219 kubelet[3033]: E1002 19:29:16.600178 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:29:16.862000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:29:16.862000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=400b1c9860 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:29:16.862000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:29:16.862000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:29:16.862000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=400ec16f00 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:29:16.862000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:29:16.866000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:29:16.866000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=400ec16f90 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:29:16.866000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:29:16.876000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:29:16.876000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=400eb853e0 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:29:16.876000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:29:17.042000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:29:17.042000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=400ec170b0 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:29:17.042000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:29:17.044000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:29:17.044000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=400b1c9980 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:29:17.044000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:29:21.601531 kubelet[3033]: E1002 19:29:21.601494 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:29:23.296440 kubelet[3033]: E1002 19:29:23.296403 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 1m20s restarting failed container=mount-cgroup pod=cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a)\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:29:25.082723 systemd[1]: Started sshd@21-172.31.27.184:22-139.178.89.65:37268.service. Oct 2 19:29:25.094631 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 2 19:29:25.094789 kernel: audit: type=1130 audit(1696274965.082:1284): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.27.184:22-139.178.89.65:37268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:29:25.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.27.184:22-139.178.89.65:37268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:29:25.265000 audit[3802]: USER_ACCT pid=3802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:25.266885 sshd[3802]: Accepted publickey for core from 139.178.89.65 port 37268 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:29:25.282941 kernel: audit: type=1101 audit(1696274965.265:1285): pid=3802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:25.283063 kernel: audit: type=1103 audit(1696274965.278:1286): pid=3802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:25.278000 audit[3802]: CRED_ACQ pid=3802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:25.279802 sshd[3802]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:29:25.296491 kernel: audit: type=1006 audit(1696274965.278:1287): pid=3802 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Oct 2 19:29:25.278000 audit[3802]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc745bd10 a2=3 a3=1 items=0 ppid=1 pid=3802 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:29:25.307488 kernel: audit: type=1300 audit(1696274965.278:1287): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc745bd10 a2=3 a3=1 items=0 ppid=1 pid=3802 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:29:25.278000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:29:25.312004 kernel: audit: type=1327 audit(1696274965.278:1287): proctitle=737368643A20636F7265205B707269765D Oct 2 19:29:25.316780 systemd-logind[1722]: New session 22 of user core. Oct 2 19:29:25.318657 systemd[1]: Started session-22.scope. Oct 2 19:29:25.327000 audit[3802]: USER_START pid=3802 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:25.341737 kernel: audit: type=1105 audit(1696274965.327:1288): pid=3802 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:25.341000 audit[3804]: CRED_ACQ pid=3804 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:25.353735 kernel: audit: type=1103 audit(1696274965.341:1289): pid=3804 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:25.600401 sshd[3802]: pam_unix(sshd:session): session closed for user core Oct 2 19:29:25.602000 audit[3802]: USER_END pid=3802 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:25.603000 audit[3802]: CRED_DISP pid=3802 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:25.615260 systemd[1]: sshd@21-172.31.27.184:22-139.178.89.65:37268.service: Deactivated successfully. Oct 2 19:29:25.616506 systemd[1]: session-22.scope: Deactivated successfully. Oct 2 19:29:25.624129 kernel: audit: type=1106 audit(1696274965.602:1290): pid=3802 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:25.624268 kernel: audit: type=1104 audit(1696274965.603:1291): pid=3802 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:25.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.27.184:22-139.178.89.65:37268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:29:25.625380 systemd-logind[1722]: Session 22 logged out. Waiting for processes to exit. Oct 2 19:29:25.627378 systemd-logind[1722]: Removed session 22. Oct 2 19:29:26.603709 kubelet[3033]: E1002 19:29:26.603654 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:29:31.342000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:29:31.345740 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:29:31.345857 kernel: audit: type=1400 audit(1696274971.342:1293): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:29:31.342000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40025c2920 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:29:31.368043 kernel: audit: type=1300 audit(1696274971.342:1293): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40025c2920 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:29:31.368156 kernel: audit: type=1327 audit(1696274971.342:1293): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:29:31.342000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:29:31.344000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:29:31.388228 kernel: audit: type=1400 audit(1696274971.344:1294): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:29:31.388301 kernel: audit: type=1300 audit(1696274971.344:1294): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002690f80 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:29:31.344000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002690f80 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:29:31.344000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:29:31.411329 kernel: audit: type=1327 audit(1696274971.344:1294): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:29:31.411428 kernel: audit: type=1400 audit(1696274971.348:1295): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:29:31.348000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:29:31.348000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40026910e0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:29:31.433705 kernel: audit: type=1300 audit(1696274971.348:1295): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40026910e0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:29:31.433788 kernel: audit: type=1327 audit(1696274971.348:1295): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:29:31.348000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:29:31.351000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:29:31.454152 kernel: audit: type=1400 audit(1696274971.351:1296): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:29:31.351000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002691100 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:29:31.351000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:29:31.605865 kubelet[3033]: E1002 19:29:31.605710 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:29:35.295715 kubelet[3033]: E1002 19:29:35.295654 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 1m20s restarting failed container=mount-cgroup pod=cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a)\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:29:35.635425 systemd[1]: Started sshd@22-172.31.27.184:22-139.178.89.65:53728.service. Oct 2 19:29:35.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.27.184:22-139.178.89.65:53728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:29:35.823000 audit[3817]: USER_ACCT pid=3817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:35.826009 sshd[3817]: Accepted publickey for core from 139.178.89.65 port 53728 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:29:35.826000 audit[3817]: CRED_ACQ pid=3817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:35.827000 audit[3817]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdfbe6ea0 a2=3 a3=1 items=0 ppid=1 pid=3817 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:29:35.827000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:29:35.830006 sshd[3817]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:29:35.839651 systemd[1]: Started session-23.scope. Oct 2 19:29:35.841780 systemd-logind[1722]: New session 23 of user core. Oct 2 19:29:35.850000 audit[3817]: USER_START pid=3817 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:35.856000 audit[3819]: CRED_ACQ pid=3819 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:36.125334 sshd[3817]: pam_unix(sshd:session): session closed for user core Oct 2 19:29:36.125000 audit[3817]: USER_END pid=3817 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:36.126000 audit[3817]: CRED_DISP pid=3817 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:36.132658 systemd[1]: sshd@22-172.31.27.184:22-139.178.89.65:53728.service: Deactivated successfully. Oct 2 19:29:36.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.27.184:22-139.178.89.65:53728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:29:36.134121 systemd[1]: session-23.scope: Deactivated successfully. Oct 2 19:29:36.135832 systemd-logind[1722]: Session 23 logged out. Waiting for processes to exit. Oct 2 19:29:36.138537 systemd-logind[1722]: Removed session 23. Oct 2 19:29:36.606707 kubelet[3033]: E1002 19:29:36.606647 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:29:41.607855 kubelet[3033]: E1002 19:29:41.607771 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:29:46.168976 kernel: kauditd_printk_skb: 13 callbacks suppressed Oct 2 19:29:46.169148 kernel: audit: type=1130 audit(1696274986.156:1306): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.27.184:22-139.178.89.65:52110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:29:46.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.27.184:22-139.178.89.65:52110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:29:46.157560 systemd[1]: Started sshd@23-172.31.27.184:22-139.178.89.65:52110.service. Oct 2 19:29:46.340000 audit[3828]: USER_ACCT pid=3828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:46.343100 sshd[3828]: Accepted publickey for core from 139.178.89.65 port 52110 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:29:46.355785 kernel: audit: type=1101 audit(1696274986.340:1307): pid=3828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:46.355915 kernel: audit: type=1103 audit(1696274986.353:1308): pid=3828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:46.353000 audit[3828]: CRED_ACQ pid=3828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:46.357518 sshd[3828]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:29:46.371506 kernel: audit: type=1006 audit(1696274986.354:1309): pid=3828 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Oct 2 19:29:46.354000 audit[3828]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc8efbdc0 a2=3 a3=1 items=0 ppid=1 pid=3828 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:29:46.382318 kernel: audit: type=1300 audit(1696274986.354:1309): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc8efbdc0 a2=3 a3=1 items=0 ppid=1 pid=3828 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:29:46.354000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:29:46.386363 kernel: audit: type=1327 audit(1696274986.354:1309): proctitle=737368643A20636F7265205B707269765D Oct 2 19:29:46.391333 systemd-logind[1722]: New session 24 of user core. Oct 2 19:29:46.392522 systemd[1]: Started session-24.scope. Oct 2 19:29:46.402000 audit[3828]: USER_START pid=3828 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:46.407000 audit[3830]: CRED_ACQ pid=3830 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:46.426292 kernel: audit: type=1105 audit(1696274986.402:1310): pid=3828 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:46.426393 kernel: audit: type=1103 audit(1696274986.407:1311): pid=3830 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:46.609651 kubelet[3033]: E1002 19:29:46.609615 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:29:46.690983 sshd[3828]: pam_unix(sshd:session): session closed for user core Oct 2 19:29:46.690000 audit[3828]: USER_END pid=3828 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:46.691000 audit[3828]: CRED_DISP pid=3828 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:46.705004 systemd[1]: sshd@23-172.31.27.184:22-139.178.89.65:52110.service: Deactivated successfully. Oct 2 19:29:46.706292 systemd[1]: session-24.scope: Deactivated successfully. Oct 2 19:29:46.708851 systemd-logind[1722]: Session 24 logged out. Waiting for processes to exit. Oct 2 19:29:46.710691 systemd-logind[1722]: Removed session 24. Oct 2 19:29:46.713856 kernel: audit: type=1106 audit(1696274986.690:1312): pid=3828 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:46.713945 kernel: audit: type=1104 audit(1696274986.691:1313): pid=3828 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:46.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.27.184:22-139.178.89.65:52110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:29:50.299621 env[1732]: time="2023-10-02T19:29:50.299329845Z" level=info msg="CreateContainer within sandbox \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:5,}" Oct 2 19:29:50.316368 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3289712714.mount: Deactivated successfully. Oct 2 19:29:50.327541 env[1732]: time="2023-10-02T19:29:50.327446888Z" level=info msg="CreateContainer within sandbox \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\" for &ContainerMetadata{Name:mount-cgroup,Attempt:5,} returns container id \"00052e2b65a006661dc7eec9c1dbf61a6264f2f7fa87e16396fdf85109876f8e\"" Oct 2 19:29:50.328707 env[1732]: time="2023-10-02T19:29:50.328585865Z" level=info msg="StartContainer for \"00052e2b65a006661dc7eec9c1dbf61a6264f2f7fa87e16396fdf85109876f8e\"" Oct 2 19:29:50.379776 systemd[1]: Started cri-containerd-00052e2b65a006661dc7eec9c1dbf61a6264f2f7fa87e16396fdf85109876f8e.scope. Oct 2 19:29:50.422113 systemd[1]: cri-containerd-00052e2b65a006661dc7eec9c1dbf61a6264f2f7fa87e16396fdf85109876f8e.scope: Deactivated successfully. Oct 2 19:29:50.456153 env[1732]: time="2023-10-02T19:29:50.456079783Z" level=info msg="shim disconnected" id=00052e2b65a006661dc7eec9c1dbf61a6264f2f7fa87e16396fdf85109876f8e Oct 2 19:29:50.456596 env[1732]: time="2023-10-02T19:29:50.456562498Z" level=warning msg="cleaning up after shim disconnected" id=00052e2b65a006661dc7eec9c1dbf61a6264f2f7fa87e16396fdf85109876f8e namespace=k8s.io Oct 2 19:29:50.456762 env[1732]: time="2023-10-02T19:29:50.456733812Z" level=info msg="cleaning up dead shim" Oct 2 19:29:50.484137 env[1732]: time="2023-10-02T19:29:50.484073021Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:29:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3861 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:29:50Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/00052e2b65a006661dc7eec9c1dbf61a6264f2f7fa87e16396fdf85109876f8e/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:29:50.484920 env[1732]: time="2023-10-02T19:29:50.484806406Z" level=error msg="copy shim log" error="read /proc/self/fd/48: file already closed" Oct 2 19:29:50.485897 env[1732]: time="2023-10-02T19:29:50.485775438Z" level=error msg="Failed to pipe stdout of container \"00052e2b65a006661dc7eec9c1dbf61a6264f2f7fa87e16396fdf85109876f8e\"" error="reading from a closed fifo" Oct 2 19:29:50.486892 env[1732]: time="2023-10-02T19:29:50.486835706Z" level=error msg="Failed to pipe stderr of container \"00052e2b65a006661dc7eec9c1dbf61a6264f2f7fa87e16396fdf85109876f8e\"" error="reading from a closed fifo" Oct 2 19:29:50.489264 env[1732]: time="2023-10-02T19:29:50.489177800Z" level=error msg="StartContainer for \"00052e2b65a006661dc7eec9c1dbf61a6264f2f7fa87e16396fdf85109876f8e\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:29:50.489558 kubelet[3033]: E1002 19:29:50.489506 3033 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="00052e2b65a006661dc7eec9c1dbf61a6264f2f7fa87e16396fdf85109876f8e" Oct 2 19:29:50.490230 kubelet[3033]: E1002 19:29:50.489663 3033 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:29:50.490230 kubelet[3033]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:29:50.490230 kubelet[3033]: rm /hostbin/cilium-mount Oct 2 19:29:50.490230 kubelet[3033]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-9xvjc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:29:50.490230 kubelet[3033]: E1002 19:29:50.489767 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:29:50.978712 kubelet[3033]: I1002 19:29:50.978653 3033 scope.go:117] "RemoveContainer" containerID="d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692" Oct 2 19:29:50.979253 kubelet[3033]: I1002 19:29:50.979211 3033 scope.go:117] "RemoveContainer" containerID="d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692" Oct 2 19:29:50.981857 env[1732]: time="2023-10-02T19:29:50.981765099Z" level=info msg="RemoveContainer for \"d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692\"" Oct 2 19:29:50.983488 env[1732]: time="2023-10-02T19:29:50.983404780Z" level=info msg="RemoveContainer for \"d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692\"" Oct 2 19:29:50.983782 env[1732]: time="2023-10-02T19:29:50.983712786Z" level=error msg="RemoveContainer for \"d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692\" failed" error="failed to set removing state for container \"d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692\": container is already in removing state" Oct 2 19:29:50.984216 kubelet[3033]: E1002 19:29:50.984188 3033 remote_runtime.go:385] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692\": container is already in removing state" containerID="d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692" Oct 2 19:29:50.984517 kubelet[3033]: E1002 19:29:50.984482 3033 kuberuntime_container.go:820] failed to remove pod init container "mount-cgroup": rpc error: code = Unknown desc = failed to set removing state for container "d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692": container is already in removing state; Skipping pod "cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a)" Oct 2 19:29:50.985394 kubelet[3033]: E1002 19:29:50.985356 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 2m40s restarting failed container=mount-cgroup pod=cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a)\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:29:50.991927 env[1732]: time="2023-10-02T19:29:50.991864125Z" level=info msg="RemoveContainer for \"d53734b8f816e3f7b43500889739ef60d28dca1aa711563f56058125dc995692\" returns successfully" Oct 2 19:29:51.311959 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-00052e2b65a006661dc7eec9c1dbf61a6264f2f7fa87e16396fdf85109876f8e-rootfs.mount: Deactivated successfully. Oct 2 19:29:51.611187 kubelet[3033]: E1002 19:29:51.611027 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:29:53.561874 kubelet[3033]: W1002 19:29:53.561799 3033 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod74fc5ce2_141a_4229_be64_48dc72ee9d6a.slice/cri-containerd-00052e2b65a006661dc7eec9c1dbf61a6264f2f7fa87e16396fdf85109876f8e.scope WatchSource:0}: task 00052e2b65a006661dc7eec9c1dbf61a6264f2f7fa87e16396fdf85109876f8e not found: not found Oct 2 19:29:56.612973 kubelet[3033]: E1002 19:29:56.612905 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:29:56.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.27.184:22-139.178.89.65:55584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:29:56.721551 systemd[1]: Started sshd@24-172.31.27.184:22-139.178.89.65:55584.service. Oct 2 19:29:56.727745 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:29:56.727891 kernel: audit: type=1130 audit(1696274996.720:1315): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.27.184:22-139.178.89.65:55584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:29:56.907000 audit[3876]: USER_ACCT pid=3876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:56.910454 sshd[3876]: Accepted publickey for core from 139.178.89.65 port 55584 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:29:56.920755 kernel: audit: type=1101 audit(1696274996.907:1316): pid=3876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:56.920000 audit[3876]: CRED_ACQ pid=3876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:56.923096 sshd[3876]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:29:56.938226 kernel: audit: type=1103 audit(1696274996.920:1317): pid=3876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:56.938319 kernel: audit: type=1006 audit(1696274996.920:1318): pid=3876 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Oct 2 19:29:56.920000 audit[3876]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff2fab5e0 a2=3 a3=1 items=0 ppid=1 pid=3876 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:29:56.949267 kernel: audit: type=1300 audit(1696274996.920:1318): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff2fab5e0 a2=3 a3=1 items=0 ppid=1 pid=3876 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:29:56.920000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:29:56.952994 kernel: audit: type=1327 audit(1696274996.920:1318): proctitle=737368643A20636F7265205B707269765D Oct 2 19:29:56.959028 systemd-logind[1722]: New session 25 of user core. Oct 2 19:29:56.961131 systemd[1]: Started session-25.scope. Oct 2 19:29:56.968000 audit[3876]: USER_START pid=3876 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:56.985908 kernel: audit: type=1105 audit(1696274996.968:1319): pid=3876 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:56.986046 kernel: audit: type=1103 audit(1696274996.981:1320): pid=3878 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:56.981000 audit[3878]: CRED_ACQ pid=3878 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:57.244101 sshd[3876]: pam_unix(sshd:session): session closed for user core Oct 2 19:29:57.244000 audit[3876]: USER_END pid=3876 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:57.245000 audit[3876]: CRED_DISP pid=3876 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:57.258230 systemd[1]: sshd@24-172.31.27.184:22-139.178.89.65:55584.service: Deactivated successfully. Oct 2 19:29:57.259479 systemd[1]: session-25.scope: Deactivated successfully. Oct 2 19:29:57.266805 kernel: audit: type=1106 audit(1696274997.244:1321): pid=3876 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:57.266924 kernel: audit: type=1104 audit(1696274997.245:1322): pid=3876 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:29:57.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.27.184:22-139.178.89.65:55584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:29:57.268027 systemd-logind[1722]: Session 25 logged out. Waiting for processes to exit. Oct 2 19:29:57.271390 systemd-logind[1722]: Removed session 25. Oct 2 19:30:01.614608 kubelet[3033]: E1002 19:30:01.614437 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:30:04.295912 kubelet[3033]: E1002 19:30:04.295858 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 2m40s restarting failed container=mount-cgroup pod=cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a)\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:30:06.616096 kubelet[3033]: E1002 19:30:06.616061 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:30:07.292928 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:30:07.293116 kernel: audit: type=1130 audit(1696275007.279:1324): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.27.184:22-139.178.89.65:38202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:07.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.27.184:22-139.178.89.65:38202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:07.280801 systemd[1]: Started sshd@25-172.31.27.184:22-139.178.89.65:38202.service. Oct 2 19:30:07.469000 audit[3889]: USER_ACCT pid=3889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:07.471230 sshd[3889]: Accepted publickey for core from 139.178.89.65 port 38202 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:30:07.482880 kernel: audit: type=1101 audit(1696275007.469:1325): pid=3889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:07.482000 audit[3889]: CRED_ACQ pid=3889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:07.485267 sshd[3889]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:30:07.500648 kernel: audit: type=1103 audit(1696275007.482:1326): pid=3889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:07.500802 kernel: audit: type=1006 audit(1696275007.482:1327): pid=3889 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Oct 2 19:30:07.482000 audit[3889]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc25552b0 a2=3 a3=1 items=0 ppid=1 pid=3889 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:07.511467 kernel: audit: type=1300 audit(1696275007.482:1327): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc25552b0 a2=3 a3=1 items=0 ppid=1 pid=3889 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:07.482000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:30:07.515221 kernel: audit: type=1327 audit(1696275007.482:1327): proctitle=737368643A20636F7265205B707269765D Oct 2 19:30:07.520839 systemd-logind[1722]: New session 26 of user core. Oct 2 19:30:07.522190 systemd[1]: Started session-26.scope. Oct 2 19:30:07.531000 audit[3889]: USER_START pid=3889 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:07.547702 kernel: audit: type=1105 audit(1696275007.531:1328): pid=3889 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:07.542000 audit[3891]: CRED_ACQ pid=3891 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:07.557742 kernel: audit: type=1103 audit(1696275007.542:1329): pid=3891 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:07.809308 sshd[3889]: pam_unix(sshd:session): session closed for user core Oct 2 19:30:07.809000 audit[3889]: USER_END pid=3889 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:07.815875 systemd[1]: session-26.scope: Deactivated successfully. Oct 2 19:30:07.817404 systemd[1]: sshd@25-172.31.27.184:22-139.178.89.65:38202.service: Deactivated successfully. Oct 2 19:30:07.809000 audit[3889]: CRED_DISP pid=3889 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:07.824139 systemd-logind[1722]: Session 26 logged out. Waiting for processes to exit. Oct 2 19:30:07.825787 systemd-logind[1722]: Removed session 26. Oct 2 19:30:07.832823 kernel: audit: type=1106 audit(1696275007.809:1330): pid=3889 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:07.832955 kernel: audit: type=1104 audit(1696275007.809:1331): pid=3889 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:07.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.27.184:22-139.178.89.65:38202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:11.617661 kubelet[3033]: E1002 19:30:11.617607 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:30:15.797000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:30:15.800970 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:30:15.801066 kernel: audit: type=1400 audit(1696275015.797:1333): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:30:15.797000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000fec0c0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:30:15.823544 kernel: audit: type=1300 audit(1696275015.797:1333): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000fec0c0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:30:15.823670 kernel: audit: type=1327 audit(1696275015.797:1333): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:30:15.797000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:30:15.813000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:30:15.843598 kernel: audit: type=1400 audit(1696275015.813:1334): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:30:15.843712 kernel: audit: type=1300 audit(1696275015.813:1334): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000588520 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:30:15.813000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000588520 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:30:15.813000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:30:15.867123 kernel: audit: type=1327 audit(1696275015.813:1334): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:30:16.619035 kubelet[3033]: E1002 19:30:16.618983 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:30:16.862000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:30:16.863000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:30:16.883254 kernel: audit: type=1400 audit(1696275016.862:1335): avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:30:16.883441 kernel: audit: type=1400 audit(1696275016.863:1336): avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:30:16.863000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=51 a1=4010e29a40 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:30:16.895882 kernel: audit: type=1300 audit(1696275016.863:1336): arch=c00000b7 syscall=27 success=no exit=-13 a0=51 a1=4010e29a40 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:30:16.863000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:30:16.907901 kernel: audit: type=1327 audit(1696275016.863:1336): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:30:16.862000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=400b50e8e0 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:30:16.862000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:30:16.865000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:30:16.865000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=4010e29ad0 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:30:16.865000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:30:16.876000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:30:16.876000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=40115020f0 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:30:16.876000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:30:17.042000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:30:17.042000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=40115022a0 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:30:17.042000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:30:17.044000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:30:17.044000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=400b50eaa0 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:30:17.044000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:30:17.843018 systemd[1]: Started sshd@26-172.31.27.184:22-139.178.89.65:60474.service. Oct 2 19:30:17.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.27.184:22-139.178.89.65:60474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:18.030000 audit[3902]: USER_ACCT pid=3902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:18.033117 sshd[3902]: Accepted publickey for core from 139.178.89.65 port 60474 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:30:18.033000 audit[3902]: CRED_ACQ pid=3902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:18.034000 audit[3902]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc2344ce0 a2=3 a3=1 items=0 ppid=1 pid=3902 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:18.034000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:30:18.036493 sshd[3902]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:30:18.047120 systemd[1]: Started session-27.scope. Oct 2 19:30:18.047950 systemd-logind[1722]: New session 27 of user core. Oct 2 19:30:18.057000 audit[3902]: USER_START pid=3902 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:18.064000 audit[3904]: CRED_ACQ pid=3904 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:18.296538 kubelet[3033]: E1002 19:30:18.296500 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 2m40s restarting failed container=mount-cgroup pod=cilium-r2wml_kube-system(74fc5ce2-141a-4229-be64-48dc72ee9d6a)\"" pod="kube-system/cilium-r2wml" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" Oct 2 19:30:18.379820 sshd[3902]: pam_unix(sshd:session): session closed for user core Oct 2 19:30:18.380000 audit[3902]: USER_END pid=3902 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:18.380000 audit[3902]: CRED_DISP pid=3902 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:18.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.27.184:22-139.178.89.65:60474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:18.385989 systemd[1]: sshd@26-172.31.27.184:22-139.178.89.65:60474.service: Deactivated successfully. Oct 2 19:30:18.387339 systemd[1]: session-27.scope: Deactivated successfully. Oct 2 19:30:18.389594 systemd-logind[1722]: Session 27 logged out. Waiting for processes to exit. Oct 2 19:30:18.391538 systemd-logind[1722]: Removed session 27. Oct 2 19:30:21.620847 kubelet[3033]: E1002 19:30:21.620787 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:30:22.101745 amazon-ssm-agent[1710]: 2023-10-02 19:30:22 INFO Backing off health check to every 600 seconds for 1800 seconds. Oct 2 19:30:22.202795 amazon-ssm-agent[1710]: 2023-10-02 19:30:22 ERROR Health ping failed with error - AccessDeniedException: User: arn:aws:sts::075585003325:assumed-role/jenkins-test/i-050853d88a17c3584 is not authorized to perform: ssm:UpdateInstanceInformation on resource: arn:aws:ec2:us-west-2:075585003325:instance/i-050853d88a17c3584 because no identity-based policy allows the ssm:UpdateInstanceInformation action Oct 2 19:30:22.202795 amazon-ssm-agent[1710]: status code: 400, request id: ef4f747b-e8c7-42e5-948c-d13eb4e1bcef Oct 2 19:30:26.622938 kubelet[3033]: E1002 19:30:26.622895 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:30:28.412371 systemd[1]: Started sshd@27-172.31.27.184:22-139.178.89.65:35936.service. Oct 2 19:30:28.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.27.184:22-139.178.89.65:35936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:28.418716 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 2 19:30:28.418897 kernel: audit: type=1130 audit(1696275028.411:1350): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.27.184:22-139.178.89.65:35936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:28.600000 audit[3917]: USER_ACCT pid=3917 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:28.603786 sshd[3917]: Accepted publickey for core from 139.178.89.65 port 35936 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:30:28.608122 sshd[3917]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:30:28.600000 audit[3917]: CRED_ACQ pid=3917 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:28.623000 kernel: audit: type=1101 audit(1696275028.600:1351): pid=3917 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:28.623918 kernel: audit: type=1103 audit(1696275028.600:1352): pid=3917 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:28.624049 kernel: audit: type=1006 audit(1696275028.600:1353): pid=3917 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Oct 2 19:30:28.600000 audit[3917]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9e23160 a2=3 a3=1 items=0 ppid=1 pid=3917 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:28.644217 kernel: audit: type=1300 audit(1696275028.600:1353): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9e23160 a2=3 a3=1 items=0 ppid=1 pid=3917 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:28.644374 kernel: audit: type=1327 audit(1696275028.600:1353): proctitle=737368643A20636F7265205B707269765D Oct 2 19:30:28.600000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:30:28.652233 systemd-logind[1722]: New session 28 of user core. Oct 2 19:30:28.653240 systemd[1]: Started session-28.scope. Oct 2 19:30:28.664000 audit[3917]: USER_START pid=3917 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:28.677000 audit[3920]: CRED_ACQ pid=3920 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:28.688459 kernel: audit: type=1105 audit(1696275028.664:1354): pid=3917 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:28.688625 kernel: audit: type=1103 audit(1696275028.677:1355): pid=3920 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:28.969000 audit[3917]: USER_END pid=3917 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:28.968164 sshd[3917]: pam_unix(sshd:session): session closed for user core Oct 2 19:30:28.969000 audit[3917]: CRED_DISP pid=3917 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:28.983437 systemd[1]: sshd@27-172.31.27.184:22-139.178.89.65:35936.service: Deactivated successfully. Oct 2 19:30:28.985281 systemd[1]: session-28.scope: Deactivated successfully. Oct 2 19:30:28.992319 kernel: audit: type=1106 audit(1696275028.969:1356): pid=3917 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:28.992501 kernel: audit: type=1104 audit(1696275028.969:1357): pid=3917 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:28.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.27.184:22-139.178.89.65:35936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:28.995806 systemd-logind[1722]: Session 28 logged out. Waiting for processes to exit. Oct 2 19:30:29.009448 systemd[1]: Started sshd@28-172.31.27.184:22-139.178.89.65:35944.service. Oct 2 19:30:29.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.27.184:22-139.178.89.65:35944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:29.011294 systemd-logind[1722]: Removed session 28. Oct 2 19:30:29.197000 audit[3930]: USER_ACCT pid=3930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:29.199068 sshd[3930]: Accepted publickey for core from 139.178.89.65 port 35944 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:30:29.200000 audit[3930]: CRED_ACQ pid=3930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:29.200000 audit[3930]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed9ae110 a2=3 a3=1 items=0 ppid=1 pid=3930 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:29.200000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:30:29.203715 sshd[3930]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:30:29.213493 systemd-logind[1722]: New session 29 of user core. Oct 2 19:30:29.214898 systemd[1]: Started session-29.scope. Oct 2 19:30:29.224000 audit[3930]: USER_START pid=3930 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:29.231000 audit[3932]: CRED_ACQ pid=3932 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:31.343000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:30:31.343000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a0a440 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:30:31.343000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:30:31.345000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:30:31.345000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c10740 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:30:31.345000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:30:31.350000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:30:31.350000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a0a460 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:30:31.350000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:30:31.351000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:30:31.351000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c10aa0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:30:31.351000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:30:31.625099 kubelet[3033]: E1002 19:30:31.624967 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:30:31.794311 env[1732]: time="2023-10-02T19:30:31.793919448Z" level=info msg="StopPodSandbox for \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\"" Oct 2 19:30:31.794311 env[1732]: time="2023-10-02T19:30:31.794019829Z" level=info msg="Container to stop \"00052e2b65a006661dc7eec9c1dbf61a6264f2f7fa87e16396fdf85109876f8e\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Oct 2 19:30:31.800781 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe-shm.mount: Deactivated successfully. Oct 2 19:30:31.837097 systemd[1]: cri-containerd-1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe.scope: Deactivated successfully. Oct 2 19:30:31.835000 audit: BPF prog-id=126 op=UNLOAD Oct 2 19:30:31.841000 audit: BPF prog-id=129 op=UNLOAD Oct 2 19:30:31.850555 env[1732]: time="2023-10-02T19:30:31.850496620Z" level=info msg="StopContainer for \"ae03908b24d3aaf86ed9d1a30038b568dca37ab547848d48939dbfde048575ce\" with timeout 30 (s)" Oct 2 19:30:31.865383 env[1732]: time="2023-10-02T19:30:31.860855155Z" level=info msg="Stop container \"ae03908b24d3aaf86ed9d1a30038b568dca37ab547848d48939dbfde048575ce\" with signal terminated" Oct 2 19:30:31.909000 audit: BPF prog-id=130 op=UNLOAD Oct 2 19:30:31.910931 systemd[1]: cri-containerd-ae03908b24d3aaf86ed9d1a30038b568dca37ab547848d48939dbfde048575ce.scope: Deactivated successfully. Oct 2 19:30:31.916000 audit: BPF prog-id=133 op=UNLOAD Oct 2 19:30:31.926224 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe-rootfs.mount: Deactivated successfully. Oct 2 19:30:31.958135 env[1732]: time="2023-10-02T19:30:31.958045579Z" level=info msg="shim disconnected" id=1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe Oct 2 19:30:31.958135 env[1732]: time="2023-10-02T19:30:31.958118791Z" level=warning msg="cleaning up after shim disconnected" id=1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe namespace=k8s.io Oct 2 19:30:31.958478 env[1732]: time="2023-10-02T19:30:31.958142372Z" level=info msg="cleaning up dead shim" Oct 2 19:30:31.977647 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ae03908b24d3aaf86ed9d1a30038b568dca37ab547848d48939dbfde048575ce-rootfs.mount: Deactivated successfully. Oct 2 19:30:31.989057 env[1732]: time="2023-10-02T19:30:31.988993612Z" level=info msg="shim disconnected" id=ae03908b24d3aaf86ed9d1a30038b568dca37ab547848d48939dbfde048575ce Oct 2 19:30:31.989511 env[1732]: time="2023-10-02T19:30:31.989478270Z" level=warning msg="cleaning up after shim disconnected" id=ae03908b24d3aaf86ed9d1a30038b568dca37ab547848d48939dbfde048575ce namespace=k8s.io Oct 2 19:30:31.989664 env[1732]: time="2023-10-02T19:30:31.989635771Z" level=info msg="cleaning up dead shim" Oct 2 19:30:32.003867 env[1732]: time="2023-10-02T19:30:32.003807781Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:30:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3976 runtime=io.containerd.runc.v2\n" Oct 2 19:30:32.004637 env[1732]: time="2023-10-02T19:30:32.004593341Z" level=info msg="TearDown network for sandbox \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\" successfully" Oct 2 19:30:32.004830 env[1732]: time="2023-10-02T19:30:32.004793394Z" level=info msg="StopPodSandbox for \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\" returns successfully" Oct 2 19:30:32.036935 kubelet[3033]: I1002 19:30:32.036840 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"host-proc-sys-kernel\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-host-proc-sys-kernel\") pod \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " Oct 2 19:30:32.037148 kubelet[3033]: I1002 19:30:32.036949 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-path\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-cni-path\") pod \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " Oct 2 19:30:32.037148 kubelet[3033]: I1002 19:30:32.037017 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-cgroup\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-cilium-cgroup\") pod \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " Oct 2 19:30:32.037148 kubelet[3033]: I1002 19:30:32.037087 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-xtables-lock\") pod \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " Oct 2 19:30:32.037347 kubelet[3033]: I1002 19:30:32.037164 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"clustermesh-secrets\" (UniqueName: \"kubernetes.io/secret/74fc5ce2-141a-4229-be64-48dc72ee9d6a-clustermesh-secrets\") pod \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " Oct 2 19:30:32.037347 kubelet[3033]: I1002 19:30:32.037207 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"hostproc\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-hostproc\") pod \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " Oct 2 19:30:32.037347 kubelet[3033]: I1002 19:30:32.037270 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-lib-modules\") pod \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " Oct 2 19:30:32.037347 kubelet[3033]: I1002 19:30:32.037343 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/74fc5ce2-141a-4229-be64-48dc72ee9d6a-cilium-config-path\") pod \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " Oct 2 19:30:32.037587 kubelet[3033]: I1002 19:30:32.037389 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"host-proc-sys-net\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-host-proc-sys-net\") pod \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " Oct 2 19:30:32.037587 kubelet[3033]: I1002 19:30:32.037455 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-run\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-cilium-run\") pod \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " Oct 2 19:30:32.037587 kubelet[3033]: I1002 19:30:32.037519 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"etc-cni-netd\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-etc-cni-netd\") pod \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " Oct 2 19:30:32.037797 kubelet[3033]: I1002 19:30:32.037573 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"hubble-tls\" (UniqueName: \"kubernetes.io/projected/74fc5ce2-141a-4229-be64-48dc72ee9d6a-hubble-tls\") pod \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " Oct 2 19:30:32.037797 kubelet[3033]: I1002 19:30:32.037701 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"bpf-maps\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-bpf-maps\") pod \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " Oct 2 19:30:32.037797 kubelet[3033]: I1002 19:30:32.037754 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-9xvjc\" (UniqueName: \"kubernetes.io/projected/74fc5ce2-141a-4229-be64-48dc72ee9d6a-kube-api-access-9xvjc\") pod \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\" (UID: \"74fc5ce2-141a-4229-be64-48dc72ee9d6a\") " Oct 2 19:30:32.039889 kubelet[3033]: I1002 19:30:32.038031 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "74fc5ce2-141a-4229-be64-48dc72ee9d6a" (UID: "74fc5ce2-141a-4229-be64-48dc72ee9d6a"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:30:32.039889 kubelet[3033]: I1002 19:30:32.038102 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-host-proc-sys-kernel" (OuterVolumeSpecName: "host-proc-sys-kernel") pod "74fc5ce2-141a-4229-be64-48dc72ee9d6a" (UID: "74fc5ce2-141a-4229-be64-48dc72ee9d6a"). InnerVolumeSpecName "host-proc-sys-kernel". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:30:32.039889 kubelet[3033]: I1002 19:30:32.038147 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-cni-path" (OuterVolumeSpecName: "cni-path") pod "74fc5ce2-141a-4229-be64-48dc72ee9d6a" (UID: "74fc5ce2-141a-4229-be64-48dc72ee9d6a"). InnerVolumeSpecName "cni-path". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:30:32.039889 kubelet[3033]: I1002 19:30:32.038186 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-cilium-cgroup" (OuterVolumeSpecName: "cilium-cgroup") pod "74fc5ce2-141a-4229-be64-48dc72ee9d6a" (UID: "74fc5ce2-141a-4229-be64-48dc72ee9d6a"). InnerVolumeSpecName "cilium-cgroup". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:30:32.039889 kubelet[3033]: I1002 19:30:32.038224 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "74fc5ce2-141a-4229-be64-48dc72ee9d6a" (UID: "74fc5ce2-141a-4229-be64-48dc72ee9d6a"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:30:32.039889 kubelet[3033]: I1002 19:30:32.038608 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-hostproc" (OuterVolumeSpecName: "hostproc") pod "74fc5ce2-141a-4229-be64-48dc72ee9d6a" (UID: "74fc5ce2-141a-4229-be64-48dc72ee9d6a"). InnerVolumeSpecName "hostproc". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:30:32.039889 kubelet[3033]: I1002 19:30:32.038662 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-cilium-run" (OuterVolumeSpecName: "cilium-run") pod "74fc5ce2-141a-4229-be64-48dc72ee9d6a" (UID: "74fc5ce2-141a-4229-be64-48dc72ee9d6a"). InnerVolumeSpecName "cilium-run". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:30:32.039889 kubelet[3033]: I1002 19:30:32.039141 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-host-proc-sys-net" (OuterVolumeSpecName: "host-proc-sys-net") pod "74fc5ce2-141a-4229-be64-48dc72ee9d6a" (UID: "74fc5ce2-141a-4229-be64-48dc72ee9d6a"). InnerVolumeSpecName "host-proc-sys-net". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:30:32.041903 kubelet[3033]: I1002 19:30:32.041826 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-etc-cni-netd" (OuterVolumeSpecName: "etc-cni-netd") pod "74fc5ce2-141a-4229-be64-48dc72ee9d6a" (UID: "74fc5ce2-141a-4229-be64-48dc72ee9d6a"). InnerVolumeSpecName "etc-cni-netd". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:30:32.044481 kubelet[3033]: I1002 19:30:32.044417 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/74fc5ce2-141a-4229-be64-48dc72ee9d6a-cilium-config-path" (OuterVolumeSpecName: "cilium-config-path") pod "74fc5ce2-141a-4229-be64-48dc72ee9d6a" (UID: "74fc5ce2-141a-4229-be64-48dc72ee9d6a"). InnerVolumeSpecName "cilium-config-path". PluginName "kubernetes.io/configmap", VolumeGidValue "" Oct 2 19:30:32.044639 kubelet[3033]: I1002 19:30:32.044571 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-bpf-maps" (OuterVolumeSpecName: "bpf-maps") pod "74fc5ce2-141a-4229-be64-48dc72ee9d6a" (UID: "74fc5ce2-141a-4229-be64-48dc72ee9d6a"). InnerVolumeSpecName "bpf-maps". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:30:32.044893 env[1732]: time="2023-10-02T19:30:32.044838418Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:30:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3987 runtime=io.containerd.runc.v2\n" Oct 2 19:30:32.051146 env[1732]: time="2023-10-02T19:30:32.050942632Z" level=info msg="StopContainer for \"ae03908b24d3aaf86ed9d1a30038b568dca37ab547848d48939dbfde048575ce\" returns successfully" Oct 2 19:30:32.052026 env[1732]: time="2023-10-02T19:30:32.051702176Z" level=info msg="StopPodSandbox for \"1758a14eddb35c3fe38a85bdfb56e839651edef90cd6879d886604119bd4dec5\"" Oct 2 19:30:32.052026 env[1732]: time="2023-10-02T19:30:32.051792176Z" level=info msg="Container to stop \"ae03908b24d3aaf86ed9d1a30038b568dca37ab547848d48939dbfde048575ce\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Oct 2 19:30:32.054723 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1758a14eddb35c3fe38a85bdfb56e839651edef90cd6879d886604119bd4dec5-shm.mount: Deactivated successfully. Oct 2 19:30:32.058433 systemd[1]: var-lib-kubelet-pods-74fc5ce2\x2d141a\x2d4229\x2dbe64\x2d48dc72ee9d6a-volumes-kubernetes.io\x7esecret-clustermesh\x2dsecrets.mount: Deactivated successfully. Oct 2 19:30:32.067761 kubelet[3033]: I1002 19:30:32.067600 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/74fc5ce2-141a-4229-be64-48dc72ee9d6a-clustermesh-secrets" (OuterVolumeSpecName: "clustermesh-secrets") pod "74fc5ce2-141a-4229-be64-48dc72ee9d6a" (UID: "74fc5ce2-141a-4229-be64-48dc72ee9d6a"). InnerVolumeSpecName "clustermesh-secrets". PluginName "kubernetes.io/secret", VolumeGidValue "" Oct 2 19:30:32.071339 kubelet[3033]: I1002 19:30:32.071215 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/74fc5ce2-141a-4229-be64-48dc72ee9d6a-kube-api-access-9xvjc" (OuterVolumeSpecName: "kube-api-access-9xvjc") pod "74fc5ce2-141a-4229-be64-48dc72ee9d6a" (UID: "74fc5ce2-141a-4229-be64-48dc72ee9d6a"). InnerVolumeSpecName "kube-api-access-9xvjc". PluginName "kubernetes.io/projected", VolumeGidValue "" Oct 2 19:30:32.075370 kubelet[3033]: I1002 19:30:32.075320 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/74fc5ce2-141a-4229-be64-48dc72ee9d6a-hubble-tls" (OuterVolumeSpecName: "hubble-tls") pod "74fc5ce2-141a-4229-be64-48dc72ee9d6a" (UID: "74fc5ce2-141a-4229-be64-48dc72ee9d6a"). InnerVolumeSpecName "hubble-tls". PluginName "kubernetes.io/projected", VolumeGidValue "" Oct 2 19:30:32.078000 audit: BPF prog-id=122 op=UNLOAD Oct 2 19:30:32.079856 systemd[1]: cri-containerd-1758a14eddb35c3fe38a85bdfb56e839651edef90cd6879d886604119bd4dec5.scope: Deactivated successfully. Oct 2 19:30:32.083000 audit: BPF prog-id=125 op=UNLOAD Oct 2 19:30:32.095225 kubelet[3033]: I1002 19:30:32.092958 3033 scope.go:117] "RemoveContainer" containerID="00052e2b65a006661dc7eec9c1dbf61a6264f2f7fa87e16396fdf85109876f8e" Oct 2 19:30:32.101008 env[1732]: time="2023-10-02T19:30:32.100952661Z" level=info msg="RemoveContainer for \"00052e2b65a006661dc7eec9c1dbf61a6264f2f7fa87e16396fdf85109876f8e\"" Oct 2 19:30:32.106236 env[1732]: time="2023-10-02T19:30:32.106171522Z" level=info msg="RemoveContainer for \"00052e2b65a006661dc7eec9c1dbf61a6264f2f7fa87e16396fdf85109876f8e\" returns successfully" Oct 2 19:30:32.107927 systemd[1]: Removed slice kubepods-burstable-pod74fc5ce2_141a_4229_be64_48dc72ee9d6a.slice. Oct 2 19:30:32.138730 kubelet[3033]: I1002 19:30:32.137955 3033 reconciler_common.go:300] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-xtables-lock\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:30:32.138730 kubelet[3033]: I1002 19:30:32.138015 3033 reconciler_common.go:300] "Volume detached for volume \"cilium-cgroup\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-cilium-cgroup\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:30:32.138730 kubelet[3033]: I1002 19:30:32.138044 3033 reconciler_common.go:300] "Volume detached for volume \"clustermesh-secrets\" (UniqueName: \"kubernetes.io/secret/74fc5ce2-141a-4229-be64-48dc72ee9d6a-clustermesh-secrets\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:30:32.138730 kubelet[3033]: I1002 19:30:32.138070 3033 reconciler_common.go:300] "Volume detached for volume \"hostproc\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-hostproc\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:30:32.138730 kubelet[3033]: I1002 19:30:32.138094 3033 reconciler_common.go:300] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-lib-modules\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:30:32.138730 kubelet[3033]: I1002 19:30:32.138119 3033 reconciler_common.go:300] "Volume detached for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/74fc5ce2-141a-4229-be64-48dc72ee9d6a-cilium-config-path\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:30:32.138730 kubelet[3033]: I1002 19:30:32.138143 3033 reconciler_common.go:300] "Volume detached for volume \"host-proc-sys-net\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-host-proc-sys-net\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:30:32.138730 kubelet[3033]: I1002 19:30:32.138169 3033 reconciler_common.go:300] "Volume detached for volume \"etc-cni-netd\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-etc-cni-netd\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:30:32.138730 kubelet[3033]: I1002 19:30:32.138192 3033 reconciler_common.go:300] "Volume detached for volume \"hubble-tls\" (UniqueName: \"kubernetes.io/projected/74fc5ce2-141a-4229-be64-48dc72ee9d6a-hubble-tls\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:30:32.138730 kubelet[3033]: I1002 19:30:32.138219 3033 reconciler_common.go:300] "Volume detached for volume \"cilium-run\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-cilium-run\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:30:32.138730 kubelet[3033]: I1002 19:30:32.138242 3033 reconciler_common.go:300] "Volume detached for volume \"bpf-maps\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-bpf-maps\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:30:32.138730 kubelet[3033]: I1002 19:30:32.138268 3033 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-9xvjc\" (UniqueName: \"kubernetes.io/projected/74fc5ce2-141a-4229-be64-48dc72ee9d6a-kube-api-access-9xvjc\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:30:32.138730 kubelet[3033]: I1002 19:30:32.138294 3033 reconciler_common.go:300] "Volume detached for volume \"host-proc-sys-kernel\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-host-proc-sys-kernel\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:30:32.138730 kubelet[3033]: I1002 19:30:32.138318 3033 reconciler_common.go:300] "Volume detached for volume \"cni-path\" (UniqueName: \"kubernetes.io/host-path/74fc5ce2-141a-4229-be64-48dc72ee9d6a-cni-path\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:30:32.180271 env[1732]: time="2023-10-02T19:30:32.180098616Z" level=info msg="shim disconnected" id=1758a14eddb35c3fe38a85bdfb56e839651edef90cd6879d886604119bd4dec5 Oct 2 19:30:32.180271 env[1732]: time="2023-10-02T19:30:32.180177996Z" level=warning msg="cleaning up after shim disconnected" id=1758a14eddb35c3fe38a85bdfb56e839651edef90cd6879d886604119bd4dec5 namespace=k8s.io Oct 2 19:30:32.180271 env[1732]: time="2023-10-02T19:30:32.180200652Z" level=info msg="cleaning up dead shim" Oct 2 19:30:32.208165 env[1732]: time="2023-10-02T19:30:32.208086929Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:30:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4029 runtime=io.containerd.runc.v2\n" Oct 2 19:30:32.208736 env[1732]: time="2023-10-02T19:30:32.208650272Z" level=info msg="TearDown network for sandbox \"1758a14eddb35c3fe38a85bdfb56e839651edef90cd6879d886604119bd4dec5\" successfully" Oct 2 19:30:32.208861 env[1732]: time="2023-10-02T19:30:32.208734512Z" level=info msg="StopPodSandbox for \"1758a14eddb35c3fe38a85bdfb56e839651edef90cd6879d886604119bd4dec5\" returns successfully" Oct 2 19:30:32.238524 kubelet[3033]: I1002 19:30:32.238477 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/2e8cd754-25e0-40bb-828c-751ddf3559bc-cilium-config-path\") pod \"2e8cd754-25e0-40bb-828c-751ddf3559bc\" (UID: \"2e8cd754-25e0-40bb-828c-751ddf3559bc\") " Oct 2 19:30:32.238783 kubelet[3033]: I1002 19:30:32.238558 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-bn8fj\" (UniqueName: \"kubernetes.io/projected/2e8cd754-25e0-40bb-828c-751ddf3559bc-kube-api-access-bn8fj\") pod \"2e8cd754-25e0-40bb-828c-751ddf3559bc\" (UID: \"2e8cd754-25e0-40bb-828c-751ddf3559bc\") " Oct 2 19:30:32.247200 kubelet[3033]: I1002 19:30:32.247148 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/2e8cd754-25e0-40bb-828c-751ddf3559bc-cilium-config-path" (OuterVolumeSpecName: "cilium-config-path") pod "2e8cd754-25e0-40bb-828c-751ddf3559bc" (UID: "2e8cd754-25e0-40bb-828c-751ddf3559bc"). InnerVolumeSpecName "cilium-config-path". PluginName "kubernetes.io/configmap", VolumeGidValue "" Oct 2 19:30:32.247654 kubelet[3033]: I1002 19:30:32.247594 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/2e8cd754-25e0-40bb-828c-751ddf3559bc-kube-api-access-bn8fj" (OuterVolumeSpecName: "kube-api-access-bn8fj") pod "2e8cd754-25e0-40bb-828c-751ddf3559bc" (UID: "2e8cd754-25e0-40bb-828c-751ddf3559bc"). InnerVolumeSpecName "kube-api-access-bn8fj". PluginName "kubernetes.io/projected", VolumeGidValue "" Oct 2 19:30:32.339718 kubelet[3033]: I1002 19:30:32.339655 3033 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-bn8fj\" (UniqueName: \"kubernetes.io/projected/2e8cd754-25e0-40bb-828c-751ddf3559bc-kube-api-access-bn8fj\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:30:32.339974 kubelet[3033]: I1002 19:30:32.339948 3033 reconciler_common.go:300] "Volume detached for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/2e8cd754-25e0-40bb-828c-751ddf3559bc-cilium-config-path\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:30:32.796638 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1758a14eddb35c3fe38a85bdfb56e839651edef90cd6879d886604119bd4dec5-rootfs.mount: Deactivated successfully. Oct 2 19:30:32.796855 systemd[1]: var-lib-kubelet-pods-2e8cd754\x2d25e0\x2d40bb\x2d828c\x2d751ddf3559bc-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dbn8fj.mount: Deactivated successfully. Oct 2 19:30:32.797024 systemd[1]: var-lib-kubelet-pods-74fc5ce2\x2d141a\x2d4229\x2dbe64\x2d48dc72ee9d6a-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d9xvjc.mount: Deactivated successfully. Oct 2 19:30:32.797161 systemd[1]: var-lib-kubelet-pods-74fc5ce2\x2d141a\x2d4229\x2dbe64\x2d48dc72ee9d6a-volumes-kubernetes.io\x7eprojected-hubble\x2dtls.mount: Deactivated successfully. Oct 2 19:30:33.118003 kubelet[3033]: I1002 19:30:33.117191 3033 scope.go:117] "RemoveContainer" containerID="ae03908b24d3aaf86ed9d1a30038b568dca37ab547848d48939dbfde048575ce" Oct 2 19:30:33.138322 systemd[1]: Removed slice kubepods-besteffort-pod2e8cd754_25e0_40bb_828c_751ddf3559bc.slice. Oct 2 19:30:33.141314 env[1732]: time="2023-10-02T19:30:33.141240590Z" level=info msg="RemoveContainer for \"ae03908b24d3aaf86ed9d1a30038b568dca37ab547848d48939dbfde048575ce\"" Oct 2 19:30:33.147408 env[1732]: time="2023-10-02T19:30:33.147326779Z" level=info msg="RemoveContainer for \"ae03908b24d3aaf86ed9d1a30038b568dca37ab547848d48939dbfde048575ce\" returns successfully" Oct 2 19:30:33.301020 kubelet[3033]: I1002 19:30:33.300954 3033 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="2e8cd754-25e0-40bb-828c-751ddf3559bc" path="/var/lib/kubelet/pods/2e8cd754-25e0-40bb-828c-751ddf3559bc/volumes" Oct 2 19:30:33.302588 kubelet[3033]: I1002 19:30:33.302540 3033 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" path="/var/lib/kubelet/pods/74fc5ce2-141a-4229-be64-48dc72ee9d6a/volumes" Oct 2 19:30:33.756366 sshd[3930]: pam_unix(sshd:session): session closed for user core Oct 2 19:30:33.760933 kernel: kauditd_printk_skb: 27 callbacks suppressed Oct 2 19:30:33.761099 kernel: audit: type=1106 audit(1696275033.757:1375): pid=3930 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:33.757000 audit[3930]: USER_END pid=3930 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:33.772930 systemd[1]: sshd@28-172.31.27.184:22-139.178.89.65:35944.service: Deactivated successfully. Oct 2 19:30:33.757000 audit[3930]: CRED_DISP pid=3930 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:33.774234 systemd[1]: session-29.scope: Deactivated successfully. Oct 2 19:30:33.783767 kernel: audit: type=1104 audit(1696275033.757:1376): pid=3930 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:33.774578 systemd[1]: session-29.scope: Consumed 1.830s CPU time. Oct 2 19:30:33.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.27.184:22-139.178.89.65:35944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:33.784919 systemd-logind[1722]: Session 29 logged out. Waiting for processes to exit. Oct 2 19:30:33.797208 systemd[1]: Started sshd@29-172.31.27.184:22-139.178.89.65:35950.service. Oct 2 19:30:33.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.27.184:22-139.178.89.65:35950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:33.798885 kernel: audit: type=1131 audit(1696275033.771:1377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.27.184:22-139.178.89.65:35944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:33.809327 systemd-logind[1722]: Removed session 29. Oct 2 19:30:33.810797 kernel: audit: type=1130 audit(1696275033.796:1378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.27.184:22-139.178.89.65:35950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:30:33.989330 sshd[4046]: Accepted publickey for core from 139.178.89.65 port 35950 ssh2: RSA SHA256:UWiPcUSyDphe9v2WN1dtuuOFHMYWuZ3ahwMZ2IbYxYo Oct 2 19:30:33.987000 audit[4046]: USER_ACCT pid=4046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:33.999000 audit[4046]: CRED_ACQ pid=4046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:34.010728 kernel: audit: type=1101 audit(1696275033.987:1379): pid=4046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:34.010891 kernel: audit: type=1103 audit(1696275033.999:1380): pid=4046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:34.001210 sshd[4046]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:30:34.017753 kernel: audit: type=1006 audit(1696275033.999:1381): pid=4046 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Oct 2 19:30:33.999000 audit[4046]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8f9fcd0 a2=3 a3=1 items=0 ppid=1 pid=4046 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:34.028535 kernel: audit: type=1300 audit(1696275033.999:1381): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8f9fcd0 a2=3 a3=1 items=0 ppid=1 pid=4046 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:34.026020 systemd[1]: Started session-30.scope. Oct 2 19:30:34.027774 systemd-logind[1722]: New session 30 of user core. Oct 2 19:30:33.999000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:30:34.032783 kernel: audit: type=1327 audit(1696275033.999:1381): proctitle=737368643A20636F7265205B707269765D Oct 2 19:30:34.039000 audit[4046]: USER_START pid=4046 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:34.046000 audit[4051]: CRED_ACQ pid=4051 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:34.053780 kernel: audit: type=1105 audit(1696275034.039:1382): pid=4046 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:30:36.627035 kubelet[3033]: E1002 19:30:36.626991 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:30:36.954202 kubelet[3033]: I1002 19:30:36.954157 3033 topology_manager.go:215] "Topology Admit Handler" podUID="41762a2a-500d-4f38-a454-4440bd9f5322" podNamespace="kube-system" podName="cilium-lcdw6" Oct 2 19:30:36.954572 kubelet[3033]: E1002 19:30:36.954545 3033 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" containerName="mount-cgroup" Oct 2 19:30:36.954759 kubelet[3033]: E1002 19:30:36.954736 3033 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" containerName="mount-cgroup" Oct 2 19:30:36.954933 kubelet[3033]: E1002 19:30:36.954912 3033 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" containerName="mount-cgroup" Oct 2 19:30:36.955075 kubelet[3033]: E1002 19:30:36.955055 3033 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="2e8cd754-25e0-40bb-828c-751ddf3559bc" containerName="cilium-operator" Oct 2 19:30:36.955203 kubelet[3033]: E1002 19:30:36.955183 3033 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" containerName="mount-cgroup" Oct 2 19:30:36.955338 kubelet[3033]: E1002 19:30:36.955318 3033 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" containerName="mount-cgroup" Oct 2 19:30:36.955493 kubelet[3033]: I1002 19:30:36.955473 3033 memory_manager.go:346] "RemoveStaleState removing state" podUID="2e8cd754-25e0-40bb-828c-751ddf3559bc" containerName="cilium-operator" Oct 2 19:30:36.955629 kubelet[3033]: I1002 19:30:36.955609 3033 memory_manager.go:346] "RemoveStaleState removing state" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" containerName="mount-cgroup" Oct 2 19:30:36.955807 kubelet[3033]: I1002 19:30:36.955787 3033 memory_manager.go:346] "RemoveStaleState removing state" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" containerName="mount-cgroup" Oct 2 19:30:36.955938 kubelet[3033]: I1002 19:30:36.955918 3033 memory_manager.go:346] "RemoveStaleState removing state" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" containerName="mount-cgroup" Oct 2 19:30:36.956071 kubelet[3033]: I1002 19:30:36.956052 3033 memory_manager.go:346] "RemoveStaleState removing state" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" containerName="mount-cgroup" Oct 2 19:30:36.956210 kubelet[3033]: I1002 19:30:36.956187 3033 memory_manager.go:346] "RemoveStaleState removing state" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" containerName="mount-cgroup" Oct 2 19:30:36.956365 kubelet[3033]: E1002 19:30:36.956345 3033 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" containerName="mount-cgroup" Oct 2 19:30:36.956511 kubelet[3033]: I1002 19:30:36.956490 3033 memory_manager.go:346] "RemoveStaleState removing state" podUID="74fc5ce2-141a-4229-be64-48dc72ee9d6a" containerName="mount-cgroup" Oct 2 19:30:36.970428 systemd[1]: Created slice kubepods-burstable-pod41762a2a_500d_4f38_a454_4440bd9f5322.slice. Oct 2 19:30:36.982822 kubelet[3033]: W1002 19:30:36.982760 3033 reflector.go:535] object-"kube-system"/"cilium-clustermesh": failed to list *v1.Secret: secrets "cilium-clustermesh" is forbidden: User "system:node:ip-172-31-27-184" cannot list resource "secrets" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-27-184' and this object Oct 2 19:30:36.983075 kubelet[3033]: E1002 19:30:36.983050 3033 reflector.go:147] object-"kube-system"/"cilium-clustermesh": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "cilium-clustermesh" is forbidden: User "system:node:ip-172-31-27-184" cannot list resource "secrets" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-27-184' and this object Oct 2 19:30:36.983411 kubelet[3033]: W1002 19:30:36.983362 3033 reflector.go:535] object-"kube-system"/"cilium-ipsec-keys": failed to list *v1.Secret: secrets "cilium-ipsec-keys" is forbidden: User "system:node:ip-172-31-27-184" cannot list resource "secrets" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-27-184' and this object Oct 2 19:30:36.983619 kubelet[3033]: E1002 19:30:36.983596 3033 reflector.go:147] object-"kube-system"/"cilium-ipsec-keys": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "cilium-ipsec-keys" is forbidden: User "system:node:ip-172-31-27-184" cannot list resource "secrets" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-27-184' and this object Oct 2 19:30:37.066556 kubelet[3033]: I1002 19:30:37.065606 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"bpf-maps\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-bpf-maps\") pod \"cilium-lcdw6\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " pod="kube-system/cilium-lcdw6" Oct 2 19:30:37.066556 kubelet[3033]: I1002 19:30:37.065701 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/41762a2a-500d-4f38-a454-4440bd9f5322-cilium-config-path\") pod \"cilium-lcdw6\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " pod="kube-system/cilium-lcdw6" Oct 2 19:30:37.066556 kubelet[3033]: I1002 19:30:37.065751 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-szbsk\" (UniqueName: \"kubernetes.io/projected/41762a2a-500d-4f38-a454-4440bd9f5322-kube-api-access-szbsk\") pod \"cilium-lcdw6\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " pod="kube-system/cilium-lcdw6" Oct 2 19:30:37.066556 kubelet[3033]: I1002 19:30:37.065805 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-lib-modules\") pod \"cilium-lcdw6\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " pod="kube-system/cilium-lcdw6" Oct 2 19:30:37.066556 kubelet[3033]: I1002 19:30:37.065849 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-xtables-lock\") pod \"cilium-lcdw6\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " pod="kube-system/cilium-lcdw6" Oct 2 19:30:37.066556 kubelet[3033]: I1002 19:30:37.065894 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"clustermesh-secrets\" (UniqueName: \"kubernetes.io/secret/41762a2a-500d-4f38-a454-4440bd9f5322-clustermesh-secrets\") pod \"cilium-lcdw6\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " pod="kube-system/cilium-lcdw6" Oct 2 19:30:37.066556 kubelet[3033]: I1002 19:30:37.065936 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"host-proc-sys-net\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-host-proc-sys-net\") pod \"cilium-lcdw6\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " pod="kube-system/cilium-lcdw6" Oct 2 19:30:37.066556 kubelet[3033]: I1002 19:30:37.065985 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-cgroup\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-cilium-cgroup\") pod \"cilium-lcdw6\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " pod="kube-system/cilium-lcdw6" Oct 2 19:30:37.066556 kubelet[3033]: I1002 19:30:37.066037 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-ipsec-secrets\" (UniqueName: \"kubernetes.io/secret/41762a2a-500d-4f38-a454-4440bd9f5322-cilium-ipsec-secrets\") pod \"cilium-lcdw6\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " pod="kube-system/cilium-lcdw6" Oct 2 19:30:37.066556 kubelet[3033]: I1002 19:30:37.066105 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"host-proc-sys-kernel\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-host-proc-sys-kernel\") pod \"cilium-lcdw6\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " pod="kube-system/cilium-lcdw6" Oct 2 19:30:37.066556 kubelet[3033]: I1002 19:30:37.066162 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"hostproc\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-hostproc\") pod \"cilium-lcdw6\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " pod="kube-system/cilium-lcdw6" Oct 2 19:30:37.066556 kubelet[3033]: I1002 19:30:37.066222 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etc-cni-netd\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-etc-cni-netd\") pod \"cilium-lcdw6\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " pod="kube-system/cilium-lcdw6" Oct 2 19:30:37.066556 kubelet[3033]: I1002 19:30:37.066267 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"hubble-tls\" (UniqueName: \"kubernetes.io/projected/41762a2a-500d-4f38-a454-4440bd9f5322-hubble-tls\") pod \"cilium-lcdw6\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " pod="kube-system/cilium-lcdw6" Oct 2 19:30:37.066556 kubelet[3033]: I1002 19:30:37.066314 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cilium-run\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-cilium-run\") pod \"cilium-lcdw6\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " pod="kube-system/cilium-lcdw6" Oct 2 19:30:37.066556 kubelet[3033]: I1002 19:30:37.066360 3033 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-path\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-cni-path\") pod \"cilium-lcdw6\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " pod="kube-system/cilium-lcdw6" Oct 2 19:30:38.169261 kubelet[3033]: E1002 19:30:38.169197 3033 secret.go:194] Couldn't get secret kube-system/cilium-ipsec-keys: failed to sync secret cache: timed out waiting for the condition Oct 2 19:30:38.169886 kubelet[3033]: E1002 19:30:38.169341 3033 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/41762a2a-500d-4f38-a454-4440bd9f5322-cilium-ipsec-secrets podName:41762a2a-500d-4f38-a454-4440bd9f5322 nodeName:}" failed. No retries permitted until 2023-10-02 19:30:38.669306943 +0000 UTC m=+257.893564655 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "cilium-ipsec-secrets" (UniqueName: "kubernetes.io/secret/41762a2a-500d-4f38-a454-4440bd9f5322-cilium-ipsec-secrets") pod "cilium-lcdw6" (UID: "41762a2a-500d-4f38-a454-4440bd9f5322") : failed to sync secret cache: timed out waiting for the condition Oct 2 19:30:38.776722 env[1732]: time="2023-10-02T19:30:38.776192089Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:cilium-lcdw6,Uid:41762a2a-500d-4f38-a454-4440bd9f5322,Namespace:kube-system,Attempt:0,}" Oct 2 19:30:38.821331 env[1732]: time="2023-10-02T19:30:38.821198886Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:30:38.821638 env[1732]: time="2023-10-02T19:30:38.821560435Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:30:38.821892 env[1732]: time="2023-10-02T19:30:38.821828888Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:30:38.826028 env[1732]: time="2023-10-02T19:30:38.825927987Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/51733cc2201c245485d4a8ea72ff1c79845954a6b6c395fc773145b33ab01a0b pid=4070 runtime=io.containerd.runc.v2 Oct 2 19:30:38.891571 systemd[1]: Started cri-containerd-51733cc2201c245485d4a8ea72ff1c79845954a6b6c395fc773145b33ab01a0b.scope. Oct 2 19:30:38.909116 systemd[1]: run-containerd-runc-k8s.io-51733cc2201c245485d4a8ea72ff1c79845954a6b6c395fc773145b33ab01a0b-runc.yzZnNu.mount: Deactivated successfully. Oct 2 19:30:38.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.953011 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:30:38.953112 kernel: audit: type=1400 audit(1696275038.948:1384): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.968960 kernel: audit: type=1400 audit(1696275038.948:1385): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.976632 kernel: audit: type=1400 audit(1696275038.948:1386): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.984640 kernel: audit: type=1400 audit(1696275038.948:1387): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.992569 kernel: audit: type=1400 audit(1696275038.948:1388): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:39.000713 kernel: audit: type=1400 audit(1696275038.948:1389): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:39.011240 kernel: audit: type=1400 audit(1696275038.948:1390): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:39.027789 kernel: audit: type=1400 audit(1696275038.948:1391): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:39.027898 kernel: audit: type=1400 audit(1696275038.948:1392): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.948000 audit: BPF prog-id=134 op=LOAD Oct 2 19:30:38.958000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.958000 audit[4079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=4070 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:38.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531373333636332323031633234353438356434613865613732666631 Oct 2 19:30:38.958000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.958000 audit[4079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=4070 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:38.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531373333636332323031633234353438356434613865613732666631 Oct 2 19:30:39.037773 kernel: audit: type=1400 audit(1696275038.948:1393): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit: BPF prog-id=135 op=LOAD Oct 2 19:30:38.959000 audit[4079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=4070 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:38.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531373333636332323031633234353438356434613865613732666631 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit: BPF prog-id=136 op=LOAD Oct 2 19:30:38.959000 audit[4079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=4070 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:38.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531373333636332323031633234353438356434613865613732666631 Oct 2 19:30:38.959000 audit: BPF prog-id=136 op=UNLOAD Oct 2 19:30:38.959000 audit: BPF prog-id=135 op=UNLOAD Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:30:38.959000 audit: BPF prog-id=137 op=LOAD Oct 2 19:30:38.959000 audit[4079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=4070 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:30:38.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531373333636332323031633234353438356434613865613732666631 Oct 2 19:30:39.057368 env[1732]: time="2023-10-02T19:30:39.057312745Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:cilium-lcdw6,Uid:41762a2a-500d-4f38-a454-4440bd9f5322,Namespace:kube-system,Attempt:0,} returns sandbox id \"51733cc2201c245485d4a8ea72ff1c79845954a6b6c395fc773145b33ab01a0b\"" Oct 2 19:30:39.067229 env[1732]: time="2023-10-02T19:30:39.067154170Z" level=info msg="CreateContainer within sandbox \"51733cc2201c245485d4a8ea72ff1c79845954a6b6c395fc773145b33ab01a0b\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:0,}" Oct 2 19:30:39.088082 env[1732]: time="2023-10-02T19:30:39.087993969Z" level=info msg="CreateContainer within sandbox \"51733cc2201c245485d4a8ea72ff1c79845954a6b6c395fc773145b33ab01a0b\" for &ContainerMetadata{Name:mount-cgroup,Attempt:0,} returns container id \"8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77\"" Oct 2 19:30:39.089214 env[1732]: time="2023-10-02T19:30:39.089161875Z" level=info msg="StartContainer for \"8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77\"" Oct 2 19:30:39.134288 systemd[1]: Started cri-containerd-8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77.scope. Oct 2 19:30:39.175199 systemd[1]: cri-containerd-8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77.scope: Deactivated successfully. Oct 2 19:30:39.214889 env[1732]: time="2023-10-02T19:30:39.214821459Z" level=info msg="shim disconnected" id=8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77 Oct 2 19:30:39.215368 env[1732]: time="2023-10-02T19:30:39.215318982Z" level=warning msg="cleaning up after shim disconnected" id=8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77 namespace=k8s.io Oct 2 19:30:39.215520 env[1732]: time="2023-10-02T19:30:39.215491518Z" level=info msg="cleaning up dead shim" Oct 2 19:30:39.242888 env[1732]: time="2023-10-02T19:30:39.242821392Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:30:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4127 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:30:39Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:30:39.243574 env[1732]: time="2023-10-02T19:30:39.243497715Z" level=error msg="copy shim log" error="read /proc/self/fd/44: file already closed" Oct 2 19:30:39.245186 env[1732]: time="2023-10-02T19:30:39.244333459Z" level=error msg="Failed to pipe stderr of container \"8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77\"" error="reading from a closed fifo" Oct 2 19:30:39.245404 env[1732]: time="2023-10-02T19:30:39.244771701Z" level=error msg="Failed to pipe stdout of container \"8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77\"" error="reading from a closed fifo" Oct 2 19:30:39.247086 env[1732]: time="2023-10-02T19:30:39.247025299Z" level=error msg="StartContainer for \"8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:30:39.247574 kubelet[3033]: E1002 19:30:39.247521 3033 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77" Oct 2 19:30:39.248386 kubelet[3033]: E1002 19:30:39.247705 3033 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:30:39.248386 kubelet[3033]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:30:39.248386 kubelet[3033]: rm /hostbin/cilium-mount Oct 2 19:30:39.248386 kubelet[3033]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-szbsk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-lcdw6_kube-system(41762a2a-500d-4f38-a454-4440bd9f5322): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:30:39.248386 kubelet[3033]: E1002 19:30:39.247768 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-lcdw6" podUID="41762a2a-500d-4f38-a454-4440bd9f5322" Oct 2 19:30:40.152889 env[1732]: time="2023-10-02T19:30:40.152815297Z" level=info msg="CreateContainer within sandbox \"51733cc2201c245485d4a8ea72ff1c79845954a6b6c395fc773145b33ab01a0b\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:1,}" Oct 2 19:30:40.180072 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4156164579.mount: Deactivated successfully. Oct 2 19:30:40.187003 env[1732]: time="2023-10-02T19:30:40.186943044Z" level=info msg="CreateContainer within sandbox \"51733cc2201c245485d4a8ea72ff1c79845954a6b6c395fc773145b33ab01a0b\" for &ContainerMetadata{Name:mount-cgroup,Attempt:1,} returns container id \"ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3\"" Oct 2 19:30:40.189605 env[1732]: time="2023-10-02T19:30:40.189546984Z" level=info msg="StartContainer for \"ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3\"" Oct 2 19:30:40.250903 systemd[1]: Started cri-containerd-ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3.scope. Oct 2 19:30:40.286405 systemd[1]: cri-containerd-ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3.scope: Deactivated successfully. Oct 2 19:30:40.319764 env[1732]: time="2023-10-02T19:30:40.319652452Z" level=info msg="shim disconnected" id=ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3 Oct 2 19:30:40.320062 env[1732]: time="2023-10-02T19:30:40.319782640Z" level=warning msg="cleaning up after shim disconnected" id=ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3 namespace=k8s.io Oct 2 19:30:40.320062 env[1732]: time="2023-10-02T19:30:40.319806004Z" level=info msg="cleaning up dead shim" Oct 2 19:30:40.358729 env[1732]: time="2023-10-02T19:30:40.358587781Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:30:40Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4167 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:30:40Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:30:40.359260 env[1732]: time="2023-10-02T19:30:40.359160219Z" level=error msg="copy shim log" error="read /proc/self/fd/44: file already closed" Oct 2 19:30:40.362818 env[1732]: time="2023-10-02T19:30:40.362751920Z" level=error msg="Failed to pipe stdout of container \"ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3\"" error="reading from a closed fifo" Oct 2 19:30:40.363414 env[1732]: time="2023-10-02T19:30:40.363014241Z" level=error msg="Failed to pipe stderr of container \"ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3\"" error="reading from a closed fifo" Oct 2 19:30:40.365425 env[1732]: time="2023-10-02T19:30:40.365352619Z" level=error msg="StartContainer for \"ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:30:40.365991 kubelet[3033]: E1002 19:30:40.365949 3033 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3" Oct 2 19:30:40.366600 kubelet[3033]: E1002 19:30:40.366104 3033 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:30:40.366600 kubelet[3033]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:30:40.366600 kubelet[3033]: rm /hostbin/cilium-mount Oct 2 19:30:40.366600 kubelet[3033]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-szbsk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-lcdw6_kube-system(41762a2a-500d-4f38-a454-4440bd9f5322): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:30:40.366600 kubelet[3033]: E1002 19:30:40.366189 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-lcdw6" podUID="41762a2a-500d-4f38-a454-4440bd9f5322" Oct 2 19:30:40.686137 systemd[1]: run-containerd-runc-k8s.io-ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3-runc.1NjSuv.mount: Deactivated successfully. Oct 2 19:30:40.686316 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3-rootfs.mount: Deactivated successfully. Oct 2 19:30:41.152450 kubelet[3033]: I1002 19:30:41.152414 3033 scope.go:117] "RemoveContainer" containerID="8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77" Oct 2 19:30:41.153363 kubelet[3033]: I1002 19:30:41.153329 3033 scope.go:117] "RemoveContainer" containerID="8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77" Oct 2 19:30:41.158209 env[1732]: time="2023-10-02T19:30:41.158130914Z" level=info msg="RemoveContainer for \"8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77\"" Oct 2 19:30:41.171720 env[1732]: time="2023-10-02T19:30:41.163332302Z" level=info msg="RemoveContainer for \"8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77\"" Oct 2 19:30:41.171720 env[1732]: time="2023-10-02T19:30:41.163465226Z" level=error msg="RemoveContainer for \"8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77\" failed" error="rpc error: code = NotFound desc = get container info: container \"8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77\" in namespace \"k8s.io\": not found" Oct 2 19:30:41.172023 kubelet[3033]: E1002 19:30:41.164377 3033 remote_runtime.go:385] "RemoveContainer from runtime service failed" err="rpc error: code = NotFound desc = get container info: container \"8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77\" in namespace \"k8s.io\": not found" containerID="8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77" Oct 2 19:30:41.172023 kubelet[3033]: E1002 19:30:41.164454 3033 kuberuntime_container.go:820] failed to remove pod init container "mount-cgroup": rpc error: code = NotFound desc = get container info: container "8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77" in namespace "k8s.io": not found; Skipping pod "cilium-lcdw6_kube-system(41762a2a-500d-4f38-a454-4440bd9f5322)" Oct 2 19:30:41.172023 kubelet[3033]: E1002 19:30:41.165135 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 10s restarting failed container=mount-cgroup pod=cilium-lcdw6_kube-system(41762a2a-500d-4f38-a454-4440bd9f5322)\"" pod="kube-system/cilium-lcdw6" podUID="41762a2a-500d-4f38-a454-4440bd9f5322" Oct 2 19:30:41.174736 env[1732]: time="2023-10-02T19:30:41.174619481Z" level=info msg="RemoveContainer for \"8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77\" returns successfully" Oct 2 19:30:41.629490 kubelet[3033]: E1002 19:30:41.629448 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:30:42.158335 kubelet[3033]: E1002 19:30:42.158296 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 10s restarting failed container=mount-cgroup pod=cilium-lcdw6_kube-system(41762a2a-500d-4f38-a454-4440bd9f5322)\"" pod="kube-system/cilium-lcdw6" podUID="41762a2a-500d-4f38-a454-4440bd9f5322" Oct 2 19:30:42.321917 kubelet[3033]: W1002 19:30:42.321855 3033 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod41762a2a_500d_4f38_a454_4440bd9f5322.slice/cri-containerd-8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77.scope WatchSource:0}: container "8bf475cdf0e73d9cfd3f68a6f994674f4d8533279b4cc3c873200fa4abb40e77" in namespace "k8s.io": not found Oct 2 19:30:45.431202 kubelet[3033]: W1002 19:30:45.431150 3033 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod41762a2a_500d_4f38_a454_4440bd9f5322.slice/cri-containerd-ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3.scope WatchSource:0}: task ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3 not found: not found Oct 2 19:30:46.631445 kubelet[3033]: E1002 19:30:46.631401 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:30:51.633028 kubelet[3033]: E1002 19:30:51.632977 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:30:54.299606 env[1732]: time="2023-10-02T19:30:54.299541034Z" level=info msg="CreateContainer within sandbox \"51733cc2201c245485d4a8ea72ff1c79845954a6b6c395fc773145b33ab01a0b\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:2,}" Oct 2 19:30:54.318375 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3432967610.mount: Deactivated successfully. Oct 2 19:30:54.327201 env[1732]: time="2023-10-02T19:30:54.327126302Z" level=info msg="CreateContainer within sandbox \"51733cc2201c245485d4a8ea72ff1c79845954a6b6c395fc773145b33ab01a0b\" for &ContainerMetadata{Name:mount-cgroup,Attempt:2,} returns container id \"cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf\"" Oct 2 19:30:54.329998 env[1732]: time="2023-10-02T19:30:54.329941813Z" level=info msg="StartContainer for \"cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf\"" Oct 2 19:30:54.390133 systemd[1]: Started cri-containerd-cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf.scope. Oct 2 19:30:54.435641 systemd[1]: cri-containerd-cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf.scope: Deactivated successfully. Oct 2 19:30:54.463509 env[1732]: time="2023-10-02T19:30:54.463441188Z" level=info msg="shim disconnected" id=cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf Oct 2 19:30:54.463995 env[1732]: time="2023-10-02T19:30:54.463940198Z" level=warning msg="cleaning up after shim disconnected" id=cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf namespace=k8s.io Oct 2 19:30:54.464163 env[1732]: time="2023-10-02T19:30:54.464135595Z" level=info msg="cleaning up dead shim" Oct 2 19:30:54.490888 env[1732]: time="2023-10-02T19:30:54.490817487Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:30:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4207 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:30:54Z\" level=warning msg=\"failed to remove runc container\" error=\"runc did not terminate successfully: exit status 255: \" runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:30:54Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:30:54.491877 env[1732]: time="2023-10-02T19:30:54.491653986Z" level=error msg="copy shim log" error="read /proc/self/fd/44: file already closed" Oct 2 19:30:54.495231 env[1732]: time="2023-10-02T19:30:54.492245744Z" level=error msg="Failed to pipe stdout of container \"cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf\"" error="reading from a closed fifo" Oct 2 19:30:54.495477 env[1732]: time="2023-10-02T19:30:54.494734878Z" level=error msg="Failed to pipe stderr of container \"cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf\"" error="reading from a closed fifo" Oct 2 19:30:54.500361 env[1732]: time="2023-10-02T19:30:54.500291633Z" level=error msg="StartContainer for \"cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:30:54.501672 kubelet[3033]: E1002 19:30:54.500890 3033 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf" Oct 2 19:30:54.502490 kubelet[3033]: E1002 19:30:54.502360 3033 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:30:54.502490 kubelet[3033]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:30:54.502490 kubelet[3033]: rm /hostbin/cilium-mount Oct 2 19:30:54.502490 kubelet[3033]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-szbsk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-lcdw6_kube-system(41762a2a-500d-4f38-a454-4440bd9f5322): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:30:54.502490 kubelet[3033]: E1002 19:30:54.502447 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-lcdw6" podUID="41762a2a-500d-4f38-a454-4440bd9f5322" Oct 2 19:30:55.191212 kubelet[3033]: I1002 19:30:55.190325 3033 scope.go:117] "RemoveContainer" containerID="ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3" Oct 2 19:30:55.191212 kubelet[3033]: I1002 19:30:55.190891 3033 scope.go:117] "RemoveContainer" containerID="ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3" Oct 2 19:30:55.193775 env[1732]: time="2023-10-02T19:30:55.193697925Z" level=info msg="RemoveContainer for \"ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3\"" Oct 2 19:30:55.194279 env[1732]: time="2023-10-02T19:30:55.194224799Z" level=info msg="RemoveContainer for \"ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3\"" Oct 2 19:30:55.194412 env[1732]: time="2023-10-02T19:30:55.194346228Z" level=error msg="RemoveContainer for \"ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3\" failed" error="failed to set removing state for container \"ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3\": container is already in removing state" Oct 2 19:30:55.194738 kubelet[3033]: E1002 19:30:55.194671 3033 remote_runtime.go:385] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3\": container is already in removing state" containerID="ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3" Oct 2 19:30:55.194956 kubelet[3033]: I1002 19:30:55.194930 3033 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3"} err="rpc error: code = Unknown desc = failed to set removing state for container \"ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3\": container is already in removing state" Oct 2 19:30:55.198309 env[1732]: time="2023-10-02T19:30:55.198240988Z" level=info msg="RemoveContainer for \"ba37c62e7df29cdf5d3f08ccbdd6a5cf47db30ee2ed61783f14b1b03cc2451c3\" returns successfully" Oct 2 19:30:55.199574 kubelet[3033]: E1002 19:30:55.199539 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 20s restarting failed container=mount-cgroup pod=cilium-lcdw6_kube-system(41762a2a-500d-4f38-a454-4440bd9f5322)\"" pod="kube-system/cilium-lcdw6" podUID="41762a2a-500d-4f38-a454-4440bd9f5322" Oct 2 19:30:55.312914 systemd[1]: run-containerd-runc-k8s.io-cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf-runc.m5c2YA.mount: Deactivated successfully. Oct 2 19:30:55.313101 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf-rootfs.mount: Deactivated successfully. Oct 2 19:30:56.634425 kubelet[3033]: E1002 19:30:56.634361 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:30:57.568361 kubelet[3033]: W1002 19:30:57.568307 3033 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod41762a2a_500d_4f38_a454_4440bd9f5322.slice/cri-containerd-cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf.scope WatchSource:0}: task cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf not found: not found Oct 2 19:31:01.635774 kubelet[3033]: E1002 19:31:01.635722 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:31:06.638532 kubelet[3033]: E1002 19:31:06.638496 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:31:07.296064 kubelet[3033]: E1002 19:31:07.295983 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 20s restarting failed container=mount-cgroup pod=cilium-lcdw6_kube-system(41762a2a-500d-4f38-a454-4440bd9f5322)\"" pod="kube-system/cilium-lcdw6" podUID="41762a2a-500d-4f38-a454-4440bd9f5322" Oct 2 19:31:11.640729 kubelet[3033]: E1002 19:31:11.640637 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:31:15.798000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:15.801582 kernel: kauditd_printk_skb: 47 callbacks suppressed Oct 2 19:31:15.801745 kernel: audit: type=1400 audit(1696275075.798:1402): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:15.798000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40001066f0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:31:15.823959 kernel: audit: type=1300 audit(1696275075.798:1402): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40001066f0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:31:15.824131 kernel: audit: type=1327 audit(1696275075.798:1402): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:31:15.798000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:31:15.814000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:15.843713 kernel: audit: type=1400 audit(1696275075.814:1403): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:15.843807 kernel: audit: type=1300 audit(1696275075.814:1403): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000fc4340 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:31:15.814000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000fc4340 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:31:15.855918 kernel: audit: type=1327 audit(1696275075.814:1403): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:31:15.814000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:31:16.642625 kubelet[3033]: E1002 19:31:16.642549 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:31:16.863000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:16.863000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:16.884719 kernel: audit: type=1400 audit(1696275076.863:1405): avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:16.884864 kernel: audit: type=1400 audit(1696275076.863:1404): avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:16.884928 kernel: audit: type=1300 audit(1696275076.863:1405): arch=c00000b7 syscall=27 success=no exit=-13 a0=52 a1=400aff54e0 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:31:16.863000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=52 a1=400aff54e0 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:31:16.863000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:31:16.907305 kernel: audit: type=1327 audit(1696275076.863:1405): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:31:16.863000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=51 a1=400d00dc20 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:31:16.863000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:31:16.863000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:16.863000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=51 a1=400d00dce0 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:31:16.863000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:31:16.873000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:16.873000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=51 a1=400cf8de90 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:31:16.873000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:31:17.043000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:17.043000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=51 a1=4008122180 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:31:17.043000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:31:17.045000 audit[2910]: AVC avc: denied { watch } for pid=2910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:17.045000 audit[2910]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=51 a1=400aff5640 a2=fc6 a3=0 items=0 ppid=2735 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c1014 key=(null) Oct 2 19:31:17.045000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313834002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:31:18.300919 env[1732]: time="2023-10-02T19:31:18.300825790Z" level=info msg="CreateContainer within sandbox \"51733cc2201c245485d4a8ea72ff1c79845954a6b6c395fc773145b33ab01a0b\" for container &ContainerMetadata{Name:mount-cgroup,Attempt:3,}" Oct 2 19:31:18.323106 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2087904885.mount: Deactivated successfully. Oct 2 19:31:18.337718 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3516561816.mount: Deactivated successfully. Oct 2 19:31:18.339302 env[1732]: time="2023-10-02T19:31:18.339229136Z" level=info msg="CreateContainer within sandbox \"51733cc2201c245485d4a8ea72ff1c79845954a6b6c395fc773145b33ab01a0b\" for &ContainerMetadata{Name:mount-cgroup,Attempt:3,} returns container id \"cabec0b4b21078a55c19ea4bbcf23f3143d49c43c9863f32784d295292af918e\"" Oct 2 19:31:18.342231 env[1732]: time="2023-10-02T19:31:18.342149670Z" level=info msg="StartContainer for \"cabec0b4b21078a55c19ea4bbcf23f3143d49c43c9863f32784d295292af918e\"" Oct 2 19:31:18.390984 systemd[1]: Started cri-containerd-cabec0b4b21078a55c19ea4bbcf23f3143d49c43c9863f32784d295292af918e.scope. Oct 2 19:31:18.430447 systemd[1]: cri-containerd-cabec0b4b21078a55c19ea4bbcf23f3143d49c43c9863f32784d295292af918e.scope: Deactivated successfully. Oct 2 19:31:18.460164 env[1732]: time="2023-10-02T19:31:18.460075689Z" level=info msg="shim disconnected" id=cabec0b4b21078a55c19ea4bbcf23f3143d49c43c9863f32784d295292af918e Oct 2 19:31:18.460164 env[1732]: time="2023-10-02T19:31:18.460156293Z" level=warning msg="cleaning up after shim disconnected" id=cabec0b4b21078a55c19ea4bbcf23f3143d49c43c9863f32784d295292af918e namespace=k8s.io Oct 2 19:31:18.460494 env[1732]: time="2023-10-02T19:31:18.460179921Z" level=info msg="cleaning up dead shim" Oct 2 19:31:18.492157 env[1732]: time="2023-10-02T19:31:18.490450444Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:31:18Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4247 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:31:18Z\" level=warning msg=\"failed to read init pid file\" error=\"open /run/containerd/io.containerd.runtime.v2.task/k8s.io/cabec0b4b21078a55c19ea4bbcf23f3143d49c43c9863f32784d295292af918e/init.pid: no such file or directory\" runtime=io.containerd.runc.v2\n" Oct 2 19:31:18.492157 env[1732]: time="2023-10-02T19:31:18.491336611Z" level=error msg="copy shim log" error="read /proc/self/fd/44: file already closed" Oct 2 19:31:18.492578 env[1732]: time="2023-10-02T19:31:18.492513815Z" level=error msg="Failed to pipe stdout of container \"cabec0b4b21078a55c19ea4bbcf23f3143d49c43c9863f32784d295292af918e\"" error="reading from a closed fifo" Oct 2 19:31:18.493523 env[1732]: time="2023-10-02T19:31:18.493378237Z" level=error msg="Failed to pipe stderr of container \"cabec0b4b21078a55c19ea4bbcf23f3143d49c43c9863f32784d295292af918e\"" error="reading from a closed fifo" Oct 2 19:31:18.495994 env[1732]: time="2023-10-02T19:31:18.495925378Z" level=error msg="StartContainer for \"cabec0b4b21078a55c19ea4bbcf23f3143d49c43c9863f32784d295292af918e\" failed" error="failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" Oct 2 19:31:18.496574 kubelet[3033]: E1002 19:31:18.496522 3033 remote_runtime.go:343] "StartContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown" containerID="cabec0b4b21078a55c19ea4bbcf23f3143d49c43c9863f32784d295292af918e" Oct 2 19:31:18.497366 kubelet[3033]: E1002 19:31:18.496843 3033 kuberuntime_manager.go:1209] init container &Container{Name:mount-cgroup,Image:quay.io/cilium/cilium:v1.12.5@sha256:06ce2b0a0a472e73334a7504ee5c5d8b2e2d7b72ef728ad94e564740dd505be5,Command:[sh -ec cp /usr/bin/cilium-mount /hostbin/cilium-mount; Oct 2 19:31:18.497366 kubelet[3033]: nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT; Oct 2 19:31:18.497366 kubelet[3033]: rm /hostbin/cilium-mount Oct 2 19:31:18.497366 kubelet[3033]: ],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:CGROUP_ROOT,Value:/run/cilium/cgroupv2,ValueFrom:nil,},EnvVar{Name:BIN_PATH,Value:/opt/cni/bin,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:hostproc,ReadOnly:false,MountPath:/hostproc,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:cni-path,ReadOnly:false,MountPath:/hostbin,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-szbsk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[SYS_ADMIN SYS_CHROOT SYS_PTRACE],Drop:[ALL],},Privileged:nil,SELinuxOptions:&SELinuxOptions{User:,Role:,Type:spc_t,Level:s0,},RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:FallbackToLogsOnError,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod cilium-lcdw6_kube-system(41762a2a-500d-4f38-a454-4440bd9f5322): RunContainerError: failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown Oct 2 19:31:18.497366 kubelet[3033]: E1002 19:31:18.496938 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with RunContainerError: \"failed to create containerd task: failed to create shim task: OCI runtime create failed: runc create failed: unable to start container process: error during container init: write /proc/self/attr/keycreate: invalid argument: unknown\"" pod="kube-system/cilium-lcdw6" podUID="41762a2a-500d-4f38-a454-4440bd9f5322" Oct 2 19:31:19.256107 kubelet[3033]: I1002 19:31:19.255944 3033 scope.go:117] "RemoveContainer" containerID="cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf" Oct 2 19:31:19.256605 kubelet[3033]: I1002 19:31:19.256400 3033 scope.go:117] "RemoveContainer" containerID="cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf" Oct 2 19:31:19.259604 env[1732]: time="2023-10-02T19:31:19.259411684Z" level=info msg="RemoveContainer for \"cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf\"" Oct 2 19:31:19.260314 env[1732]: time="2023-10-02T19:31:19.260257123Z" level=info msg="RemoveContainer for \"cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf\"" Oct 2 19:31:19.260736 env[1732]: time="2023-10-02T19:31:19.260601308Z" level=error msg="RemoveContainer for \"cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf\" failed" error="failed to set removing state for container \"cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf\": container is already in removing state" Oct 2 19:31:19.262211 kubelet[3033]: E1002 19:31:19.261216 3033 remote_runtime.go:385] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf\": container is already in removing state" containerID="cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf" Oct 2 19:31:19.262211 kubelet[3033]: E1002 19:31:19.261278 3033 kuberuntime_container.go:820] failed to remove pod init container "mount-cgroup": rpc error: code = Unknown desc = failed to set removing state for container "cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf": container is already in removing state; Skipping pod "cilium-lcdw6_kube-system(41762a2a-500d-4f38-a454-4440bd9f5322)" Oct 2 19:31:19.262211 kubelet[3033]: E1002 19:31:19.261779 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 40s restarting failed container=mount-cgroup pod=cilium-lcdw6_kube-system(41762a2a-500d-4f38-a454-4440bd9f5322)\"" pod="kube-system/cilium-lcdw6" podUID="41762a2a-500d-4f38-a454-4440bd9f5322" Oct 2 19:31:19.264240 env[1732]: time="2023-10-02T19:31:19.264175064Z" level=info msg="RemoveContainer for \"cdbadd181b670854644727b5723b9c6beb8433aa592ee93590ae8e6588175dbf\" returns successfully" Oct 2 19:31:19.317652 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cabec0b4b21078a55c19ea4bbcf23f3143d49c43c9863f32784d295292af918e-rootfs.mount: Deactivated successfully. Oct 2 19:31:21.235207 env[1732]: time="2023-10-02T19:31:21.235134271Z" level=info msg="StopPodSandbox for \"1758a14eddb35c3fe38a85bdfb56e839651edef90cd6879d886604119bd4dec5\"" Oct 2 19:31:21.235835 env[1732]: time="2023-10-02T19:31:21.235304347Z" level=info msg="TearDown network for sandbox \"1758a14eddb35c3fe38a85bdfb56e839651edef90cd6879d886604119bd4dec5\" successfully" Oct 2 19:31:21.235835 env[1732]: time="2023-10-02T19:31:21.235367527Z" level=info msg="StopPodSandbox for \"1758a14eddb35c3fe38a85bdfb56e839651edef90cd6879d886604119bd4dec5\" returns successfully" Oct 2 19:31:21.239024 env[1732]: time="2023-10-02T19:31:21.236993101Z" level=info msg="RemovePodSandbox for \"1758a14eddb35c3fe38a85bdfb56e839651edef90cd6879d886604119bd4dec5\"" Oct 2 19:31:21.239024 env[1732]: time="2023-10-02T19:31:21.237082153Z" level=info msg="Forcibly stopping sandbox \"1758a14eddb35c3fe38a85bdfb56e839651edef90cd6879d886604119bd4dec5\"" Oct 2 19:31:21.239024 env[1732]: time="2023-10-02T19:31:21.237272054Z" level=info msg="TearDown network for sandbox \"1758a14eddb35c3fe38a85bdfb56e839651edef90cd6879d886604119bd4dec5\" successfully" Oct 2 19:31:21.243908 env[1732]: time="2023-10-02T19:31:21.243632039Z" level=info msg="RemovePodSandbox \"1758a14eddb35c3fe38a85bdfb56e839651edef90cd6879d886604119bd4dec5\" returns successfully" Oct 2 19:31:21.245239 env[1732]: time="2023-10-02T19:31:21.244914759Z" level=info msg="StopPodSandbox for \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\"" Oct 2 19:31:21.245239 env[1732]: time="2023-10-02T19:31:21.245131312Z" level=info msg="TearDown network for sandbox \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\" successfully" Oct 2 19:31:21.245239 env[1732]: time="2023-10-02T19:31:21.245227564Z" level=info msg="StopPodSandbox for \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\" returns successfully" Oct 2 19:31:21.246732 env[1732]: time="2023-10-02T19:31:21.246360872Z" level=info msg="RemovePodSandbox for \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\"" Oct 2 19:31:21.246732 env[1732]: time="2023-10-02T19:31:21.246413732Z" level=info msg="Forcibly stopping sandbox \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\"" Oct 2 19:31:21.246732 env[1732]: time="2023-10-02T19:31:21.246542972Z" level=info msg="TearDown network for sandbox \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\" successfully" Oct 2 19:31:21.251988 env[1732]: time="2023-10-02T19:31:21.251932706Z" level=info msg="RemovePodSandbox \"1f5798ee44cd8c4506476e4af2564e9586432a3764345099498b768780020cfe\" returns successfully" Oct 2 19:31:21.520739 kubelet[3033]: W1002 19:31:21.519929 3033 machine.go:65] Cannot read vendor id correctly, set empty. Oct 2 19:31:21.566635 kubelet[3033]: W1002 19:31:21.566587 3033 manager.go:1159] Failed to process watch event {EventType:0 Name:/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod41762a2a_500d_4f38_a454_4440bd9f5322.slice/cri-containerd-cabec0b4b21078a55c19ea4bbcf23f3143d49c43c9863f32784d295292af918e.scope WatchSource:0}: task cabec0b4b21078a55c19ea4bbcf23f3143d49c43c9863f32784d295292af918e not found: not found Oct 2 19:31:21.643951 kubelet[3033]: E1002 19:31:21.643869 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:31:26.645163 kubelet[3033]: E1002 19:31:26.645125 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:31:31.344000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:31.347388 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 2 19:31:31.347479 kernel: audit: type=1400 audit(1696275091.344:1410): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:31.344000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40002494a0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:31:31.369921 kernel: audit: type=1300 audit(1696275091.344:1410): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40002494a0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:31:31.370042 kernel: audit: type=1327 audit(1696275091.344:1410): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:31:31.344000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:31:31.346000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:31.390356 kernel: audit: type=1400 audit(1696275091.346:1411): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:31.390448 kernel: audit: type=1300 audit(1696275091.346:1411): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40002494e0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:31:31.346000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40002494e0 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:31:31.346000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:31:31.414707 kernel: audit: type=1327 audit(1696275091.346:1411): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:31:31.414835 kernel: audit: type=1400 audit(1696275091.351:1412): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:31.351000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:31.351000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40009d6540 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:31:31.436860 kernel: audit: type=1300 audit(1696275091.351:1412): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40009d6540 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:31:31.436969 kernel: audit: type=1327 audit(1696275091.351:1412): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:31:31.351000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:31:31.353000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:31.457355 kernel: audit: type=1400 audit(1696275091.353:1413): avc: denied { watch } for pid=2895 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:31.353000 audit[2895]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000249800 a2=fc6 a3=0 items=0 ppid=2723 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:31:31.353000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:31:31.646910 kubelet[3033]: E1002 19:31:31.646769 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:31:32.296100 kubelet[3033]: E1002 19:31:32.296056 3033 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"mount-cgroup\" with CrashLoopBackOff: \"back-off 40s restarting failed container=mount-cgroup pod=cilium-lcdw6_kube-system(41762a2a-500d-4f38-a454-4440bd9f5322)\"" pod="kube-system/cilium-lcdw6" podUID="41762a2a-500d-4f38-a454-4440bd9f5322" Oct 2 19:31:36.648055 kubelet[3033]: E1002 19:31:36.648017 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:31:38.703885 env[1732]: time="2023-10-02T19:31:38.699732159Z" level=info msg="StopPodSandbox for \"51733cc2201c245485d4a8ea72ff1c79845954a6b6c395fc773145b33ab01a0b\"" Oct 2 19:31:38.703885 env[1732]: time="2023-10-02T19:31:38.699874804Z" level=info msg="Container to stop \"cabec0b4b21078a55c19ea4bbcf23f3143d49c43c9863f32784d295292af918e\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Oct 2 19:31:38.702623 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-51733cc2201c245485d4a8ea72ff1c79845954a6b6c395fc773145b33ab01a0b-shm.mount: Deactivated successfully. Oct 2 19:31:38.736724 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 19:31:38.736898 kernel: audit: type=1334 audit(1696275098.731:1414): prog-id=134 op=UNLOAD Oct 2 19:31:38.731000 audit: BPF prog-id=134 op=UNLOAD Oct 2 19:31:38.733111 systemd[1]: cri-containerd-51733cc2201c245485d4a8ea72ff1c79845954a6b6c395fc773145b33ab01a0b.scope: Deactivated successfully. Oct 2 19:31:38.738000 audit: BPF prog-id=137 op=UNLOAD Oct 2 19:31:38.743216 kernel: audit: type=1334 audit(1696275098.738:1415): prog-id=137 op=UNLOAD Oct 2 19:31:38.812938 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-51733cc2201c245485d4a8ea72ff1c79845954a6b6c395fc773145b33ab01a0b-rootfs.mount: Deactivated successfully. Oct 2 19:31:38.829642 env[1732]: time="2023-10-02T19:31:38.829538301Z" level=info msg="shim disconnected" id=51733cc2201c245485d4a8ea72ff1c79845954a6b6c395fc773145b33ab01a0b Oct 2 19:31:38.829642 env[1732]: time="2023-10-02T19:31:38.829627089Z" level=warning msg="cleaning up after shim disconnected" id=51733cc2201c245485d4a8ea72ff1c79845954a6b6c395fc773145b33ab01a0b namespace=k8s.io Oct 2 19:31:38.829642 env[1732]: time="2023-10-02T19:31:38.829650057Z" level=info msg="cleaning up dead shim" Oct 2 19:31:38.834332 sshd[4046]: pam_unix(sshd:session): session closed for user core Oct 2 19:31:38.836000 audit[4046]: USER_END pid=4046 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:31:38.841239 systemd[1]: sshd@29-172.31.27.184:22-139.178.89.65:35950.service: Deactivated successfully. Oct 2 19:31:38.842444 systemd[1]: session-30.scope: Deactivated successfully. Oct 2 19:31:38.842773 systemd[1]: session-30.scope: Consumed 3.383s CPU time. Oct 2 19:31:38.852362 systemd-logind[1722]: Session 30 logged out. Waiting for processes to exit. Oct 2 19:31:38.836000 audit[4046]: CRED_DISP pid=4046 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:31:38.856386 systemd-logind[1722]: Removed session 30. Oct 2 19:31:38.863902 kernel: audit: type=1106 audit(1696275098.836:1416): pid=4046 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:31:38.864088 kernel: audit: type=1104 audit(1696275098.836:1417): pid=4046 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:31:38.875468 kernel: audit: type=1131 audit(1696275098.836:1418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.27.184:22-139.178.89.65:35950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:38.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.27.184:22-139.178.89.65:35950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:31:38.879285 env[1732]: time="2023-10-02T19:31:38.879215174Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:31:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4284 runtime=io.containerd.runc.v2\n" Oct 2 19:31:38.879891 env[1732]: time="2023-10-02T19:31:38.879837568Z" level=info msg="TearDown network for sandbox \"51733cc2201c245485d4a8ea72ff1c79845954a6b6c395fc773145b33ab01a0b\" successfully" Oct 2 19:31:38.880009 env[1732]: time="2023-10-02T19:31:38.879892360Z" level=info msg="StopPodSandbox for \"51733cc2201c245485d4a8ea72ff1c79845954a6b6c395fc773145b33ab01a0b\" returns successfully" Oct 2 19:31:38.928342 kubelet[3033]: I1002 19:31:38.928294 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"host-proc-sys-net\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-host-proc-sys-net\") pod \"41762a2a-500d-4f38-a454-4440bd9f5322\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " Oct 2 19:31:38.929024 kubelet[3033]: I1002 19:31:38.928363 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-run\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-cilium-run\") pod \"41762a2a-500d-4f38-a454-4440bd9f5322\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " Oct 2 19:31:38.929024 kubelet[3033]: I1002 19:31:38.928413 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-ipsec-secrets\" (UniqueName: \"kubernetes.io/secret/41762a2a-500d-4f38-a454-4440bd9f5322-cilium-ipsec-secrets\") pod \"41762a2a-500d-4f38-a454-4440bd9f5322\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " Oct 2 19:31:38.929024 kubelet[3033]: I1002 19:31:38.928456 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"host-proc-sys-kernel\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-host-proc-sys-kernel\") pod \"41762a2a-500d-4f38-a454-4440bd9f5322\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " Oct 2 19:31:38.929024 kubelet[3033]: I1002 19:31:38.928517 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-szbsk\" (UniqueName: \"kubernetes.io/projected/41762a2a-500d-4f38-a454-4440bd9f5322-kube-api-access-szbsk\") pod \"41762a2a-500d-4f38-a454-4440bd9f5322\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " Oct 2 19:31:38.929024 kubelet[3033]: I1002 19:31:38.928563 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"etc-cni-netd\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-etc-cni-netd\") pod \"41762a2a-500d-4f38-a454-4440bd9f5322\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " Oct 2 19:31:38.929024 kubelet[3033]: I1002 19:31:38.928602 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-xtables-lock\") pod \"41762a2a-500d-4f38-a454-4440bd9f5322\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " Oct 2 19:31:38.929024 kubelet[3033]: I1002 19:31:38.928640 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"bpf-maps\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-bpf-maps\") pod \"41762a2a-500d-4f38-a454-4440bd9f5322\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " Oct 2 19:31:38.929024 kubelet[3033]: I1002 19:31:38.928749 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"clustermesh-secrets\" (UniqueName: \"kubernetes.io/secret/41762a2a-500d-4f38-a454-4440bd9f5322-clustermesh-secrets\") pod \"41762a2a-500d-4f38-a454-4440bd9f5322\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " Oct 2 19:31:38.929024 kubelet[3033]: I1002 19:31:38.928794 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-path\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-cni-path\") pod \"41762a2a-500d-4f38-a454-4440bd9f5322\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " Oct 2 19:31:38.929024 kubelet[3033]: I1002 19:31:38.928838 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"hubble-tls\" (UniqueName: \"kubernetes.io/projected/41762a2a-500d-4f38-a454-4440bd9f5322-hubble-tls\") pod \"41762a2a-500d-4f38-a454-4440bd9f5322\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " Oct 2 19:31:38.929024 kubelet[3033]: I1002 19:31:38.928878 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-lib-modules\") pod \"41762a2a-500d-4f38-a454-4440bd9f5322\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " Oct 2 19:31:38.929024 kubelet[3033]: I1002 19:31:38.928923 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-cgroup\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-cilium-cgroup\") pod \"41762a2a-500d-4f38-a454-4440bd9f5322\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " Oct 2 19:31:38.929024 kubelet[3033]: I1002 19:31:38.928966 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"hostproc\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-hostproc\") pod \"41762a2a-500d-4f38-a454-4440bd9f5322\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " Oct 2 19:31:38.929024 kubelet[3033]: I1002 19:31:38.929015 3033 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/41762a2a-500d-4f38-a454-4440bd9f5322-cilium-config-path\") pod \"41762a2a-500d-4f38-a454-4440bd9f5322\" (UID: \"41762a2a-500d-4f38-a454-4440bd9f5322\") " Oct 2 19:31:38.930823 kubelet[3033]: I1002 19:31:38.930769 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "41762a2a-500d-4f38-a454-4440bd9f5322" (UID: "41762a2a-500d-4f38-a454-4440bd9f5322"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:31:38.931008 kubelet[3033]: I1002 19:31:38.930924 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-bpf-maps" (OuterVolumeSpecName: "bpf-maps") pod "41762a2a-500d-4f38-a454-4440bd9f5322" (UID: "41762a2a-500d-4f38-a454-4440bd9f5322"). InnerVolumeSpecName "bpf-maps". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:31:38.931415 kubelet[3033]: I1002 19:31:38.930855 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-host-proc-sys-net" (OuterVolumeSpecName: "host-proc-sys-net") pod "41762a2a-500d-4f38-a454-4440bd9f5322" (UID: "41762a2a-500d-4f38-a454-4440bd9f5322"). InnerVolumeSpecName "host-proc-sys-net". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:31:38.931560 kubelet[3033]: I1002 19:31:38.931455 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-cilium-run" (OuterVolumeSpecName: "cilium-run") pod "41762a2a-500d-4f38-a454-4440bd9f5322" (UID: "41762a2a-500d-4f38-a454-4440bd9f5322"). InnerVolumeSpecName "cilium-run". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:31:38.931946 kubelet[3033]: I1002 19:31:38.931885 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-host-proc-sys-kernel" (OuterVolumeSpecName: "host-proc-sys-kernel") pod "41762a2a-500d-4f38-a454-4440bd9f5322" (UID: "41762a2a-500d-4f38-a454-4440bd9f5322"). InnerVolumeSpecName "host-proc-sys-kernel". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:31:38.932435 kubelet[3033]: I1002 19:31:38.932391 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-etc-cni-netd" (OuterVolumeSpecName: "etc-cni-netd") pod "41762a2a-500d-4f38-a454-4440bd9f5322" (UID: "41762a2a-500d-4f38-a454-4440bd9f5322"). InnerVolumeSpecName "etc-cni-netd". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:31:38.937853 kubelet[3033]: I1002 19:31:38.936442 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-cilium-cgroup" (OuterVolumeSpecName: "cilium-cgroup") pod "41762a2a-500d-4f38-a454-4440bd9f5322" (UID: "41762a2a-500d-4f38-a454-4440bd9f5322"). InnerVolumeSpecName "cilium-cgroup". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:31:38.937853 kubelet[3033]: I1002 19:31:38.936774 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-hostproc" (OuterVolumeSpecName: "hostproc") pod "41762a2a-500d-4f38-a454-4440bd9f5322" (UID: "41762a2a-500d-4f38-a454-4440bd9f5322"). InnerVolumeSpecName "hostproc". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:31:38.937853 kubelet[3033]: I1002 19:31:38.936820 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "41762a2a-500d-4f38-a454-4440bd9f5322" (UID: "41762a2a-500d-4f38-a454-4440bd9f5322"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:31:38.937853 kubelet[3033]: I1002 19:31:38.937106 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-cni-path" (OuterVolumeSpecName: "cni-path") pod "41762a2a-500d-4f38-a454-4440bd9f5322" (UID: "41762a2a-500d-4f38-a454-4440bd9f5322"). InnerVolumeSpecName "cni-path". PluginName "kubernetes.io/host-path", VolumeGidValue "" Oct 2 19:31:38.937853 kubelet[3033]: I1002 19:31:38.937266 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/41762a2a-500d-4f38-a454-4440bd9f5322-cilium-config-path" (OuterVolumeSpecName: "cilium-config-path") pod "41762a2a-500d-4f38-a454-4440bd9f5322" (UID: "41762a2a-500d-4f38-a454-4440bd9f5322"). InnerVolumeSpecName "cilium-config-path". PluginName "kubernetes.io/configmap", VolumeGidValue "" Oct 2 19:31:38.948111 systemd[1]: var-lib-kubelet-pods-41762a2a\x2d500d\x2d4f38\x2da454\x2d4440bd9f5322-volumes-kubernetes.io\x7esecret-clustermesh\x2dsecrets.mount: Deactivated successfully. Oct 2 19:31:38.952554 kubelet[3033]: I1002 19:31:38.952473 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/41762a2a-500d-4f38-a454-4440bd9f5322-clustermesh-secrets" (OuterVolumeSpecName: "clustermesh-secrets") pod "41762a2a-500d-4f38-a454-4440bd9f5322" (UID: "41762a2a-500d-4f38-a454-4440bd9f5322"). InnerVolumeSpecName "clustermesh-secrets". PluginName "kubernetes.io/secret", VolumeGidValue "" Oct 2 19:31:38.955173 systemd[1]: var-lib-kubelet-pods-41762a2a\x2d500d\x2d4f38\x2da454\x2d4440bd9f5322-volumes-kubernetes.io\x7esecret-cilium\x2dipsec\x2dsecrets.mount: Deactivated successfully. Oct 2 19:31:38.962831 kubelet[3033]: I1002 19:31:38.962759 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/41762a2a-500d-4f38-a454-4440bd9f5322-cilium-ipsec-secrets" (OuterVolumeSpecName: "cilium-ipsec-secrets") pod "41762a2a-500d-4f38-a454-4440bd9f5322" (UID: "41762a2a-500d-4f38-a454-4440bd9f5322"). InnerVolumeSpecName "cilium-ipsec-secrets". PluginName "kubernetes.io/secret", VolumeGidValue "" Oct 2 19:31:38.968074 systemd[1]: var-lib-kubelet-pods-41762a2a\x2d500d\x2d4f38\x2da454\x2d4440bd9f5322-volumes-kubernetes.io\x7eprojected-hubble\x2dtls.mount: Deactivated successfully. Oct 2 19:31:38.970466 kubelet[3033]: I1002 19:31:38.970394 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/41762a2a-500d-4f38-a454-4440bd9f5322-kube-api-access-szbsk" (OuterVolumeSpecName: "kube-api-access-szbsk") pod "41762a2a-500d-4f38-a454-4440bd9f5322" (UID: "41762a2a-500d-4f38-a454-4440bd9f5322"). InnerVolumeSpecName "kube-api-access-szbsk". PluginName "kubernetes.io/projected", VolumeGidValue "" Oct 2 19:31:38.971290 kubelet[3033]: I1002 19:31:38.971167 3033 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/41762a2a-500d-4f38-a454-4440bd9f5322-hubble-tls" (OuterVolumeSpecName: "hubble-tls") pod "41762a2a-500d-4f38-a454-4440bd9f5322" (UID: "41762a2a-500d-4f38-a454-4440bd9f5322"). InnerVolumeSpecName "hubble-tls". PluginName "kubernetes.io/projected", VolumeGidValue "" Oct 2 19:31:39.029317 kubelet[3033]: I1002 19:31:39.029258 3033 reconciler_common.go:300] "Volume detached for volume \"cilium-config-path\" (UniqueName: \"kubernetes.io/configmap/41762a2a-500d-4f38-a454-4440bd9f5322-cilium-config-path\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:31:39.029317 kubelet[3033]: I1002 19:31:39.029316 3033 reconciler_common.go:300] "Volume detached for volume \"host-proc-sys-net\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-host-proc-sys-net\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:31:39.029527 kubelet[3033]: I1002 19:31:39.029343 3033 reconciler_common.go:300] "Volume detached for volume \"cilium-run\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-cilium-run\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:31:39.029527 kubelet[3033]: I1002 19:31:39.029370 3033 reconciler_common.go:300] "Volume detached for volume \"cilium-ipsec-secrets\" (UniqueName: \"kubernetes.io/secret/41762a2a-500d-4f38-a454-4440bd9f5322-cilium-ipsec-secrets\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:31:39.029527 kubelet[3033]: I1002 19:31:39.029396 3033 reconciler_common.go:300] "Volume detached for volume \"host-proc-sys-kernel\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-host-proc-sys-kernel\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:31:39.029527 kubelet[3033]: I1002 19:31:39.029420 3033 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-szbsk\" (UniqueName: \"kubernetes.io/projected/41762a2a-500d-4f38-a454-4440bd9f5322-kube-api-access-szbsk\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:31:39.029527 kubelet[3033]: I1002 19:31:39.029443 3033 reconciler_common.go:300] "Volume detached for volume \"etc-cni-netd\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-etc-cni-netd\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:31:39.029527 kubelet[3033]: I1002 19:31:39.029467 3033 reconciler_common.go:300] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-xtables-lock\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:31:39.029527 kubelet[3033]: I1002 19:31:39.029490 3033 reconciler_common.go:300] "Volume detached for volume \"bpf-maps\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-bpf-maps\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:31:39.029527 kubelet[3033]: I1002 19:31:39.029514 3033 reconciler_common.go:300] "Volume detached for volume \"clustermesh-secrets\" (UniqueName: \"kubernetes.io/secret/41762a2a-500d-4f38-a454-4440bd9f5322-clustermesh-secrets\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:31:39.030055 kubelet[3033]: I1002 19:31:39.029538 3033 reconciler_common.go:300] "Volume detached for volume \"cni-path\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-cni-path\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:31:39.030055 kubelet[3033]: I1002 19:31:39.029560 3033 reconciler_common.go:300] "Volume detached for volume \"hubble-tls\" (UniqueName: \"kubernetes.io/projected/41762a2a-500d-4f38-a454-4440bd9f5322-hubble-tls\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:31:39.030055 kubelet[3033]: I1002 19:31:39.029582 3033 reconciler_common.go:300] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-lib-modules\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:31:39.030055 kubelet[3033]: I1002 19:31:39.029605 3033 reconciler_common.go:300] "Volume detached for volume \"cilium-cgroup\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-cilium-cgroup\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:31:39.030055 kubelet[3033]: I1002 19:31:39.029627 3033 reconciler_common.go:300] "Volume detached for volume \"hostproc\" (UniqueName: \"kubernetes.io/host-path/41762a2a-500d-4f38-a454-4440bd9f5322-hostproc\") on node \"ip-172-31-27-184\" DevicePath \"\"" Oct 2 19:31:39.311943 systemd[1]: Removed slice kubepods-burstable-pod41762a2a_500d_4f38_a454_4440bd9f5322.slice. Oct 2 19:31:39.313415 kubelet[3033]: I1002 19:31:39.312875 3033 scope.go:117] "RemoveContainer" containerID="cabec0b4b21078a55c19ea4bbcf23f3143d49c43c9863f32784d295292af918e" Oct 2 19:31:39.319726 env[1732]: time="2023-10-02T19:31:39.319564278Z" level=info msg="RemoveContainer for \"cabec0b4b21078a55c19ea4bbcf23f3143d49c43c9863f32784d295292af918e\"" Oct 2 19:31:39.325292 env[1732]: time="2023-10-02T19:31:39.325216667Z" level=info msg="RemoveContainer for \"cabec0b4b21078a55c19ea4bbcf23f3143d49c43c9863f32784d295292af918e\" returns successfully" Oct 2 19:31:39.702534 systemd[1]: var-lib-kubelet-pods-41762a2a\x2d500d\x2d4f38\x2da454\x2d4440bd9f5322-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dszbsk.mount: Deactivated successfully. Oct 2 19:31:41.299280 kubelet[3033]: I1002 19:31:41.299243 3033 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="41762a2a-500d-4f38-a454-4440bd9f5322" path="/var/lib/kubelet/pods/41762a2a-500d-4f38-a454-4440bd9f5322/volumes" Oct 2 19:31:41.650304 kubelet[3033]: E1002 19:31:41.649998 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:31:46.651225 kubelet[3033]: E1002 19:31:46.651127 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:31:51.653199 kubelet[3033]: E1002 19:31:51.653109 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:31:52.791713 systemd[1]: cri-containerd-580fb31524dd428784395fc2bbf17bcb536e2b8b7e738ea1ec2b6ec96239c453.scope: Deactivated successfully. Oct 2 19:31:52.792281 systemd[1]: cri-containerd-580fb31524dd428784395fc2bbf17bcb536e2b8b7e738ea1ec2b6ec96239c453.scope: Consumed 7.309s CPU time. Oct 2 19:31:52.794000 audit: BPF prog-id=89 op=UNLOAD Oct 2 19:31:52.794000 audit: BPF prog-id=114 op=UNLOAD Oct 2 19:31:52.801599 kernel: audit: type=1334 audit(1696275112.794:1419): prog-id=89 op=UNLOAD Oct 2 19:31:52.801826 kernel: audit: type=1334 audit(1696275112.794:1420): prog-id=114 op=UNLOAD Oct 2 19:31:52.846438 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-580fb31524dd428784395fc2bbf17bcb536e2b8b7e738ea1ec2b6ec96239c453-rootfs.mount: Deactivated successfully. Oct 2 19:31:52.870910 env[1732]: time="2023-10-02T19:31:52.870847306Z" level=info msg="shim disconnected" id=580fb31524dd428784395fc2bbf17bcb536e2b8b7e738ea1ec2b6ec96239c453 Oct 2 19:31:52.871667 env[1732]: time="2023-10-02T19:31:52.871616208Z" level=warning msg="cleaning up after shim disconnected" id=580fb31524dd428784395fc2bbf17bcb536e2b8b7e738ea1ec2b6ec96239c453 namespace=k8s.io Oct 2 19:31:52.871850 env[1732]: time="2023-10-02T19:31:52.871821445Z" level=info msg="cleaning up dead shim" Oct 2 19:31:52.897900 env[1732]: time="2023-10-02T19:31:52.897844454Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:31:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4315 runtime=io.containerd.runc.v2\n" Oct 2 19:31:53.346317 kubelet[3033]: I1002 19:31:53.346228 3033 scope.go:117] "RemoveContainer" containerID="580fb31524dd428784395fc2bbf17bcb536e2b8b7e738ea1ec2b6ec96239c453" Oct 2 19:31:53.352075 env[1732]: time="2023-10-02T19:31:53.352014315Z" level=info msg="CreateContainer within sandbox \"7bcec7476f051d8c150e58a9a45169f82d6c68b3694207c4696695d80ccc0308\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Oct 2 19:31:53.370467 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3490857753.mount: Deactivated successfully. Oct 2 19:31:53.379647 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount245517961.mount: Deactivated successfully. Oct 2 19:31:53.386554 env[1732]: time="2023-10-02T19:31:53.386482527Z" level=info msg="CreateContainer within sandbox \"7bcec7476f051d8c150e58a9a45169f82d6c68b3694207c4696695d80ccc0308\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"7973b16c1dd68090b64ce5e9e57d266b0c6a4fb5b73051960f88a763463ec95e\"" Oct 2 19:31:53.387629 env[1732]: time="2023-10-02T19:31:53.387555606Z" level=info msg="StartContainer for \"7973b16c1dd68090b64ce5e9e57d266b0c6a4fb5b73051960f88a763463ec95e\"" Oct 2 19:31:53.430420 systemd[1]: Started cri-containerd-7973b16c1dd68090b64ce5e9e57d266b0c6a4fb5b73051960f88a763463ec95e.scope. Oct 2 19:31:53.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.490061 kernel: audit: type=1400 audit(1696275113.473:1421): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.490191 kernel: audit: type=1400 audit(1696275113.473:1422): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.497838 kernel: audit: type=1400 audit(1696275113.473:1423): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.497974 kernel: audit: type=1400 audit(1696275113.473:1424): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.513142 kernel: audit: type=1400 audit(1696275113.473:1425): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.513237 kernel: audit: type=1400 audit(1696275113.473:1426): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.528757 kernel: audit: type=1400 audit(1696275113.473:1427): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.529175 kernel: audit: type=1400 audit(1696275113.473:1428): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.480000 audit: BPF prog-id=138 op=LOAD Oct 2 19:31:53.489000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.489000 audit[4335]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2723 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:53.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739373362313663316464363830393062363463653565396535376432 Oct 2 19:31:53.489000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.489000 audit[4335]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2723 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:53.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739373362313663316464363830393062363463653565396535376432 Oct 2 19:31:53.489000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.489000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.489000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.489000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.489000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.489000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.489000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.489000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.489000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.489000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.489000 audit: BPF prog-id=139 op=LOAD Oct 2 19:31:53.489000 audit[4335]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2723 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:53.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739373362313663316464363830393062363463653565396535376432 Oct 2 19:31:53.496000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.496000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.496000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.496000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.496000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.496000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.496000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.496000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.496000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.496000 audit: BPF prog-id=140 op=LOAD Oct 2 19:31:53.496000 audit[4335]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2723 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:53.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739373362313663316464363830393062363463653565396535376432 Oct 2 19:31:53.504000 audit: BPF prog-id=140 op=UNLOAD Oct 2 19:31:53.504000 audit: BPF prog-id=139 op=UNLOAD Oct 2 19:31:53.504000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.504000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.504000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.504000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.504000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.504000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.504000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.504000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.504000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.504000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:53.504000 audit: BPF prog-id=141 op=LOAD Oct 2 19:31:53.504000 audit[4335]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2723 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:53.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739373362313663316464363830393062363463653565396535376432 Oct 2 19:31:53.601941 env[1732]: time="2023-10-02T19:31:53.599485316Z" level=info msg="StartContainer for \"7973b16c1dd68090b64ce5e9e57d266b0c6a4fb5b73051960f88a763463ec95e\" returns successfully" Oct 2 19:31:55.698000 audit[4346]: AVC avc: denied { watch } for pid=4346 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:55.698000 audit[4346]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400013cd50 a2=fc6 a3=0 items=0 ppid=2723 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:31:55.698000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:31:55.700000 audit[4346]: AVC avc: denied { watch } for pid=4346 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:31:55.700000 audit[4346]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400032fbe0 a2=fc6 a3=0 items=0 ppid=2723 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c482 key=(null) Oct 2 19:31:55.700000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:31:56.654693 kubelet[3033]: E1002 19:31:56.654651 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:31:57.956834 kubelet[3033]: E1002 19:31:57.956762 3033 controller.go:193] "Failed to update lease" err="Put \"https://172.31.27.184:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-184?timeout=10s\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)" Oct 2 19:31:58.132016 systemd[1]: cri-containerd-3828d30e32340a7fc533c13e48dccc82a55ee88db0d3da3208eb2964039ebac6.scope: Deactivated successfully. Oct 2 19:31:58.132590 systemd[1]: cri-containerd-3828d30e32340a7fc533c13e48dccc82a55ee88db0d3da3208eb2964039ebac6.scope: Consumed 3.848s CPU time. Oct 2 19:31:58.135000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:31:58.139062 kernel: kauditd_printk_skb: 55 callbacks suppressed Oct 2 19:31:58.139198 kernel: audit: type=1334 audit(1696275118.135:1441): prog-id=85 op=UNLOAD Oct 2 19:31:58.135000 audit: BPF prog-id=97 op=UNLOAD Oct 2 19:31:58.145304 kernel: audit: type=1334 audit(1696275118.135:1442): prog-id=97 op=UNLOAD Oct 2 19:31:58.191836 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3828d30e32340a7fc533c13e48dccc82a55ee88db0d3da3208eb2964039ebac6-rootfs.mount: Deactivated successfully. Oct 2 19:31:58.221190 env[1732]: time="2023-10-02T19:31:58.221040492Z" level=info msg="shim disconnected" id=3828d30e32340a7fc533c13e48dccc82a55ee88db0d3da3208eb2964039ebac6 Oct 2 19:31:58.221892 env[1732]: time="2023-10-02T19:31:58.221786030Z" level=warning msg="cleaning up after shim disconnected" id=3828d30e32340a7fc533c13e48dccc82a55ee88db0d3da3208eb2964039ebac6 namespace=k8s.io Oct 2 19:31:58.221892 env[1732]: time="2023-10-02T19:31:58.221823062Z" level=info msg="cleaning up dead shim" Oct 2 19:31:58.248726 env[1732]: time="2023-10-02T19:31:58.248639895Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:31:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4373 runtime=io.containerd.runc.v2\n" Oct 2 19:31:58.363399 kubelet[3033]: I1002 19:31:58.363350 3033 scope.go:117] "RemoveContainer" containerID="3828d30e32340a7fc533c13e48dccc82a55ee88db0d3da3208eb2964039ebac6" Oct 2 19:31:58.367344 env[1732]: time="2023-10-02T19:31:58.367282094Z" level=info msg="CreateContainer within sandbox \"d3102803999f12fdc40053b6b3b8f572b0269a13a687c37e5e71a7cf1a0704dc\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Oct 2 19:31:58.387518 env[1732]: time="2023-10-02T19:31:58.387442449Z" level=info msg="CreateContainer within sandbox \"d3102803999f12fdc40053b6b3b8f572b0269a13a687c37e5e71a7cf1a0704dc\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"c88e9e8ce89dc27f6411b86edf7f2411c4e9c6be1024f5f1d9795ae0ec2f3c13\"" Oct 2 19:31:58.388721 env[1732]: time="2023-10-02T19:31:58.388616340Z" level=info msg="StartContainer for \"c88e9e8ce89dc27f6411b86edf7f2411c4e9c6be1024f5f1d9795ae0ec2f3c13\"" Oct 2 19:31:58.454694 systemd[1]: Started cri-containerd-c88e9e8ce89dc27f6411b86edf7f2411c4e9c6be1024f5f1d9795ae0ec2f3c13.scope. Oct 2 19:31:58.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.507711 kernel: audit: type=1400 audit(1696275118.489:1443): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.507828 kernel: audit: type=1400 audit(1696275118.489:1444): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.515608 kernel: audit: type=1400 audit(1696275118.489:1445): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.515767 kernel: audit: type=1400 audit(1696275118.489:1446): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.531764 kernel: audit: type=1400 audit(1696275118.489:1447): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.532304 kernel: audit: type=1400 audit(1696275118.489:1448): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.547986 kernel: audit: type=1400 audit(1696275118.489:1449): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.556064 kernel: audit: type=1400 audit(1696275118.489:1450): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.498000 audit: BPF prog-id=142 op=LOAD Oct 2 19:31:58.498000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.498000 audit[4393]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2751 pid=4393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:58.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338386539653863653839646332376636343131623836656466376632 Oct 2 19:31:58.498000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.498000 audit[4393]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2751 pid=4393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:58.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338386539653863653839646332376636343131623836656466376632 Oct 2 19:31:58.498000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.498000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.498000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.498000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.498000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.498000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.498000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.498000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.498000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.498000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.498000 audit: BPF prog-id=143 op=LOAD Oct 2 19:31:58.498000 audit[4393]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2751 pid=4393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:58.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338386539653863653839646332376636343131623836656466376632 Oct 2 19:31:58.506000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.506000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.506000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.506000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.506000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.506000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.506000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.506000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.506000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.506000 audit: BPF prog-id=144 op=LOAD Oct 2 19:31:58.506000 audit[4393]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2751 pid=4393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:58.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338386539653863653839646332376636343131623836656466376632 Oct 2 19:31:58.514000 audit: BPF prog-id=144 op=UNLOAD Oct 2 19:31:58.514000 audit: BPF prog-id=143 op=UNLOAD Oct 2 19:31:58.514000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.514000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.514000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.514000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.514000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.514000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.514000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.514000 audit[4393]: AVC avc: denied { perfmon } for pid=4393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.514000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.514000 audit[4393]: AVC avc: denied { bpf } for pid=4393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:31:58.514000 audit: BPF prog-id=145 op=LOAD Oct 2 19:31:58.514000 audit[4393]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2751 pid=4393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:31:58.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338386539653863653839646332376636343131623836656466376632 Oct 2 19:31:58.602581 env[1732]: time="2023-10-02T19:31:58.602508198Z" level=info msg="StartContainer for \"c88e9e8ce89dc27f6411b86edf7f2411c4e9c6be1024f5f1d9795ae0ec2f3c13\" returns successfully" Oct 2 19:32:01.655907 kubelet[3033]: E1002 19:32:01.655841 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:32:06.657794 kubelet[3033]: E1002 19:32:06.657737 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:32:07.957508 kubelet[3033]: E1002 19:32:07.957306 3033 controller.go:193] "Failed to update lease" err="Put \"https://172.31.27.184:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-184?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 19:32:08.776206 kubelet[3033]: E1002 19:32:08.776142 3033 kubelet_node_status.go:540] "Error updating node status, will retry" err="failed to patch status \"{\\\"status\\\":{\\\"$setElementOrder/conditions\\\":[{\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"type\\\":\\\"DiskPressure\\\"},{\\\"type\\\":\\\"PIDPressure\\\"},{\\\"type\\\":\\\"Ready\\\"}],\\\"conditions\\\":[{\\\"lastHeartbeatTime\\\":\\\"2023-10-02T19:31:58Z\\\",\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2023-10-02T19:31:58Z\\\",\\\"type\\\":\\\"DiskPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2023-10-02T19:31:58Z\\\",\\\"type\\\":\\\"PIDPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2023-10-02T19:31:58Z\\\",\\\"type\\\":\\\"Ready\\\"}]}}\" for node \"ip-172-31-27-184\": the server was unable to return a response in the time allotted, but may still be processing the request (patch nodes ip-172-31-27-184)" Oct 2 19:32:11.658921 kubelet[3033]: E1002 19:32:11.658887 3033 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized"