Feb  9 18:54:36.073678 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024
Feb  9 18:54:36.073712 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6
Feb  9 18:54:36.073736 kernel: BIOS-provided physical RAM map:
Feb  9 18:54:36.073750 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable
Feb  9 18:54:36.073761 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved
Feb  9 18:54:36.073772 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved
Feb  9 18:54:36.073789 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable
Feb  9 18:54:36.073801 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved
Feb  9 18:54:36.073812 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved
Feb  9 18:54:36.073823 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved
Feb  9 18:54:36.073836 kernel: NX (Execute Disable) protection: active
Feb  9 18:54:36.073848 kernel: SMBIOS 2.7 present.
Feb  9 18:54:36.073859 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017
Feb  9 18:54:36.073871 kernel: Hypervisor detected: KVM
Feb  9 18:54:36.073890 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00
Feb  9 18:54:36.073903 kernel: kvm-clock: cpu 0, msr 32faa001, primary cpu clock
Feb  9 18:54:36.073916 kernel: kvm-clock: using sched offset of 6875614266 cycles
Feb  9 18:54:36.073930 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns
Feb  9 18:54:36.073943 kernel: tsc: Detected 2499.994 MHz processor
Feb  9 18:54:36.073957 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
Feb  9 18:54:36.073973 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable
Feb  9 18:54:36.073986 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000
Feb  9 18:54:36.074000 kernel: x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
Feb  9 18:54:36.074014 kernel: Using GB pages for direct mapping
Feb  9 18:54:36.074027 kernel: ACPI: Early table checksum verification disabled
Feb  9 18:54:36.074040 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON)
Feb  9 18:54:36.074053 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001)
Feb  9 18:54:36.074067 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001)
Feb  9 18:54:36.074080 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001)
Feb  9 18:54:36.074096 kernel: ACPI: FACS 0x000000007D9EFF40 000040
Feb  9 18:54:36.074109 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001)
Feb  9 18:54:36.074122 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001)
Feb  9 18:54:36.074135 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001)
Feb  9 18:54:36.074148 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001)
Feb  9 18:54:36.074161 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001)
Feb  9 18:54:36.074175 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001)
Feb  9 18:54:36.074188 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001)
Feb  9 18:54:36.074203 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3]
Feb  9 18:54:36.074217 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488]
Feb  9 18:54:36.074231 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f]
Feb  9 18:54:36.074251 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39]
Feb  9 18:54:36.074426 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645]
Feb  9 18:54:36.074444 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf]
Feb  9 18:54:36.074458 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b]
Feb  9 18:54:36.074479 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7]
Feb  9 18:54:36.074494 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037]
Feb  9 18:54:36.074509 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba]
Feb  9 18:54:36.074522 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0
Feb  9 18:54:36.074535 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0
Feb  9 18:54:36.074549 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff]
Feb  9 18:54:36.074562 kernel: NUMA: Initialized distance table, cnt=1
Feb  9 18:54:36.074575 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff]
Feb  9 18:54:36.074592 kernel: Zone ranges:
Feb  9 18:54:36.074606 kernel:   DMA      [mem 0x0000000000001000-0x0000000000ffffff]
Feb  9 18:54:36.074620 kernel:   DMA32    [mem 0x0000000001000000-0x000000007d9e9fff]
Feb  9 18:54:36.074634 kernel:   Normal   empty
Feb  9 18:54:36.074648 kernel: Movable zone start for each node
Feb  9 18:54:36.074662 kernel: Early memory node ranges
Feb  9 18:54:36.074675 kernel:   node   0: [mem 0x0000000000001000-0x000000000009efff]
Feb  9 18:54:36.074689 kernel:   node   0: [mem 0x0000000000100000-0x000000007d9e9fff]
Feb  9 18:54:36.074703 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff]
Feb  9 18:54:36.074720 kernel: On node 0, zone DMA: 1 pages in unavailable ranges
Feb  9 18:54:36.074735 kernel: On node 0, zone DMA: 97 pages in unavailable ranges
Feb  9 18:54:36.074750 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges
Feb  9 18:54:36.074764 kernel: ACPI: PM-Timer IO Port: 0xb008
Feb  9 18:54:36.074779 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1])
Feb  9 18:54:36.074793 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23
Feb  9 18:54:36.074807 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level)
Feb  9 18:54:36.074821 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
Feb  9 18:54:36.074835 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level)
Feb  9 18:54:36.074852 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level)
Feb  9 18:54:36.074867 kernel: ACPI: Using ACPI (MADT) for SMP configuration information
Feb  9 18:54:36.074880 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000
Feb  9 18:54:36.074895 kernel: TSC deadline timer available
Feb  9 18:54:36.074909 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs
Feb  9 18:54:36.074923 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices
Feb  9 18:54:36.074937 kernel: Booting paravirtualized kernel on KVM
Feb  9 18:54:36.074952 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
Feb  9 18:54:36.074968 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1
Feb  9 18:54:36.074985 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576
Feb  9 18:54:36.074999 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152
Feb  9 18:54:36.075014 kernel: pcpu-alloc: [0] 0 1 
Feb  9 18:54:36.075030 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0
Feb  9 18:54:36.075044 kernel: kvm-guest: PV spinlocks enabled
Feb  9 18:54:36.075059 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear)
Feb  9 18:54:36.075073 kernel: Built 1 zonelists, mobility grouping on.  Total pages: 506242
Feb  9 18:54:36.075088 kernel: Policy zone: DMA32
Feb  9 18:54:36.075103 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6
Feb  9 18:54:36.075121 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space.
Feb  9 18:54:36.075135 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Feb  9 18:54:36.075149 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear)
Feb  9 18:54:36.075163 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off
Feb  9 18:54:36.075178 kernel: Memory: 1936476K/2057760K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121024K reserved, 0K cma-reserved)
Feb  9 18:54:36.075192 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
Feb  9 18:54:36.075206 kernel: Kernel/User page tables isolation: enabled
Feb  9 18:54:36.075219 kernel: ftrace: allocating 34475 entries in 135 pages
Feb  9 18:54:36.075236 kernel: ftrace: allocated 135 pages with 4 groups
Feb  9 18:54:36.075250 kernel: rcu: Hierarchical RCU implementation.
Feb  9 18:54:36.075266 kernel: rcu:         RCU event tracing is enabled.
Feb  9 18:54:36.075281 kernel: rcu:         RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2.
Feb  9 18:54:36.075296 kernel:         Rude variant of Tasks RCU enabled.
Feb  9 18:54:36.075311 kernel:         Tracing variant of Tasks RCU enabled.
Feb  9 18:54:36.075327 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Feb  9 18:54:36.075358 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2
Feb  9 18:54:36.075370 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16
Feb  9 18:54:36.075388 kernel: random: crng init done
Feb  9 18:54:36.075402 kernel: Console: colour VGA+ 80x25
Feb  9 18:54:36.075416 kernel: printk: console [ttyS0] enabled
Feb  9 18:54:36.075431 kernel: ACPI: Core revision 20210730
Feb  9 18:54:36.075447 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns
Feb  9 18:54:36.075459 kernel: APIC: Switch to symmetric I/O mode setup
Feb  9 18:54:36.075473 kernel: x2apic enabled
Feb  9 18:54:36.075488 kernel: Switched APIC routing to physical x2apic.
Feb  9 18:54:36.075503 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240933eba6e, max_idle_ns: 440795246008 ns
Feb  9 18:54:36.075522 kernel: Calibrating delay loop (skipped) preset value.. 4999.98 BogoMIPS (lpj=2499994)
Feb  9 18:54:36.075535 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8
Feb  9 18:54:36.075549 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4
Feb  9 18:54:36.075564 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Feb  9 18:54:36.075589 kernel: Spectre V2 : Mitigation: Retpolines
Feb  9 18:54:36.075606 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
Feb  9 18:54:36.075621 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT
Feb  9 18:54:36.075636 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible!
Feb  9 18:54:36.075651 kernel: RETBleed: Vulnerable
Feb  9 18:54:36.075665 kernel: Speculative Store Bypass: Vulnerable
Feb  9 18:54:36.075680 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode
Feb  9 18:54:36.075694 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode
Feb  9 18:54:36.075708 kernel: GDS: Unknown: Dependent on hypervisor status
Feb  9 18:54:36.075723 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Feb  9 18:54:36.075741 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Feb  9 18:54:36.075757 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Feb  9 18:54:36.075772 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers'
Feb  9 18:54:36.075786 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR'
Feb  9 18:54:36.075801 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask'
Feb  9 18:54:36.075819 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256'
Feb  9 18:54:36.075834 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256'
Feb  9 18:54:36.075848 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers'
Feb  9 18:54:36.075863 kernel: x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
Feb  9 18:54:36.075878 kernel: x86/fpu: xstate_offset[3]:  832, xstate_sizes[3]:   64
Feb  9 18:54:36.075893 kernel: x86/fpu: xstate_offset[4]:  896, xstate_sizes[4]:   64
Feb  9 18:54:36.075908 kernel: x86/fpu: xstate_offset[5]:  960, xstate_sizes[5]:   64
Feb  9 18:54:36.075923 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]:  512
Feb  9 18:54:36.075937 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024
Feb  9 18:54:36.075952 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]:    8
Feb  9 18:54:36.075967 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format.
Feb  9 18:54:36.075981 kernel: Freeing SMP alternatives memory: 32K
Feb  9 18:54:36.075997 kernel: pid_max: default: 32768 minimum: 301
Feb  9 18:54:36.076011 kernel: LSM: Security Framework initializing
Feb  9 18:54:36.076026 kernel: SELinux:  Initializing.
Feb  9 18:54:36.076040 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear)
Feb  9 18:54:36.076055 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear)
Feb  9 18:54:36.076070 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7)
Feb  9 18:54:36.076085 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only.
Feb  9 18:54:36.076100 kernel: signal: max sigframe size: 3632
Feb  9 18:54:36.076115 kernel: rcu: Hierarchical SRCU implementation.
Feb  9 18:54:36.076130 kernel: NMI watchdog: Perf NMI watchdog permanently disabled
Feb  9 18:54:36.076147 kernel: smp: Bringing up secondary CPUs ...
Feb  9 18:54:36.076162 kernel: x86: Booting SMP configuration:
Feb  9 18:54:36.076177 kernel: .... node  #0, CPUs:      #1
Feb  9 18:54:36.076192 kernel: kvm-clock: cpu 1, msr 32faa041, secondary cpu clock
Feb  9 18:54:36.076207 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0
Feb  9 18:54:36.076222 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details.
Feb  9 18:54:36.076238 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details.
Feb  9 18:54:36.076253 kernel: smp: Brought up 1 node, 2 CPUs
Feb  9 18:54:36.076267 kernel: smpboot: Max logical packages: 1
Feb  9 18:54:36.076285 kernel: smpboot: Total of 2 processors activated (9999.97 BogoMIPS)
Feb  9 18:54:36.076300 kernel: devtmpfs: initialized
Feb  9 18:54:36.076314 kernel: x86/mm: Memory block size: 128MB
Feb  9 18:54:36.076329 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Feb  9 18:54:36.076375 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear)
Feb  9 18:54:36.076390 kernel: pinctrl core: initialized pinctrl subsystem
Feb  9 18:54:36.076732 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
Feb  9 18:54:36.076748 kernel: audit: initializing netlink subsys (disabled)
Feb  9 18:54:36.076764 kernel: audit: type=2000 audit(1707504874.889:1): state=initialized audit_enabled=0 res=1
Feb  9 18:54:36.076783 kernel: thermal_sys: Registered thermal governor 'step_wise'
Feb  9 18:54:36.076798 kernel: thermal_sys: Registered thermal governor 'user_space'
Feb  9 18:54:36.076813 kernel: cpuidle: using governor menu
Feb  9 18:54:36.076860 kernel: ACPI: bus type PCI registered
Feb  9 18:54:36.076877 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Feb  9 18:54:36.076892 kernel: dca service started, version 1.12.1
Feb  9 18:54:36.076907 kernel: PCI: Using configuration type 1 for base access
Feb  9 18:54:36.076922 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible.
Feb  9 18:54:36.076934 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages
Feb  9 18:54:36.076950 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages
Feb  9 18:54:36.076964 kernel: ACPI: Added _OSI(Module Device)
Feb  9 18:54:36.077033 kernel: ACPI: Added _OSI(Processor Device)
Feb  9 18:54:36.077050 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Feb  9 18:54:36.077066 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Feb  9 18:54:36.077081 kernel: ACPI: Added _OSI(Linux-Dell-Video)
Feb  9 18:54:36.077096 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
Feb  9 18:54:36.077111 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
Feb  9 18:54:36.077126 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded
Feb  9 18:54:36.077145 kernel: ACPI: Interpreter enabled
Feb  9 18:54:36.077159 kernel: ACPI: PM: (supports S0 S5)
Feb  9 18:54:36.077174 kernel: ACPI: Using IOAPIC for interrupt routing
Feb  9 18:54:36.077189 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
Feb  9 18:54:36.077204 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F
Feb  9 18:54:36.077219 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
Feb  9 18:54:36.077420 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3]
Feb  9 18:54:36.077554 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge.
Feb  9 18:54:36.077577 kernel: acpiphp: Slot [3] registered
Feb  9 18:54:36.077592 kernel: acpiphp: Slot [4] registered
Feb  9 18:54:36.077607 kernel: acpiphp: Slot [5] registered
Feb  9 18:54:36.077622 kernel: acpiphp: Slot [6] registered
Feb  9 18:54:36.077637 kernel: acpiphp: Slot [7] registered
Feb  9 18:54:36.077652 kernel: acpiphp: Slot [8] registered
Feb  9 18:54:36.077666 kernel: acpiphp: Slot [9] registered
Feb  9 18:54:36.077682 kernel: acpiphp: Slot [10] registered
Feb  9 18:54:36.077697 kernel: acpiphp: Slot [11] registered
Feb  9 18:54:36.077714 kernel: acpiphp: Slot [12] registered
Feb  9 18:54:36.077729 kernel: acpiphp: Slot [13] registered
Feb  9 18:54:36.077819 kernel: acpiphp: Slot [14] registered
Feb  9 18:54:36.077835 kernel: acpiphp: Slot [15] registered
Feb  9 18:54:36.077850 kernel: acpiphp: Slot [16] registered
Feb  9 18:54:36.077865 kernel: acpiphp: Slot [17] registered
Feb  9 18:54:36.077880 kernel: acpiphp: Slot [18] registered
Feb  9 18:54:36.077894 kernel: acpiphp: Slot [19] registered
Feb  9 18:54:36.077909 kernel: acpiphp: Slot [20] registered
Feb  9 18:54:36.077927 kernel: acpiphp: Slot [21] registered
Feb  9 18:54:36.077941 kernel: acpiphp: Slot [22] registered
Feb  9 18:54:36.077953 kernel: acpiphp: Slot [23] registered
Feb  9 18:54:36.077967 kernel: acpiphp: Slot [24] registered
Feb  9 18:54:36.077981 kernel: acpiphp: Slot [25] registered
Feb  9 18:54:36.077996 kernel: acpiphp: Slot [26] registered
Feb  9 18:54:36.078011 kernel: acpiphp: Slot [27] registered
Feb  9 18:54:36.078026 kernel: acpiphp: Slot [28] registered
Feb  9 18:54:36.078041 kernel: acpiphp: Slot [29] registered
Feb  9 18:54:36.078056 kernel: acpiphp: Slot [30] registered
Feb  9 18:54:36.078074 kernel: acpiphp: Slot [31] registered
Feb  9 18:54:36.078089 kernel: PCI host bridge to bus 0000:00
Feb  9 18:54:36.078230 kernel: pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
Feb  9 18:54:36.078360 kernel: pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
Feb  9 18:54:36.078472 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
Feb  9 18:54:36.078583 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window]
Feb  9 18:54:36.078694 kernel: pci_bus 0000:00: root bus resource [bus 00-ff]
Feb  9 18:54:36.078845 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000
Feb  9 18:54:36.078984 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100
Feb  9 18:54:36.079205 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000
Feb  9 18:54:36.079349 kernel: pci 0000:00:01.3: quirk: [io  0xb000-0xb03f] claimed by PIIX4 ACPI
Feb  9 18:54:36.079480 kernel: pci 0000:00:01.3: quirk: [io  0xb100-0xb10f] claimed by PIIX4 SMB
Feb  9 18:54:36.079610 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff
Feb  9 18:54:36.079748 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff
Feb  9 18:54:36.079902 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff
Feb  9 18:54:36.080037 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff
Feb  9 18:54:36.093484 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff
Feb  9 18:54:36.093649 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff
Feb  9 18:54:36.093778 kernel: pci 0000:00:01.3: quirk_piix4_acpi+0x0/0x170 took 10742 usecs
Feb  9 18:54:36.093913 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000
Feb  9 18:54:36.094039 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref]
Feb  9 18:54:36.094170 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref]
Feb  9 18:54:36.094293 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff]
Feb  9 18:54:36.094441 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802
Feb  9 18:54:36.094727 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff]
Feb  9 18:54:36.094876 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000
Feb  9 18:54:36.095001 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff]
Feb  9 18:54:36.095024 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10
Feb  9 18:54:36.095039 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10
Feb  9 18:54:36.095065 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11
Feb  9 18:54:36.095078 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11
Feb  9 18:54:36.095092 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9
Feb  9 18:54:36.095106 kernel: iommu: Default domain type: Translated 
Feb  9 18:54:36.095120 kernel: iommu: DMA domain TLB invalidation policy: lazy mode 
Feb  9 18:54:36.095239 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device
Feb  9 18:54:36.096356 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none
Feb  9 18:54:36.096500 kernel: pci 0000:00:03.0: vgaarb: bridge control possible
Feb  9 18:54:36.096518 kernel: vgaarb: loaded
Feb  9 18:54:36.096532 kernel: pps_core: LinuxPPS API ver. 1 registered
Feb  9 18:54:36.096546 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Feb  9 18:54:36.096559 kernel: PTP clock support registered
Feb  9 18:54:36.096573 kernel: PCI: Using ACPI for IRQ routing
Feb  9 18:54:36.096586 kernel: PCI: pci_cache_line_size set to 64 bytes
Feb  9 18:54:36.096599 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff]
Feb  9 18:54:36.096615 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff]
Feb  9 18:54:36.096628 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0
Feb  9 18:54:36.096641 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter
Feb  9 18:54:36.096654 kernel: clocksource: Switched to clocksource kvm-clock
Feb  9 18:54:36.096668 kernel: VFS: Disk quotas dquot_6.6.0
Feb  9 18:54:36.096681 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Feb  9 18:54:36.096694 kernel: pnp: PnP ACPI init
Feb  9 18:54:36.096706 kernel: pnp: PnP ACPI: found 5 devices
Feb  9 18:54:36.096719 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
Feb  9 18:54:36.096735 kernel: NET: Registered PF_INET protocol family
Feb  9 18:54:36.096748 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear)
Feb  9 18:54:36.096761 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear)
Feb  9 18:54:36.096774 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Feb  9 18:54:36.096787 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear)
Feb  9 18:54:36.096800 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear)
Feb  9 18:54:36.096813 kernel: TCP: Hash tables configured (established 16384 bind 16384)
Feb  9 18:54:36.096826 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear)
Feb  9 18:54:36.096840 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear)
Feb  9 18:54:36.096926 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
Feb  9 18:54:36.096939 kernel: NET: Registered PF_XDP protocol family
Feb  9 18:54:36.097062 kernel: pci_bus 0000:00: resource 4 [io  0x0000-0x0cf7 window]
Feb  9 18:54:36.097173 kernel: pci_bus 0000:00: resource 5 [io  0x0d00-0xffff window]
Feb  9 18:54:36.097283 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window]
Feb  9 18:54:36.097399 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window]
Feb  9 18:54:36.097599 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers
Feb  9 18:54:36.097725 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds
Feb  9 18:54:36.097748 kernel: PCI: CLS 0 bytes, default 64
Feb  9 18:54:36.097761 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer
Feb  9 18:54:36.097775 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240933eba6e, max_idle_ns: 440795246008 ns
Feb  9 18:54:36.097788 kernel: clocksource: Switched to clocksource tsc
Feb  9 18:54:36.097802 kernel: Initialise system trusted keyrings
Feb  9 18:54:36.097815 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0
Feb  9 18:54:36.097829 kernel: Key type asymmetric registered
Feb  9 18:54:36.097842 kernel: Asymmetric key parser 'x509' registered
Feb  9 18:54:36.097858 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249)
Feb  9 18:54:36.097871 kernel: io scheduler mq-deadline registered
Feb  9 18:54:36.097884 kernel: io scheduler kyber registered
Feb  9 18:54:36.097897 kernel: io scheduler bfq registered
Feb  9 18:54:36.097910 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00
Feb  9 18:54:36.097923 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
Feb  9 18:54:36.097936 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
Feb  9 18:54:36.097950 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12
Feb  9 18:54:36.098047 kernel: i8042: Warning: Keylock active
Feb  9 18:54:36.098065 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1
Feb  9 18:54:36.098078 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12
Feb  9 18:54:36.098218 kernel: rtc_cmos 00:00: RTC can wake from S4
Feb  9 18:54:36.098348 kernel: rtc_cmos 00:00: registered as rtc0
Feb  9 18:54:36.098459 kernel: rtc_cmos 00:00: setting system clock to 2024-02-09T18:54:35 UTC (1707504875)
Feb  9 18:54:36.098568 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram
Feb  9 18:54:36.098584 kernel: intel_pstate: CPU model not supported
Feb  9 18:54:36.098598 kernel: NET: Registered PF_INET6 protocol family
Feb  9 18:54:36.098614 kernel: Segment Routing with IPv6
Feb  9 18:54:36.098627 kernel: In-situ OAM (IOAM) with IPv6
Feb  9 18:54:36.098640 kernel: NET: Registered PF_PACKET protocol family
Feb  9 18:54:36.098652 kernel: Key type dns_resolver registered
Feb  9 18:54:36.098666 kernel: IPI shorthand broadcast: enabled
Feb  9 18:54:36.098679 kernel: sched_clock: Marking stable (492172043, 263592138)->(857189183, -101425002)
Feb  9 18:54:36.098692 kernel: registered taskstats version 1
Feb  9 18:54:36.098705 kernel: Loading compiled-in X.509 certificates
Feb  9 18:54:36.098718 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a'
Feb  9 18:54:36.098734 kernel: Key type .fscrypt registered
Feb  9 18:54:36.098747 kernel: Key type fscrypt-provisioning registered
Feb  9 18:54:36.098760 kernel: ima: No TPM chip found, activating TPM-bypass!
Feb  9 18:54:36.098773 kernel: ima: Allocated hash algorithm: sha1
Feb  9 18:54:36.098786 kernel: ima: No architecture policies found
Feb  9 18:54:36.098799 kernel: Freeing unused kernel image (initmem) memory: 45496K
Feb  9 18:54:36.098812 kernel: Write protecting the kernel read-only data: 28672k
Feb  9 18:54:36.098825 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K
Feb  9 18:54:36.098838 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K
Feb  9 18:54:36.098853 kernel: Run /init as init process
Feb  9 18:54:36.098866 kernel:   with arguments:
Feb  9 18:54:36.098879 kernel:     /init
Feb  9 18:54:36.098903 kernel:   with environment:
Feb  9 18:54:36.098915 kernel:     HOME=/
Feb  9 18:54:36.098927 kernel:     TERM=linux
Feb  9 18:54:36.098939 kernel:     BOOT_IMAGE=/flatcar/vmlinuz-a
Feb  9 18:54:36.098954 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Feb  9 18:54:36.098973 systemd[1]: Detected virtualization amazon.
Feb  9 18:54:36.098986 systemd[1]: Detected architecture x86-64.
Feb  9 18:54:36.098999 systemd[1]: Running in initrd.
Feb  9 18:54:36.099013 systemd[1]: No hostname configured, using default hostname.
Feb  9 18:54:36.099042 systemd[1]: Hostname set to <localhost>.
Feb  9 18:54:36.099061 systemd[1]: Initializing machine ID from VM UUID.
Feb  9 18:54:36.099075 systemd[1]: Queued start job for default target initrd.target.
Feb  9 18:54:36.099089 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0
Feb  9 18:54:36.099103 systemd[1]: Started systemd-ask-password-console.path.
Feb  9 18:54:36.099116 systemd[1]: Reached target cryptsetup.target.
Feb  9 18:54:36.099129 systemd[1]: Reached target paths.target.
Feb  9 18:54:36.099142 systemd[1]: Reached target slices.target.
Feb  9 18:54:36.099156 systemd[1]: Reached target swap.target.
Feb  9 18:54:36.099170 systemd[1]: Reached target timers.target.
Feb  9 18:54:36.099187 systemd[1]: Listening on iscsid.socket.
Feb  9 18:54:36.099202 systemd[1]: Listening on iscsiuio.socket.
Feb  9 18:54:36.099215 systemd[1]: Listening on systemd-journald-audit.socket.
Feb  9 18:54:36.099229 systemd[1]: Listening on systemd-journald-dev-log.socket.
Feb  9 18:54:36.099243 systemd[1]: Listening on systemd-journald.socket.
Feb  9 18:54:36.099257 systemd[1]: Listening on systemd-networkd.socket.
Feb  9 18:54:36.099271 systemd[1]: Listening on systemd-udevd-control.socket.
Feb  9 18:54:36.099287 systemd[1]: Listening on systemd-udevd-kernel.socket.
Feb  9 18:54:36.099301 systemd[1]: Reached target sockets.target.
Feb  9 18:54:36.099342 systemd[1]: Starting kmod-static-nodes.service...
Feb  9 18:54:36.099406 systemd[1]: Finished network-cleanup.service.
Feb  9 18:54:36.099421 systemd[1]: Starting systemd-fsck-usr.service...
Feb  9 18:54:36.099436 systemd[1]: Starting systemd-journald.service...
Feb  9 18:54:36.099451 systemd[1]: Starting systemd-modules-load.service...
Feb  9 18:54:36.099466 systemd[1]: Starting systemd-resolved.service...
Feb  9 18:54:36.099480 systemd[1]: Starting systemd-vconsole-setup.service...
Feb  9 18:54:36.099497 systemd[1]: Finished kmod-static-nodes.service.
Feb  9 18:54:36.099512 systemd[1]: Finished systemd-fsck-usr.service.
Feb  9 18:54:36.099527 kernel: audit: type=1130 audit(1707504876.095:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:36.099546 systemd-journald[185]: Journal started
Feb  9 18:54:36.099615 systemd-journald[185]: Runtime Journal (/run/log/journal/ec27d44289180b6a89539b67a5d69c71) is 4.8M, max 38.7M, 33.9M free.
Feb  9 18:54:36.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:36.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:36.103350 systemd[1]: Started systemd-journald.service.
Feb  9 18:54:36.103380 kernel: audit: type=1130 audit(1707504876.102:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:36.113547 systemd-modules-load[186]: Inserted module 'overlay'
Feb  9 18:54:36.275666 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Feb  9 18:54:36.275714 kernel: Bridge firewalling registered
Feb  9 18:54:36.275738 kernel: SCSI subsystem initialized
Feb  9 18:54:36.275757 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log.
Feb  9 18:54:36.275775 kernel: device-mapper: uevent: version 1.0.3
Feb  9 18:54:36.275792 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com
Feb  9 18:54:36.275809 kernel: audit: type=1130 audit(1707504876.262:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:36.275829 kernel: audit: type=1130 audit(1707504876.268:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:36.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:36.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:36.124876 systemd-resolved[187]: Positive Trust Anchors:
Feb  9 18:54:36.287910 kernel: audit: type=1130 audit(1707504876.275:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:36.287949 kernel: audit: type=1130 audit(1707504876.280:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:36.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:36.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:36.124887 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Feb  9 18:54:36.124940 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Feb  9 18:54:36.129049 systemd-resolved[187]: Defaulting to hostname 'linux'.
Feb  9 18:54:36.152047 systemd-modules-load[186]: Inserted module 'br_netfilter'
Feb  9 18:54:36.192421 systemd-modules-load[186]: Inserted module 'dm_multipath'
Feb  9 18:54:36.263468 systemd[1]: Started systemd-resolved.service.
Feb  9 18:54:36.269222 systemd[1]: Finished systemd-modules-load.service.
Feb  9 18:54:36.275963 systemd[1]: Finished systemd-vconsole-setup.service.
Feb  9 18:54:36.281565 systemd[1]: Reached target nss-lookup.target.
Feb  9 18:54:36.288693 systemd[1]: Starting dracut-cmdline-ask.service...
Feb  9 18:54:36.290812 systemd[1]: Starting systemd-sysctl.service...
Feb  9 18:54:36.301430 systemd[1]: Starting systemd-tmpfiles-setup-dev.service...
Feb  9 18:54:36.318514 systemd[1]: Finished systemd-tmpfiles-setup-dev.service.
Feb  9 18:54:36.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:36.324385 kernel: audit: type=1130 audit(1707504876.318:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:36.328896 systemd[1]: Finished systemd-sysctl.service.
Feb  9 18:54:36.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:36.334358 kernel: audit: type=1130 audit(1707504876.328:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:36.340489 systemd[1]: Finished dracut-cmdline-ask.service.
Feb  9 18:54:36.341778 systemd[1]: Starting dracut-cmdline.service...
Feb  9 18:54:36.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:36.353643 kernel: audit: type=1130 audit(1707504876.340:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:36.360606 dracut-cmdline[206]: dracut-dracut-053
Feb  9 18:54:36.363766 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6
Feb  9 18:54:36.448356 kernel: Loading iSCSI transport class v2.0-870.
Feb  9 18:54:36.461356 kernel: iscsi: registered transport (tcp)
Feb  9 18:54:36.485958 kernel: iscsi: registered transport (qla4xxx)
Feb  9 18:54:36.486033 kernel: QLogic iSCSI HBA Driver
Feb  9 18:54:36.533274 systemd[1]: Finished dracut-cmdline.service.
Feb  9 18:54:36.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:36.536032 systemd[1]: Starting dracut-pre-udev.service...
Feb  9 18:54:36.594381 kernel: raid6: avx512x4 gen() 16432 MB/s
Feb  9 18:54:36.611376 kernel: raid6: avx512x4 xor()  7312 MB/s
Feb  9 18:54:36.628369 kernel: raid6: avx512x2 gen() 16346 MB/s
Feb  9 18:54:36.647374 kernel: raid6: avx512x2 xor() 22453 MB/s
Feb  9 18:54:36.664386 kernel: raid6: avx512x1 gen() 15023 MB/s
Feb  9 18:54:36.681385 kernel: raid6: avx512x1 xor() 20140 MB/s
Feb  9 18:54:36.698385 kernel: raid6: avx2x4   gen() 15156 MB/s
Feb  9 18:54:36.715373 kernel: raid6: avx2x4   xor()  6776 MB/s
Feb  9 18:54:36.732389 kernel: raid6: avx2x2   gen() 16480 MB/s
Feb  9 18:54:36.749386 kernel: raid6: avx2x2   xor() 13474 MB/s
Feb  9 18:54:36.766378 kernel: raid6: avx2x1   gen() 12541 MB/s
Feb  9 18:54:36.784384 kernel: raid6: avx2x1   xor() 14531 MB/s
Feb  9 18:54:36.801379 kernel: raid6: sse2x4   gen()  9114 MB/s
Feb  9 18:54:36.818382 kernel: raid6: sse2x4   xor()  5583 MB/s
Feb  9 18:54:36.836370 kernel: raid6: sse2x2   gen()  9837 MB/s
Feb  9 18:54:36.853382 kernel: raid6: sse2x2   xor()  5518 MB/s
Feb  9 18:54:36.871382 kernel: raid6: sse2x1   gen()  8825 MB/s
Feb  9 18:54:36.889634 kernel: raid6: sse2x1   xor()  3007 MB/s
Feb  9 18:54:36.889716 kernel: raid6: using algorithm avx2x2 gen() 16480 MB/s
Feb  9 18:54:36.889735 kernel: raid6: .... xor() 13474 MB/s, rmw enabled
Feb  9 18:54:36.891985 kernel: raid6: using avx512x2 recovery algorithm
Feb  9 18:54:36.910371 kernel: xor: automatically using best checksumming function   avx       
Feb  9 18:54:37.055383 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no
Feb  9 18:54:37.065545 systemd[1]: Finished dracut-pre-udev.service.
Feb  9 18:54:37.068729 systemd[1]: Starting systemd-udevd.service...
Feb  9 18:54:37.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:37.067000 audit: BPF prog-id=7 op=LOAD
Feb  9 18:54:37.067000 audit: BPF prog-id=8 op=LOAD
Feb  9 18:54:37.084564 systemd-udevd[384]: Using default interface naming scheme 'v252'.
Feb  9 18:54:37.090316 systemd[1]: Started systemd-udevd.service.
Feb  9 18:54:37.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:37.092832 systemd[1]: Starting dracut-pre-trigger.service...
Feb  9 18:54:37.113571 dracut-pre-trigger[388]: rd.md=0: removing MD RAID activation
Feb  9 18:54:37.150097 systemd[1]: Finished dracut-pre-trigger.service.
Feb  9 18:54:37.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:37.152697 systemd[1]: Starting systemd-udev-trigger.service...
Feb  9 18:54:37.214918 systemd[1]: Finished systemd-udev-trigger.service.
Feb  9 18:54:37.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:37.286352 kernel: cryptd: max_cpu_qlen set to 1000
Feb  9 18:54:37.305647 kernel: ena 0000:00:05.0: ENA device version: 0.10
Feb  9 18:54:37.306020 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1
Feb  9 18:54:37.311355 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy.
Feb  9 18:54:37.320366 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:dc:06:20:a5:09
Feb  9 18:54:37.324354 kernel: AVX2 version of gcm_enc/dec engaged.
Feb  9 18:54:37.324413 kernel: AES CTR mode by8 optimization enabled
Feb  9 18:54:37.324751 (udev-worker)[425]: Network interface NamePolicy= disabled on kernel command line.
Feb  9 18:54:37.565702 kernel: nvme nvme0: pci function 0000:00:04.0
Feb  9 18:54:37.565939 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11
Feb  9 18:54:37.565961 kernel: nvme nvme0: 2/0/0 default/read/poll queues
Feb  9 18:54:37.566099 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk.
Feb  9 18:54:37.566117 kernel: GPT:9289727 != 16777215
Feb  9 18:54:37.566133 kernel: GPT:Alternate GPT header not at the end of the disk.
Feb  9 18:54:37.566149 kernel: GPT:9289727 != 16777215
Feb  9 18:54:37.566165 kernel: GPT: Use GNU Parted to correct GPT errors.
Feb  9 18:54:37.566181 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Feb  9 18:54:37.566198 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (427)
Feb  9 18:54:37.517266 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Feb  9 18:54:37.574307 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device.
Feb  9 18:54:37.587923 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device.
Feb  9 18:54:37.588044 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device.
Feb  9 18:54:37.602248 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device.
Feb  9 18:54:37.605167 systemd[1]: Starting disk-uuid.service...
Feb  9 18:54:37.613948 disk-uuid[589]: Primary Header is updated.
Feb  9 18:54:37.613948 disk-uuid[589]: Secondary Entries is updated.
Feb  9 18:54:37.613948 disk-uuid[589]: Secondary Header is updated.
Feb  9 18:54:37.619354 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Feb  9 18:54:37.630358 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Feb  9 18:54:37.638360 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Feb  9 18:54:38.636357 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Feb  9 18:54:38.636431 disk-uuid[590]: The operation has completed successfully.
Feb  9 18:54:38.782572 systemd[1]: disk-uuid.service: Deactivated successfully.
Feb  9 18:54:38.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:38.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:38.782834 systemd[1]: Finished disk-uuid.service.
Feb  9 18:54:38.798472 systemd[1]: Starting verity-setup.service...
Feb  9 18:54:38.825353 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2"
Feb  9 18:54:38.934841 systemd[1]: Found device dev-mapper-usr.device.
Feb  9 18:54:38.937155 systemd[1]: Finished verity-setup.service.
Feb  9 18:54:38.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:38.939838 systemd[1]: Mounting sysusr-usr.mount...
Feb  9 18:54:39.044498 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none.
Feb  9 18:54:39.044966 systemd[1]: Mounted sysusr-usr.mount.
Feb  9 18:54:39.046026 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met.
Feb  9 18:54:39.047084 systemd[1]: Starting ignition-setup.service...
Feb  9 18:54:39.052615 systemd[1]: Starting parse-ip-for-networkd.service...
Feb  9 18:54:39.074831 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm
Feb  9 18:54:39.074893 kernel: BTRFS info (device nvme0n1p6): using free space tree
Feb  9 18:54:39.074907 kernel: BTRFS info (device nvme0n1p6): has skinny extents
Feb  9 18:54:39.088367 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations
Feb  9 18:54:39.105140 systemd[1]: mnt-oem.mount: Deactivated successfully.
Feb  9 18:54:39.146035 systemd[1]: Finished ignition-setup.service.
Feb  9 18:54:39.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:39.147432 systemd[1]: Starting ignition-fetch-offline.service...
Feb  9 18:54:39.158015 systemd[1]: Finished parse-ip-for-networkd.service.
Feb  9 18:54:39.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:39.160000 audit: BPF prog-id=9 op=LOAD
Feb  9 18:54:39.161035 systemd[1]: Starting systemd-networkd.service...
Feb  9 18:54:39.188424 systemd-networkd[1101]: lo: Link UP
Feb  9 18:54:39.188698 systemd-networkd[1101]: lo: Gained carrier
Feb  9 18:54:39.189320 systemd-networkd[1101]: Enumeration completed
Feb  9 18:54:39.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:39.190446 systemd[1]: Started systemd-networkd.service.
Feb  9 18:54:39.190922 systemd-networkd[1101]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Feb  9 18:54:39.192200 systemd[1]: Reached target network.target.
Feb  9 18:54:39.194482 systemd[1]: Starting iscsiuio.service...
Feb  9 18:54:39.194688 systemd-networkd[1101]: eth0: Link UP
Feb  9 18:54:39.194694 systemd-networkd[1101]: eth0: Gained carrier
Feb  9 18:54:39.209742 systemd[1]: Started iscsiuio.service.
Feb  9 18:54:39.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:39.212367 systemd-networkd[1101]: eth0: DHCPv4 address 172.31.23.165/20, gateway 172.31.16.1 acquired from 172.31.16.1
Feb  9 18:54:39.216622 systemd[1]: Starting iscsid.service...
Feb  9 18:54:39.221380 iscsid[1106]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi
Feb  9 18:54:39.221380 iscsid[1106]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log
Feb  9 18:54:39.221380 iscsid[1106]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier].
Feb  9 18:54:39.221380 iscsid[1106]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6.
Feb  9 18:54:39.221380 iscsid[1106]: If using hardware iscsi like qla4xxx this message can be ignored.
Feb  9 18:54:39.221380 iscsid[1106]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi
Feb  9 18:54:39.221380 iscsid[1106]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf
Feb  9 18:54:39.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:39.224627 systemd[1]: Started iscsid.service.
Feb  9 18:54:39.226046 systemd[1]: Starting dracut-initqueue.service...
Feb  9 18:54:39.243630 systemd[1]: Finished dracut-initqueue.service.
Feb  9 18:54:39.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:39.244909 systemd[1]: Reached target remote-fs-pre.target.
Feb  9 18:54:39.245882 systemd[1]: Reached target remote-cryptsetup.target.
Feb  9 18:54:39.246950 systemd[1]: Reached target remote-fs.target.
Feb  9 18:54:39.252550 systemd[1]: Starting dracut-pre-mount.service...
Feb  9 18:54:39.262513 systemd[1]: Finished dracut-pre-mount.service.
Feb  9 18:54:39.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:39.773607 ignition[1097]: Ignition 2.14.0
Feb  9 18:54:39.773621 ignition[1097]: Stage: fetch-offline
Feb  9 18:54:39.773785 ignition[1097]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Feb  9 18:54:39.773834 ignition[1097]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Feb  9 18:54:39.788758 ignition[1097]: no config dir at "/usr/lib/ignition/base.platform.d/aws"
Feb  9 18:54:39.789075 ignition[1097]: Ignition finished successfully
Feb  9 18:54:39.792103 systemd[1]: Finished ignition-fetch-offline.service.
Feb  9 18:54:39.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:39.795429 systemd[1]: Starting ignition-fetch.service...
Feb  9 18:54:39.804888 ignition[1125]: Ignition 2.14.0
Feb  9 18:54:39.804901 ignition[1125]: Stage: fetch
Feb  9 18:54:39.805092 ignition[1125]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Feb  9 18:54:39.805121 ignition[1125]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Feb  9 18:54:39.815696 ignition[1125]: no config dir at "/usr/lib/ignition/base.platform.d/aws"
Feb  9 18:54:39.817177 ignition[1125]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Feb  9 18:54:39.843754 ignition[1125]: INFO     : PUT result: OK
Feb  9 18:54:39.855915 ignition[1125]: DEBUG    : parsed url from cmdline: ""
Feb  9 18:54:39.855915 ignition[1125]: INFO     : no config URL provided
Feb  9 18:54:39.855915 ignition[1125]: INFO     : reading system config file "/usr/lib/ignition/user.ign"
Feb  9 18:54:39.855915 ignition[1125]: INFO     : no config at "/usr/lib/ignition/user.ign"
Feb  9 18:54:39.867990 ignition[1125]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Feb  9 18:54:39.867990 ignition[1125]: INFO     : PUT result: OK
Feb  9 18:54:39.867990 ignition[1125]: INFO     : GET http://169.254.169.254/2019-10-01/user-data: attempt #1
Feb  9 18:54:39.871837 ignition[1125]: INFO     : GET result: OK
Feb  9 18:54:39.873480 ignition[1125]: DEBUG    : parsing config with SHA512: 081200cd7e5f2eaa11540bca08717a1a46b09313ab58eee18b2d800f6ba2998621a1904ba33b930316939f56c3877ac0f691d7839268a200d37f59066ad7d5a1
Feb  9 18:54:39.940907 unknown[1125]: fetched base config from "system"
Feb  9 18:54:39.940921 unknown[1125]: fetched base config from "system"
Feb  9 18:54:39.940929 unknown[1125]: fetched user config from "aws"
Feb  9 18:54:39.944429 ignition[1125]: fetch: fetch complete
Feb  9 18:54:39.944439 ignition[1125]: fetch: fetch passed
Feb  9 18:54:39.944509 ignition[1125]: Ignition finished successfully
Feb  9 18:54:39.949221 systemd[1]: Finished ignition-fetch.service.
Feb  9 18:54:39.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:39.951549 systemd[1]: Starting ignition-kargs.service...
Feb  9 18:54:39.964075 ignition[1131]: Ignition 2.14.0
Feb  9 18:54:39.964089 ignition[1131]: Stage: kargs
Feb  9 18:54:39.964290 ignition[1131]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Feb  9 18:54:39.964321 ignition[1131]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Feb  9 18:54:39.975472 ignition[1131]: no config dir at "/usr/lib/ignition/base.platform.d/aws"
Feb  9 18:54:39.977041 ignition[1131]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Feb  9 18:54:39.979568 ignition[1131]: INFO     : PUT result: OK
Feb  9 18:54:39.984350 ignition[1131]: kargs: kargs passed
Feb  9 18:54:39.984416 ignition[1131]: Ignition finished successfully
Feb  9 18:54:39.986850 systemd[1]: Finished ignition-kargs.service.
Feb  9 18:54:39.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:39.988027 systemd[1]: Starting ignition-disks.service...
Feb  9 18:54:40.002381 ignition[1137]: Ignition 2.14.0
Feb  9 18:54:40.002394 ignition[1137]: Stage: disks
Feb  9 18:54:40.002614 ignition[1137]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Feb  9 18:54:40.002646 ignition[1137]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Feb  9 18:54:40.015069 ignition[1137]: no config dir at "/usr/lib/ignition/base.platform.d/aws"
Feb  9 18:54:40.016511 ignition[1137]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Feb  9 18:54:40.019004 ignition[1137]: INFO     : PUT result: OK
Feb  9 18:54:40.022638 ignition[1137]: disks: disks passed
Feb  9 18:54:40.022786 ignition[1137]: Ignition finished successfully
Feb  9 18:54:40.025437 systemd[1]: Finished ignition-disks.service.
Feb  9 18:54:40.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:40.025787 systemd[1]: Reached target initrd-root-device.target.
Feb  9 18:54:40.028592 systemd[1]: Reached target local-fs-pre.target.
Feb  9 18:54:40.032101 systemd[1]: Reached target local-fs.target.
Feb  9 18:54:40.034288 systemd[1]: Reached target sysinit.target.
Feb  9 18:54:40.034357 systemd[1]: Reached target basic.target.
Feb  9 18:54:40.036346 systemd[1]: Starting systemd-fsck-root.service...
Feb  9 18:54:40.080991 systemd-fsck[1145]: ROOT: clean, 602/553520 files, 56014/553472 blocks
Feb  9 18:54:40.086982 systemd[1]: Finished systemd-fsck-root.service.
Feb  9 18:54:40.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:40.090095 systemd[1]: Mounting sysroot.mount...
Feb  9 18:54:40.104368 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none.
Feb  9 18:54:40.105307 systemd[1]: Mounted sysroot.mount.
Feb  9 18:54:40.109366 systemd[1]: Reached target initrd-root-fs.target.
Feb  9 18:54:40.126385 systemd[1]: Mounting sysroot-usr.mount...
Feb  9 18:54:40.128026 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met.
Feb  9 18:54:40.128092 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot).
Feb  9 18:54:40.128129 systemd[1]: Reached target ignition-diskful.target.
Feb  9 18:54:40.138721 systemd[1]: Mounted sysroot-usr.mount.
Feb  9 18:54:40.157163 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Feb  9 18:54:40.159021 systemd[1]: Starting initrd-setup-root.service...
Feb  9 18:54:40.169417 initrd-setup-root[1167]: cut: /sysroot/etc/passwd: No such file or directory
Feb  9 18:54:40.176413 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1162)
Feb  9 18:54:40.182330 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm
Feb  9 18:54:40.182405 kernel: BTRFS info (device nvme0n1p6): using free space tree
Feb  9 18:54:40.182432 kernel: BTRFS info (device nvme0n1p6): has skinny extents
Feb  9 18:54:40.186967 initrd-setup-root[1191]: cut: /sysroot/etc/group: No such file or directory
Feb  9 18:54:40.192357 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations
Feb  9 18:54:40.196258 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Feb  9 18:54:40.198877 initrd-setup-root[1201]: cut: /sysroot/etc/shadow: No such file or directory
Feb  9 18:54:40.203318 initrd-setup-root[1209]: cut: /sysroot/etc/gshadow: No such file or directory
Feb  9 18:54:40.287481 systemd-networkd[1101]: eth0: Gained IPv6LL
Feb  9 18:54:40.393239 systemd[1]: Finished initrd-setup-root.service.
Feb  9 18:54:40.403901 kernel: kauditd_printk_skb: 23 callbacks suppressed
Feb  9 18:54:40.403971 kernel: audit: type=1130 audit(1707504880.396:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:40.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:40.397449 systemd[1]: Starting ignition-mount.service...
Feb  9 18:54:40.406322 systemd[1]: Starting sysroot-boot.service...
Feb  9 18:54:40.412350 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully.
Feb  9 18:54:40.412479 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully.
Feb  9 18:54:40.447393 ignition[1228]: INFO     : Ignition 2.14.0
Feb  9 18:54:40.448603 ignition[1228]: INFO     : Stage: mount
Feb  9 18:54:40.448603 ignition[1228]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Feb  9 18:54:40.448603 ignition[1228]: DEBUG    : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Feb  9 18:54:40.461595 systemd[1]: Finished sysroot-boot.service.
Feb  9 18:54:40.467634 kernel: audit: type=1130 audit(1707504880.462:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:40.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:40.467700 ignition[1228]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/aws"
Feb  9 18:54:40.467700 ignition[1228]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Feb  9 18:54:40.467700 ignition[1228]: INFO     : PUT result: OK
Feb  9 18:54:40.472792 ignition[1228]: INFO     : mount: mount passed
Feb  9 18:54:40.473707 ignition[1228]: INFO     : Ignition finished successfully
Feb  9 18:54:40.475402 systemd[1]: Finished ignition-mount.service.
Feb  9 18:54:40.476621 systemd[1]: Starting ignition-files.service...
Feb  9 18:54:40.483721 kernel: audit: type=1130 audit(1707504880.475:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:40.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:40.487015 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Feb  9 18:54:40.502924 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1237)
Feb  9 18:54:40.502982 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm
Feb  9 18:54:40.503002 kernel: BTRFS info (device nvme0n1p6): using free space tree
Feb  9 18:54:40.505344 kernel: BTRFS info (device nvme0n1p6): has skinny extents
Feb  9 18:54:40.510366 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations
Feb  9 18:54:40.512966 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Feb  9 18:54:40.525496 ignition[1256]: INFO     : Ignition 2.14.0
Feb  9 18:54:40.526583 ignition[1256]: INFO     : Stage: files
Feb  9 18:54:40.527543 ignition[1256]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Feb  9 18:54:40.529305 ignition[1256]: DEBUG    : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Feb  9 18:54:40.535292 ignition[1256]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/aws"
Feb  9 18:54:40.537346 ignition[1256]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Feb  9 18:54:40.539735 ignition[1256]: INFO     : PUT result: OK
Feb  9 18:54:40.543649 ignition[1256]: DEBUG    : files: compiled without relabeling support, skipping
Feb  9 18:54:40.548028 ignition[1256]: INFO     : files: ensureUsers: op(1): [started]  creating or modifying user "core"
Feb  9 18:54:40.548028 ignition[1256]: DEBUG    : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core"
Feb  9 18:54:40.600087 ignition[1256]: INFO     : files: ensureUsers: op(1): [finished] creating or modifying user "core"
Feb  9 18:54:40.601980 ignition[1256]: INFO     : files: ensureUsers: op(2): [started]  adding ssh keys to user "core"
Feb  9 18:54:40.604402 unknown[1256]: wrote ssh authorized keys file for user: core
Feb  9 18:54:40.605915 ignition[1256]: INFO     : files: ensureUsers: op(2): [finished] adding ssh keys to user "core"
Feb  9 18:54:40.607955 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [started]  writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz"
Feb  9 18:54:40.612495 ignition[1256]: INFO     : GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1
Feb  9 18:54:41.087231 ignition[1256]: INFO     : GET result: OK
Feb  9 18:54:41.339689 ignition[1256]: DEBUG    : file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d
Feb  9 18:54:41.342582 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz"
Feb  9 18:54:41.342582 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [started]  writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz"
Feb  9 18:54:41.342582 ignition[1256]: INFO     : GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1
Feb  9 18:54:41.383522 ignition[1256]: INFO     : GET result: OK
Feb  9 18:54:41.500126 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz"
Feb  9 18:54:41.504704 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [started]  writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz"
Feb  9 18:54:41.504704 ignition[1256]: INFO     : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1
Feb  9 18:54:41.868182 ignition[1256]: INFO     : GET result: OK
Feb  9 18:54:42.053711 ignition[1256]: DEBUG    : file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449
Feb  9 18:54:42.061396 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz"
Feb  9 18:54:42.061396 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [started]  writing file "/sysroot/opt/bin/kubectl"
Feb  9 18:54:42.061396 ignition[1256]: INFO     : GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1
Feb  9 18:54:42.172067 ignition[1256]: INFO     : GET result: OK
Feb  9 18:54:42.468772 ignition[1256]: DEBUG    : file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628
Feb  9 18:54:42.471866 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl"
Feb  9 18:54:42.471866 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [started]  writing file "/sysroot/etc/eks/bootstrap.sh"
Feb  9 18:54:42.471866 ignition[1256]: INFO     : oem config not found in "/usr/share/oem", looking on oem partition
Feb  9 18:54:42.483361 ignition[1256]: INFO     : op(1): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem1402039148"
Feb  9 18:54:42.487562 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1256)
Feb  9 18:54:42.487610 ignition[1256]: CRITICAL : op(1): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem1402039148": device or resource busy
Feb  9 18:54:42.487610 ignition[1256]: ERROR    : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1402039148", trying btrfs: device or resource busy
Feb  9 18:54:42.487610 ignition[1256]: INFO     : op(2): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem1402039148"
Feb  9 18:54:42.493834 ignition[1256]: INFO     : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1402039148"
Feb  9 18:54:42.493834 ignition[1256]: INFO     : op(3): [started]  unmounting "/mnt/oem1402039148"
Feb  9 18:54:42.493834 ignition[1256]: INFO     : op(3): [finished] unmounting "/mnt/oem1402039148"
Feb  9 18:54:42.493834 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/eks/bootstrap.sh"
Feb  9 18:54:42.493834 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [started]  writing file "/sysroot/opt/bin/kubeadm"
Feb  9 18:54:42.493834 ignition[1256]: INFO     : GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1
Feb  9 18:54:42.507390 systemd[1]: mnt-oem1402039148.mount: Deactivated successfully.
Feb  9 18:54:42.556856 ignition[1256]: INFO     : GET result: OK
Feb  9 18:54:42.881321 ignition[1256]: DEBUG    : file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660
Feb  9 18:54:42.884583 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubeadm"
Feb  9 18:54:42.884583 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [started]  writing file "/sysroot/opt/bin/kubelet"
Feb  9 18:54:42.884583 ignition[1256]: INFO     : GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1
Feb  9 18:54:42.945051 ignition[1256]: INFO     : GET result: OK
Feb  9 18:54:43.537840 ignition[1256]: DEBUG    : file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b
Feb  9 18:54:43.540574 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/bin/kubelet"
Feb  9 18:54:43.540574 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(a): [started]  writing file "/sysroot/etc/docker/daemon.json"
Feb  9 18:54:43.545367 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/docker/daemon.json"
Feb  9 18:54:43.545367 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(b): [started]  writing file "/sysroot/home/core/install.sh"
Feb  9 18:54:43.549599 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh"
Feb  9 18:54:43.549599 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(c): [started]  writing file "/sysroot/home/core/nginx.yaml"
Feb  9 18:54:43.549599 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nginx.yaml"
Feb  9 18:54:43.558021 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(d): [started]  writing file "/sysroot/home/core/nfs-pod.yaml"
Feb  9 18:54:43.558021 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pod.yaml"
Feb  9 18:54:43.558021 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(e): [started]  writing file "/sysroot/home/core/nfs-pvc.yaml"
Feb  9 18:54:43.565722 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml"
Feb  9 18:54:43.569603 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(f): [started]  writing file "/sysroot/etc/flatcar/update.conf"
Feb  9 18:54:43.572126 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/flatcar/update.conf"
Feb  9 18:54:43.575270 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(10): [started]  writing file "/sysroot/etc/systemd/system/nvidia.service"
Feb  9 18:54:43.575270 ignition[1256]: INFO     : oem config not found in "/usr/share/oem", looking on oem partition
Feb  9 18:54:43.582177 ignition[1256]: INFO     : op(4): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem224849992"
Feb  9 18:54:43.583865 ignition[1256]: CRITICAL : op(4): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem224849992": device or resource busy
Feb  9 18:54:43.583865 ignition[1256]: ERROR    : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem224849992", trying btrfs: device or resource busy
Feb  9 18:54:43.583865 ignition[1256]: INFO     : op(5): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem224849992"
Feb  9 18:54:43.590249 ignition[1256]: INFO     : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem224849992"
Feb  9 18:54:43.590249 ignition[1256]: INFO     : op(6): [started]  unmounting "/mnt/oem224849992"
Feb  9 18:54:43.590249 ignition[1256]: INFO     : op(6): [finished] unmounting "/mnt/oem224849992"
Feb  9 18:54:43.590249 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service"
Feb  9 18:54:43.590249 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(11): [started]  writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json"
Feb  9 18:54:43.591295 systemd[1]: mnt-oem224849992.mount: Deactivated successfully.
Feb  9 18:54:43.602761 ignition[1256]: INFO     : oem config not found in "/usr/share/oem", looking on oem partition
Feb  9 18:54:43.609587 ignition[1256]: INFO     : op(7): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem4209217232"
Feb  9 18:54:43.611714 ignition[1256]: CRITICAL : op(7): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem4209217232": device or resource busy
Feb  9 18:54:43.611714 ignition[1256]: ERROR    : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4209217232", trying btrfs: device or resource busy
Feb  9 18:54:43.611714 ignition[1256]: INFO     : op(8): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem4209217232"
Feb  9 18:54:43.618259 ignition[1256]: INFO     : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4209217232"
Feb  9 18:54:43.618259 ignition[1256]: INFO     : op(9): [started]  unmounting "/mnt/oem4209217232"
Feb  9 18:54:43.618259 ignition[1256]: INFO     : op(9): [finished] unmounting "/mnt/oem4209217232"
Feb  9 18:54:43.618259 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json"
Feb  9 18:54:43.618259 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(12): [started]  writing file "/sysroot/etc/amazon/ssm/seelog.xml"
Feb  9 18:54:43.618259 ignition[1256]: INFO     : oem config not found in "/usr/share/oem", looking on oem partition
Feb  9 18:54:43.620180 systemd[1]: mnt-oem4209217232.mount: Deactivated successfully.
Feb  9 18:54:43.644712 ignition[1256]: INFO     : op(a): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem4187665347"
Feb  9 18:54:43.646429 ignition[1256]: CRITICAL : op(a): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem4187665347": device or resource busy
Feb  9 18:54:43.646429 ignition[1256]: ERROR    : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4187665347", trying btrfs: device or resource busy
Feb  9 18:54:43.646429 ignition[1256]: INFO     : op(b): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem4187665347"
Feb  9 18:54:43.653549 ignition[1256]: INFO     : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4187665347"
Feb  9 18:54:43.653549 ignition[1256]: INFO     : op(c): [started]  unmounting "/mnt/oem4187665347"
Feb  9 18:54:43.653549 ignition[1256]: INFO     : op(c): [finished] unmounting "/mnt/oem4187665347"
Feb  9 18:54:43.658900 ignition[1256]: INFO     : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml"
Feb  9 18:54:43.658900 ignition[1256]: INFO     : files: op(13): [started]  processing unit "coreos-metadata-sshkeys@.service"
Feb  9 18:54:43.658900 ignition[1256]: INFO     : files: op(13): [finished] processing unit "coreos-metadata-sshkeys@.service"
Feb  9 18:54:43.658900 ignition[1256]: INFO     : files: op(14): [started]  processing unit "amazon-ssm-agent.service"
Feb  9 18:54:43.668691 ignition[1256]: INFO     : files: op(14): op(15): [started]  writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service"
Feb  9 18:54:43.673286 ignition[1256]: INFO     : files: op(14): op(15): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service"
Feb  9 18:54:43.673286 ignition[1256]: INFO     : files: op(14): [finished] processing unit "amazon-ssm-agent.service"
Feb  9 18:54:43.681482 ignition[1256]: INFO     : files: op(16): [started]  processing unit "nvidia.service"
Feb  9 18:54:43.681482 ignition[1256]: INFO     : files: op(16): [finished] processing unit "nvidia.service"
Feb  9 18:54:43.681482 ignition[1256]: INFO     : files: op(17): [started]  processing unit "prepare-cni-plugins.service"
Feb  9 18:54:43.681482 ignition[1256]: INFO     : files: op(17): op(18): [started]  writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service"
Feb  9 18:54:43.689189 ignition[1256]: INFO     : files: op(17): op(18): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service"
Feb  9 18:54:43.689189 ignition[1256]: INFO     : files: op(17): [finished] processing unit "prepare-cni-plugins.service"
Feb  9 18:54:43.689189 ignition[1256]: INFO     : files: op(19): [started]  processing unit "prepare-critools.service"
Feb  9 18:54:43.689189 ignition[1256]: INFO     : files: op(19): op(1a): [started]  writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service"
Feb  9 18:54:43.689189 ignition[1256]: INFO     : files: op(19): op(1a): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service"
Feb  9 18:54:43.689189 ignition[1256]: INFO     : files: op(19): [finished] processing unit "prepare-critools.service"
Feb  9 18:54:43.689189 ignition[1256]: INFO     : files: op(1b): [started]  processing unit "prepare-helm.service"
Feb  9 18:54:43.689189 ignition[1256]: INFO     : files: op(1b): op(1c): [started]  writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service"
Feb  9 18:54:43.689189 ignition[1256]: INFO     : files: op(1b): op(1c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service"
Feb  9 18:54:43.689189 ignition[1256]: INFO     : files: op(1b): [finished] processing unit "prepare-helm.service"
Feb  9 18:54:43.689189 ignition[1256]: INFO     : files: op(1d): [started]  setting preset to enabled for "nvidia.service"
Feb  9 18:54:43.689189 ignition[1256]: INFO     : files: op(1d): [finished] setting preset to enabled for "nvidia.service"
Feb  9 18:54:43.689189 ignition[1256]: INFO     : files: op(1e): [started]  setting preset to enabled for "prepare-cni-plugins.service"
Feb  9 18:54:43.689189 ignition[1256]: INFO     : files: op(1e): [finished] setting preset to enabled for "prepare-cni-plugins.service"
Feb  9 18:54:43.689189 ignition[1256]: INFO     : files: op(1f): [started]  setting preset to enabled for "prepare-critools.service"
Feb  9 18:54:43.689189 ignition[1256]: INFO     : files: op(1f): [finished] setting preset to enabled for "prepare-critools.service"
Feb  9 18:54:43.689189 ignition[1256]: INFO     : files: op(20): [started]  setting preset to enabled for "prepare-helm.service"
Feb  9 18:54:43.689189 ignition[1256]: INFO     : files: op(20): [finished] setting preset to enabled for "prepare-helm.service"
Feb  9 18:54:43.689189 ignition[1256]: INFO     : files: op(21): [started]  setting preset to enabled for "coreos-metadata-sshkeys@.service "
Feb  9 18:54:43.689189 ignition[1256]: INFO     : files: op(21): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service "
Feb  9 18:54:43.737463 kernel: audit: type=1130 audit(1707504883.717:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:43.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:43.737588 ignition[1256]: INFO     : files: op(22): [started]  setting preset to enabled for "amazon-ssm-agent.service"
Feb  9 18:54:43.737588 ignition[1256]: INFO     : files: op(22): [finished] setting preset to enabled for "amazon-ssm-agent.service"
Feb  9 18:54:43.737588 ignition[1256]: INFO     : files: createResultFile: createFiles: op(23): [started]  writing file "/sysroot/etc/.ignition-result.json"
Feb  9 18:54:43.737588 ignition[1256]: INFO     : files: createResultFile: createFiles: op(23): [finished] writing file "/sysroot/etc/.ignition-result.json"
Feb  9 18:54:43.737588 ignition[1256]: INFO     : files: files passed
Feb  9 18:54:43.737588 ignition[1256]: INFO     : Ignition finished successfully
Feb  9 18:54:43.716105 systemd[1]: Finished ignition-files.service.
Feb  9 18:54:43.726264 systemd[1]: Starting initrd-setup-root-after-ignition.service...
Feb  9 18:54:43.750563 initrd-setup-root-after-ignition[1280]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory
Feb  9 18:54:43.737568 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile).
Feb  9 18:54:43.746553 systemd[1]: Starting ignition-quench.service...
Feb  9 18:54:43.761187 systemd[1]: Finished initrd-setup-root-after-ignition.service.
Feb  9 18:54:43.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:43.771407 kernel: audit: type=1130 audit(1707504883.764:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:43.770252 systemd[1]: ignition-quench.service: Deactivated successfully.
Feb  9 18:54:43.771595 systemd[1]: Finished ignition-quench.service.
Feb  9 18:54:43.800815 kernel: audit: type=1130 audit(1707504883.781:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:43.800862 kernel: audit: type=1131 audit(1707504883.781:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:43.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:43.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:43.781839 systemd[1]: Reached target ignition-complete.target.
Feb  9 18:54:43.805193 systemd[1]: Starting initrd-parse-etc.service...
Feb  9 18:54:43.850049 systemd[1]: initrd-parse-etc.service: Deactivated successfully.
Feb  9 18:54:43.850182 systemd[1]: Finished initrd-parse-etc.service.
Feb  9 18:54:43.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:43.852788 systemd[1]: Reached target initrd-fs.target.
Feb  9 18:54:43.865225 kernel: audit: type=1130 audit(1707504883.852:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:43.865261 kernel: audit: type=1131 audit(1707504883.852:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:43.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:43.865243 systemd[1]: Reached target initrd.target.
Feb  9 18:54:43.866342 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met.
Feb  9 18:54:43.869188 systemd[1]: Starting dracut-pre-pivot.service...
Feb  9 18:54:43.891912 systemd[1]: Finished dracut-pre-pivot.service.
Feb  9 18:54:43.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:43.895572 systemd[1]: Starting initrd-cleanup.service...
Feb  9 18:54:43.905529 kernel: audit: type=1130 audit(1707504883.893:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:43.916788 systemd[1]: Stopped target nss-lookup.target.
Feb  9 18:54:43.919582 systemd[1]: Stopped target remote-cryptsetup.target.
Feb  9 18:54:43.922048 systemd[1]: Stopped target timers.target.
Feb  9 18:54:43.924051 systemd[1]: dracut-pre-pivot.service: Deactivated successfully.
Feb  9 18:54:43.925522 systemd[1]: Stopped dracut-pre-pivot.service.
Feb  9 18:54:43.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:43.927656 systemd[1]: Stopped target initrd.target.
Feb  9 18:54:43.929891 systemd[1]: Stopped target basic.target.
Feb  9 18:54:43.931756 systemd[1]: Stopped target ignition-complete.target.
Feb  9 18:54:43.933534 systemd[1]: Stopped target ignition-diskful.target.
Feb  9 18:54:43.936581 systemd[1]: Stopped target initrd-root-device.target.
Feb  9 18:54:43.941267 systemd[1]: Stopped target remote-fs.target.
Feb  9 18:54:43.943909 systemd[1]: Stopped target remote-fs-pre.target.
Feb  9 18:54:43.947062 systemd[1]: Stopped target sysinit.target.
Feb  9 18:54:43.948643 systemd[1]: Stopped target local-fs.target.
Feb  9 18:54:43.951531 systemd[1]: Stopped target local-fs-pre.target.
Feb  9 18:54:43.957531 systemd[1]: Stopped target swap.target.
Feb  9 18:54:43.959309 systemd[1]: dracut-pre-mount.service: Deactivated successfully.
Feb  9 18:54:43.960521 systemd[1]: Stopped dracut-pre-mount.service.
Feb  9 18:54:43.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:43.963225 systemd[1]: Stopped target cryptsetup.target.
Feb  9 18:54:43.964987 systemd[1]: dracut-initqueue.service: Deactivated successfully.
Feb  9 18:54:43.966397 systemd[1]: Stopped dracut-initqueue.service.
Feb  9 18:54:43.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:43.968822 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully.
Feb  9 18:54:43.969442 systemd[1]: Stopped initrd-setup-root-after-ignition.service.
Feb  9 18:54:43.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:43.971780 systemd[1]: ignition-files.service: Deactivated successfully.
Feb  9 18:54:43.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:43.971917 systemd[1]: Stopped ignition-files.service.
Feb  9 18:54:43.974687 systemd[1]: Stopping ignition-mount.service...
Feb  9 18:54:43.980055 systemd[1]: kmod-static-nodes.service: Deactivated successfully.
Feb  9 18:54:43.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:43.980350 systemd[1]: Stopped kmod-static-nodes.service.
Feb  9 18:54:43.983705 systemd[1]: Stopping sysroot-boot.service...
Feb  9 18:54:43.998483 ignition[1294]: INFO     : Ignition 2.14.0
Feb  9 18:54:43.998483 ignition[1294]: INFO     : Stage: umount
Feb  9 18:54:43.998483 ignition[1294]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Feb  9 18:54:43.998483 ignition[1294]: DEBUG    : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Feb  9 18:54:44.008991 systemd[1]: systemd-udev-trigger.service: Deactivated successfully.
Feb  9 18:54:44.010647 ignition[1294]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/aws"
Feb  9 18:54:44.012458 ignition[1294]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Feb  9 18:54:44.012136 systemd[1]: Stopped systemd-udev-trigger.service.
Feb  9 18:54:44.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.020807 systemd[1]: dracut-pre-trigger.service: Deactivated successfully.
Feb  9 18:54:44.024055 systemd[1]: Stopped dracut-pre-trigger.service.
Feb  9 18:54:44.027122 ignition[1294]: INFO     : PUT result: OK
Feb  9 18:54:44.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.034561 ignition[1294]: INFO     : umount: umount passed
Feb  9 18:54:44.034561 ignition[1294]: INFO     : Ignition finished successfully
Feb  9 18:54:44.036685 systemd[1]: initrd-cleanup.service: Deactivated successfully.
Feb  9 18:54:44.036794 systemd[1]: Finished initrd-cleanup.service.
Feb  9 18:54:44.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.039977 systemd[1]: ignition-mount.service: Deactivated successfully.
Feb  9 18:54:44.041027 systemd[1]: Stopped ignition-mount.service.
Feb  9 18:54:44.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.044929 systemd[1]: ignition-disks.service: Deactivated successfully.
Feb  9 18:54:44.045008 systemd[1]: Stopped ignition-disks.service.
Feb  9 18:54:44.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.048398 systemd[1]: ignition-kargs.service: Deactivated successfully.
Feb  9 18:54:44.048463 systemd[1]: Stopped ignition-kargs.service.
Feb  9 18:54:44.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.051254 systemd[1]: ignition-fetch.service: Deactivated successfully.
Feb  9 18:54:44.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.051318 systemd[1]: Stopped ignition-fetch.service.
Feb  9 18:54:44.053352 systemd[1]: Stopped target network.target.
Feb  9 18:54:44.054293 systemd[1]: ignition-fetch-offline.service: Deactivated successfully.
Feb  9 18:54:44.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.055278 systemd[1]: Stopped ignition-fetch-offline.service.
Feb  9 18:54:44.057121 systemd[1]: Stopped target paths.target.
Feb  9 18:54:44.059191 systemd[1]: systemd-ask-password-console.path: Deactivated successfully.
Feb  9 18:54:44.063391 systemd[1]: Stopped systemd-ask-password-console.path.
Feb  9 18:54:44.063481 systemd[1]: Stopped target slices.target.
Feb  9 18:54:44.066480 systemd[1]: Stopped target sockets.target.
Feb  9 18:54:44.067487 systemd[1]: iscsid.socket: Deactivated successfully.
Feb  9 18:54:44.067520 systemd[1]: Closed iscsid.socket.
Feb  9 18:54:44.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.069453 systemd[1]: iscsiuio.socket: Deactivated successfully.
Feb  9 18:54:44.069477 systemd[1]: Closed iscsiuio.socket.
Feb  9 18:54:44.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.071121 systemd[1]: ignition-setup.service: Deactivated successfully.
Feb  9 18:54:44.071171 systemd[1]: Stopped ignition-setup.service.
Feb  9 18:54:44.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.073294 systemd[1]: Stopping systemd-networkd.service...
Feb  9 18:54:44.075177 systemd[1]: Stopping systemd-resolved.service...
Feb  9 18:54:44.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.077365 systemd[1]: sysroot-boot.service: Deactivated successfully.
Feb  9 18:54:44.077393 systemd-networkd[1101]: eth0: DHCPv6 lease lost
Feb  9 18:54:44.092000 audit: BPF prog-id=9 op=UNLOAD
Feb  9 18:54:44.094000 audit: BPF prog-id=6 op=UNLOAD
Feb  9 18:54:44.077471 systemd[1]: Stopped sysroot-boot.service.
Feb  9 18:54:44.078553 systemd[1]: initrd-setup-root.service: Deactivated successfully.
Feb  9 18:54:44.078606 systemd[1]: Stopped initrd-setup-root.service.
Feb  9 18:54:44.084829 systemd[1]: systemd-networkd.service: Deactivated successfully.
Feb  9 18:54:44.084948 systemd[1]: Stopped systemd-networkd.service.
Feb  9 18:54:44.088561 systemd[1]: systemd-resolved.service: Deactivated successfully.
Feb  9 18:54:44.088665 systemd[1]: Stopped systemd-resolved.service.
Feb  9 18:54:44.094560 systemd[1]: systemd-networkd.socket: Deactivated successfully.
Feb  9 18:54:44.096273 systemd[1]: Closed systemd-networkd.socket.
Feb  9 18:54:44.115271 systemd[1]: Stopping network-cleanup.service...
Feb  9 18:54:44.116358 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully.
Feb  9 18:54:44.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.117409 systemd[1]: Stopped parse-ip-for-networkd.service.
Feb  9 18:54:44.120095 systemd[1]: systemd-sysctl.service: Deactivated successfully.
Feb  9 18:54:44.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.120151 systemd[1]: Stopped systemd-sysctl.service.
Feb  9 18:54:44.123426 systemd[1]: systemd-modules-load.service: Deactivated successfully.
Feb  9 18:54:44.124631 systemd[1]: Stopped systemd-modules-load.service.
Feb  9 18:54:44.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.129632 systemd[1]: Stopping systemd-udevd.service...
Feb  9 18:54:44.143264 systemd[1]: systemd-udevd.service: Deactivated successfully.
Feb  9 18:54:44.143457 systemd[1]: Stopped systemd-udevd.service.
Feb  9 18:54:44.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.147634 systemd[1]: network-cleanup.service: Deactivated successfully.
Feb  9 18:54:44.148701 systemd[1]: Stopped network-cleanup.service.
Feb  9 18:54:44.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.150778 systemd[1]: systemd-udevd-control.socket: Deactivated successfully.
Feb  9 18:54:44.150833 systemd[1]: Closed systemd-udevd-control.socket.
Feb  9 18:54:44.153880 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully.
Feb  9 18:54:44.153927 systemd[1]: Closed systemd-udevd-kernel.socket.
Feb  9 18:54:44.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.156407 systemd[1]: dracut-pre-udev.service: Deactivated successfully.
Feb  9 18:54:44.156458 systemd[1]: Stopped dracut-pre-udev.service.
Feb  9 18:54:44.158013 systemd[1]: dracut-cmdline.service: Deactivated successfully.
Feb  9 18:54:44.158054 systemd[1]: Stopped dracut-cmdline.service.
Feb  9 18:54:44.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.160032 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully.
Feb  9 18:54:44.160073 systemd[1]: Stopped dracut-cmdline-ask.service.
Feb  9 18:54:44.176209 systemd[1]: Starting initrd-udevadm-cleanup-db.service...
Feb  9 18:54:44.181467 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully.
Feb  9 18:54:44.181645 systemd[1]: Stopped systemd-vconsole-setup.service.
Feb  9 18:54:44.191662 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully.
Feb  9 18:54:44.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:44.191759 systemd[1]: Finished initrd-udevadm-cleanup-db.service.
Feb  9 18:54:44.194447 systemd[1]: Reached target initrd-switch-root.target.
Feb  9 18:54:44.198417 systemd[1]: Starting initrd-switch-root.service...
Feb  9 18:54:44.213181 systemd[1]: Switching root.
Feb  9 18:54:44.235773 systemd-journald[185]: Journal stopped
Feb  9 18:54:50.154630 systemd-journald[185]: Received SIGTERM from PID 1 (systemd).
Feb  9 18:54:50.154705 kernel: SELinux:  Class mctp_socket not defined in policy.
Feb  9 18:54:50.154732 kernel: SELinux:  Class anon_inode not defined in policy.
Feb  9 18:54:50.154752 kernel: SELinux: the above unknown classes and permissions will be allowed
Feb  9 18:54:50.154775 kernel: SELinux:  policy capability network_peer_controls=1
Feb  9 18:54:50.154792 kernel: SELinux:  policy capability open_perms=1
Feb  9 18:54:50.154809 kernel: SELinux:  policy capability extended_socket_class=1
Feb  9 18:54:50.154833 kernel: SELinux:  policy capability always_check_network=0
Feb  9 18:54:50.154850 kernel: SELinux:  policy capability cgroup_seclabel=1
Feb  9 18:54:50.154866 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Feb  9 18:54:50.154933 kernel: SELinux:  policy capability genfs_seclabel_symlinks=0
Feb  9 18:54:50.154952 kernel: SELinux:  policy capability ioctl_skip_cloexec=0
Feb  9 18:54:50.154974 systemd[1]: Successfully loaded SELinux policy in 90.177ms.
Feb  9 18:54:50.155006 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.037ms.
Feb  9 18:54:50.155025 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Feb  9 18:54:50.155044 systemd[1]: Detected virtualization amazon.
Feb  9 18:54:50.155062 systemd[1]: Detected architecture x86-64.
Feb  9 18:54:50.155081 systemd[1]: Detected first boot.
Feb  9 18:54:50.155098 systemd[1]: Initializing machine ID from VM UUID.
Feb  9 18:54:50.155117 kernel: SELinux:  Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped).
Feb  9 18:54:50.155138 kernel: kauditd_printk_skb: 40 callbacks suppressed
Feb  9 18:54:50.155204 kernel: audit: type=1400 audit(1707504885.434:84): avc:  denied  { associate } for  pid=1327 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023"
Feb  9 18:54:50.159373 kernel: audit: type=1300 audit(1707504885.434:84): arch=c000003e syscall=188 success=yes exit=0 a0=c0001858e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=1310 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:54:50.159428 kernel: audit: type=1327 audit(1707504885.434:84): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Feb  9 18:54:50.159450 kernel: audit: type=1400 audit(1707504885.436:85): avc:  denied  { associate } for  pid=1327 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1
Feb  9 18:54:50.159477 kernel: audit: type=1300 audit(1707504885.436:85): arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859b9 a2=1ed a3=0 items=2 ppid=1310 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:54:50.159498 kernel: audit: type=1307 audit(1707504885.436:85): cwd="/"
Feb  9 18:54:50.159517 kernel: audit: type=1302 audit(1707504885.436:85): item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:50.159538 kernel: audit: type=1302 audit(1707504885.436:85): item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:50.159559 kernel: audit: type=1327 audit(1707504885.436:85): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Feb  9 18:54:50.159582 systemd[1]: Populated /etc with preset unit settings.
Feb  9 18:54:50.159606 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Feb  9 18:54:50.159631 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Feb  9 18:54:50.159655 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Feb  9 18:54:50.159675 kernel: audit: type=1334 audit(1707504889.818:86): prog-id=12 op=LOAD
Feb  9 18:54:50.159695 systemd[1]: iscsiuio.service: Deactivated successfully.
Feb  9 18:54:50.159715 systemd[1]: Stopped iscsiuio.service.
Feb  9 18:54:50.159735 systemd[1]: iscsid.service: Deactivated successfully.
Feb  9 18:54:50.159753 systemd[1]: Stopped iscsid.service.
Feb  9 18:54:50.159775 systemd[1]: initrd-switch-root.service: Deactivated successfully.
Feb  9 18:54:50.159794 systemd[1]: Stopped initrd-switch-root.service.
Feb  9 18:54:50.159812 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1.
Feb  9 18:54:50.159825 systemd[1]: Created slice system-addon\x2dconfig.slice.
Feb  9 18:54:50.159841 systemd[1]: Created slice system-addon\x2drun.slice.
Feb  9 18:54:50.159854 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice.
Feb  9 18:54:50.159866 systemd[1]: Created slice system-getty.slice.
Feb  9 18:54:50.159878 systemd[1]: Created slice system-modprobe.slice.
Feb  9 18:54:50.159892 systemd[1]: Created slice system-serial\x2dgetty.slice.
Feb  9 18:54:50.159905 systemd[1]: Created slice system-system\x2dcloudinit.slice.
Feb  9 18:54:50.159917 systemd[1]: Created slice system-systemd\x2dfsck.slice.
Feb  9 18:54:50.159929 systemd[1]: Created slice user.slice.
Feb  9 18:54:50.159941 systemd[1]: Started systemd-ask-password-console.path.
Feb  9 18:54:50.159953 systemd[1]: Started systemd-ask-password-wall.path.
Feb  9 18:54:50.159965 systemd[1]: Set up automount boot.automount.
Feb  9 18:54:50.159977 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount.
Feb  9 18:54:50.159988 systemd[1]: Stopped target initrd-switch-root.target.
Feb  9 18:54:50.160003 systemd[1]: Stopped target initrd-fs.target.
Feb  9 18:54:50.160014 systemd[1]: Stopped target initrd-root-fs.target.
Feb  9 18:54:50.160026 systemd[1]: Reached target integritysetup.target.
Feb  9 18:54:50.160038 systemd[1]: Reached target remote-cryptsetup.target.
Feb  9 18:54:50.160049 systemd[1]: Reached target remote-fs.target.
Feb  9 18:54:50.160063 systemd[1]: Reached target slices.target.
Feb  9 18:54:50.160084 systemd[1]: Reached target swap.target.
Feb  9 18:54:50.160097 systemd[1]: Reached target torcx.target.
Feb  9 18:54:50.160109 systemd[1]: Reached target veritysetup.target.
Feb  9 18:54:50.160120 systemd[1]: Listening on systemd-coredump.socket.
Feb  9 18:54:50.160132 systemd[1]: Listening on systemd-initctl.socket.
Feb  9 18:54:50.160144 systemd[1]: Listening on systemd-networkd.socket.
Feb  9 18:54:50.160161 systemd[1]: Listening on systemd-udevd-control.socket.
Feb  9 18:54:50.160172 systemd[1]: Listening on systemd-udevd-kernel.socket.
Feb  9 18:54:50.160187 systemd[1]: Listening on systemd-userdbd.socket.
Feb  9 18:54:50.160199 systemd[1]: Mounting dev-hugepages.mount...
Feb  9 18:54:50.160211 systemd[1]: Mounting dev-mqueue.mount...
Feb  9 18:54:50.160223 systemd[1]: Mounting media.mount...
Feb  9 18:54:50.160235 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Feb  9 18:54:50.160248 systemd[1]: Mounting sys-kernel-debug.mount...
Feb  9 18:54:50.160260 systemd[1]: Mounting sys-kernel-tracing.mount...
Feb  9 18:54:50.160272 systemd[1]: Mounting tmp.mount...
Feb  9 18:54:50.160283 systemd[1]: Starting flatcar-tmpfiles.service...
Feb  9 18:54:50.160298 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Feb  9 18:54:50.160310 systemd[1]: Starting kmod-static-nodes.service...
Feb  9 18:54:50.160323 systemd[1]: Starting modprobe@configfs.service...
Feb  9 18:54:50.160350 systemd[1]: Starting modprobe@dm_mod.service...
Feb  9 18:54:50.160385 systemd[1]: Starting modprobe@drm.service...
Feb  9 18:54:50.160404 systemd[1]: Starting modprobe@efi_pstore.service...
Feb  9 18:54:50.160424 systemd[1]: Starting modprobe@fuse.service...
Feb  9 18:54:50.160443 systemd[1]: Starting modprobe@loop.service...
Feb  9 18:54:50.160462 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf).
Feb  9 18:54:50.160485 systemd[1]: systemd-fsck-root.service: Deactivated successfully.
Feb  9 18:54:50.160506 systemd[1]: Stopped systemd-fsck-root.service.
Feb  9 18:54:50.160524 systemd[1]: systemd-fsck-usr.service: Deactivated successfully.
Feb  9 18:54:50.160542 systemd[1]: Stopped systemd-fsck-usr.service.
Feb  9 18:54:50.160565 systemd[1]: Stopped systemd-journald.service.
Feb  9 18:54:50.160586 systemd[1]: Starting systemd-journald.service...
Feb  9 18:54:50.160610 systemd[1]: Starting systemd-modules-load.service...
Feb  9 18:54:50.160630 systemd[1]: Starting systemd-network-generator.service...
Feb  9 18:54:50.160649 systemd[1]: Starting systemd-remount-fs.service...
Feb  9 18:54:50.160671 systemd[1]: Starting systemd-udev-trigger.service...
Feb  9 18:54:50.160688 systemd[1]: verity-setup.service: Deactivated successfully.
Feb  9 18:54:50.160706 systemd[1]: Stopped verity-setup.service.
Feb  9 18:54:50.160724 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Feb  9 18:54:50.160744 systemd[1]: Mounted dev-hugepages.mount.
Feb  9 18:54:50.160762 systemd[1]: Mounted dev-mqueue.mount.
Feb  9 18:54:50.160781 systemd[1]: Mounted media.mount.
Feb  9 18:54:50.160799 systemd[1]: Mounted sys-kernel-debug.mount.
Feb  9 18:54:50.160818 systemd[1]: Mounted sys-kernel-tracing.mount.
Feb  9 18:54:50.160841 systemd[1]: Mounted tmp.mount.
Feb  9 18:54:50.160862 systemd[1]: Finished kmod-static-nodes.service.
Feb  9 18:54:50.160882 systemd[1]: modprobe@configfs.service: Deactivated successfully.
Feb  9 18:54:50.160902 systemd[1]: Finished modprobe@configfs.service.
Feb  9 18:54:50.160921 kernel: loop: module loaded
Feb  9 18:54:50.160943 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Feb  9 18:54:50.160962 systemd[1]: Finished modprobe@dm_mod.service.
Feb  9 18:54:50.160981 systemd[1]: modprobe@drm.service: Deactivated successfully.
Feb  9 18:54:50.161001 systemd[1]: Finished modprobe@drm.service.
Feb  9 18:54:50.161023 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Feb  9 18:54:50.161045 systemd[1]: Finished modprobe@efi_pstore.service.
Feb  9 18:54:50.161065 systemd[1]: modprobe@loop.service: Deactivated successfully.
Feb  9 18:54:50.161086 systemd[1]: Finished modprobe@loop.service.
Feb  9 18:54:50.161109 kernel: fuse: init (API version 7.34)
Feb  9 18:54:50.161134 systemd-journald[1407]: Journal started
Feb  9 18:54:50.161209 systemd-journald[1407]: Runtime Journal (/run/log/journal/ec27d44289180b6a89539b67a5d69c71) is 4.8M, max 38.7M, 33.9M free.
Feb  9 18:54:44.994000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1
Feb  9 18:54:45.227000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Feb  9 18:54:45.227000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Feb  9 18:54:50.183135 systemd[1]: Started systemd-journald.service.
Feb  9 18:54:45.227000 audit: BPF prog-id=10 op=LOAD
Feb  9 18:54:45.227000 audit: BPF prog-id=10 op=UNLOAD
Feb  9 18:54:45.227000 audit: BPF prog-id=11 op=LOAD
Feb  9 18:54:45.227000 audit: BPF prog-id=11 op=UNLOAD
Feb  9 18:54:45.434000 audit[1327]: AVC avc:  denied  { associate } for  pid=1327 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023"
Feb  9 18:54:45.434000 audit[1327]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=1310 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:54:45.434000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Feb  9 18:54:45.436000 audit[1327]: AVC avc:  denied  { associate } for  pid=1327 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1
Feb  9 18:54:45.436000 audit[1327]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859b9 a2=1ed a3=0 items=2 ppid=1310 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:54:45.436000 audit: CWD cwd="/"
Feb  9 18:54:45.436000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:45.436000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:45.436000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Feb  9 18:54:49.818000 audit: BPF prog-id=12 op=LOAD
Feb  9 18:54:49.818000 audit: BPF prog-id=3 op=UNLOAD
Feb  9 18:54:49.820000 audit: BPF prog-id=13 op=LOAD
Feb  9 18:54:49.820000 audit: BPF prog-id=14 op=LOAD
Feb  9 18:54:49.820000 audit: BPF prog-id=4 op=UNLOAD
Feb  9 18:54:49.820000 audit: BPF prog-id=5 op=UNLOAD
Feb  9 18:54:49.822000 audit: BPF prog-id=15 op=LOAD
Feb  9 18:54:49.822000 audit: BPF prog-id=12 op=UNLOAD
Feb  9 18:54:49.822000 audit: BPF prog-id=16 op=LOAD
Feb  9 18:54:49.822000 audit: BPF prog-id=17 op=LOAD
Feb  9 18:54:49.822000 audit: BPF prog-id=13 op=UNLOAD
Feb  9 18:54:49.822000 audit: BPF prog-id=14 op=UNLOAD
Feb  9 18:54:49.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:49.829000 audit: BPF prog-id=15 op=UNLOAD
Feb  9 18:54:49.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:49.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:49.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:49.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.076000 audit: BPF prog-id=18 op=LOAD
Feb  9 18:54:50.076000 audit: BPF prog-id=19 op=LOAD
Feb  9 18:54:50.077000 audit: BPF prog-id=20 op=LOAD
Feb  9 18:54:50.077000 audit: BPF prog-id=16 op=UNLOAD
Feb  9 18:54:50.077000 audit: BPF prog-id=17 op=UNLOAD
Feb  9 18:54:50.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.152000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1
Feb  9 18:54:50.152000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffd8bdf66a0 a2=4000 a3=7ffd8bdf673c items=0 ppid=1 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:54:50.152000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald"
Feb  9 18:54:50.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:45.431674 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]"
Feb  9 18:54:49.816111 systemd[1]: Queued start job for default target multi-user.target.
Feb  9 18:54:45.432315 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:45Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Feb  9 18:54:49.824636 systemd[1]: systemd-journald.service: Deactivated successfully.
Feb  9 18:54:45.432360 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:45Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Feb  9 18:54:50.165835 systemd[1]: modprobe@fuse.service: Deactivated successfully.
Feb  9 18:54:45.432408 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:45Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12"
Feb  9 18:54:50.165996 systemd[1]: Finished modprobe@fuse.service.
Feb  9 18:54:45.432425 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:45Z" level=debug msg="skipped missing lower profile" missing profile=oem
Feb  9 18:54:50.167386 systemd[1]: Finished systemd-modules-load.service.
Feb  9 18:54:45.432476 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:45Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory"
Feb  9 18:54:50.168909 systemd[1]: Finished systemd-network-generator.service.
Feb  9 18:54:45.432496 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:45Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)=
Feb  9 18:54:50.170533 systemd[1]: Finished systemd-remount-fs.service.
Feb  9 18:54:45.432761 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:45Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack
Feb  9 18:54:50.172283 systemd[1]: Reached target network-pre.target.
Feb  9 18:54:45.432818 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:45Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Feb  9 18:54:50.175316 systemd[1]: Mounting sys-fs-fuse-connections.mount...
Feb  9 18:54:45.432840 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:45Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Feb  9 18:54:50.178048 systemd[1]: Mounting sys-kernel-config.mount...
Feb  9 18:54:45.433880 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:45Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10
Feb  9 18:54:50.182976 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/).
Feb  9 18:54:45.433940 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:45Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl
Feb  9 18:54:50.186798 systemd[1]: Starting systemd-hwdb-update.service...
Feb  9 18:54:45.433971 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:45Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2
Feb  9 18:54:50.189499 systemd[1]: Starting systemd-journal-flush.service...
Feb  9 18:54:45.433997 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:45Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store
Feb  9 18:54:50.190645 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Feb  9 18:54:45.434025 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:45Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2
Feb  9 18:54:50.192008 systemd[1]: Starting systemd-random-seed.service...
Feb  9 18:54:45.434132 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:45Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store
Feb  9 18:54:50.193098 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Feb  9 18:54:49.093539 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:49Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Feb  9 18:54:50.194654 systemd[1]: Starting systemd-sysctl.service...
Feb  9 18:54:49.093961 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:49Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Feb  9 18:54:50.198104 systemd[1]: Mounted sys-fs-fuse-connections.mount.
Feb  9 18:54:49.094080 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:49Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Feb  9 18:54:50.200071 systemd[1]: Mounted sys-kernel-config.mount.
Feb  9 18:54:49.094299 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:49Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Feb  9 18:54:49.094373 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:49Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile=
Feb  9 18:54:49.094824 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-02-09T18:54:49Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx
Feb  9 18:54:50.218479 systemd-journald[1407]: Time spent on flushing to /var/log/journal/ec27d44289180b6a89539b67a5d69c71 is 90.762ms for 1220 entries.
Feb  9 18:54:50.218479 systemd-journald[1407]: System Journal (/var/log/journal/ec27d44289180b6a89539b67a5d69c71) is 8.0M, max 195.6M, 187.6M free.
Feb  9 18:54:50.324735 systemd-journald[1407]: Received client request to flush runtime journal.
Feb  9 18:54:50.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.221665 systemd[1]: Finished systemd-random-seed.service.
Feb  9 18:54:50.327181 udevadm[1441]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in.
Feb  9 18:54:50.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.223048 systemd[1]: Reached target first-boot-complete.target.
Feb  9 18:54:50.235007 systemd[1]: Finished systemd-sysctl.service.
Feb  9 18:54:50.284722 systemd[1]: Finished systemd-udev-trigger.service.
Feb  9 18:54:50.287933 systemd[1]: Starting systemd-udev-settle.service...
Feb  9 18:54:50.291939 systemd[1]: Finished flatcar-tmpfiles.service.
Feb  9 18:54:50.295162 systemd[1]: Starting systemd-sysusers.service...
Feb  9 18:54:50.325933 systemd[1]: Finished systemd-journal-flush.service.
Feb  9 18:54:50.485129 systemd[1]: Finished systemd-sysusers.service.
Feb  9 18:54:50.490933 kernel: kauditd_printk_skb: 52 callbacks suppressed
Feb  9 18:54:50.491031 kernel: audit: type=1130 audit(1707504890.486:137): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:50.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:51.079702 systemd[1]: Finished systemd-hwdb-update.service.
Feb  9 18:54:51.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:51.086841 kernel: audit: type=1130 audit(1707504891.080:138): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:51.086881 kernel: audit: type=1334 audit(1707504891.085:139): prog-id=21 op=LOAD
Feb  9 18:54:51.085000 audit: BPF prog-id=21 op=LOAD
Feb  9 18:54:51.088358 kernel: audit: type=1334 audit(1707504891.086:140): prog-id=22 op=LOAD
Feb  9 18:54:51.088383 kernel: audit: type=1334 audit(1707504891.086:141): prog-id=7 op=UNLOAD
Feb  9 18:54:51.086000 audit: BPF prog-id=22 op=LOAD
Feb  9 18:54:51.086000 audit: BPF prog-id=7 op=UNLOAD
Feb  9 18:54:51.087756 systemd[1]: Starting systemd-udevd.service...
Feb  9 18:54:51.086000 audit: BPF prog-id=8 op=UNLOAD
Feb  9 18:54:51.090026 kernel: audit: type=1334 audit(1707504891.086:142): prog-id=8 op=UNLOAD
Feb  9 18:54:51.112559 systemd-udevd[1445]: Using default interface naming scheme 'v252'.
Feb  9 18:54:51.155226 systemd[1]: Started systemd-udevd.service.
Feb  9 18:54:51.169662 kernel: audit: type=1130 audit(1707504891.156:143): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:51.169812 kernel: audit: type=1334 audit(1707504891.157:144): prog-id=23 op=LOAD
Feb  9 18:54:51.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:51.157000 audit: BPF prog-id=23 op=LOAD
Feb  9 18:54:51.164030 systemd[1]: Starting systemd-networkd.service...
Feb  9 18:54:51.178000 audit: BPF prog-id=24 op=LOAD
Feb  9 18:54:51.182072 kernel: audit: type=1334 audit(1707504891.178:145): prog-id=24 op=LOAD
Feb  9 18:54:51.182111 kernel: audit: type=1334 audit(1707504891.179:146): prog-id=25 op=LOAD
Feb  9 18:54:51.179000 audit: BPF prog-id=25 op=LOAD
Feb  9 18:54:51.181000 audit: BPF prog-id=26 op=LOAD
Feb  9 18:54:51.182913 systemd[1]: Starting systemd-userdbd.service...
Feb  9 18:54:51.256828 systemd[1]: Started systemd-userdbd.service.
Feb  9 18:54:51.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:51.258466 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped.
Feb  9 18:54:51.271122 (udev-worker)[1449]: Network interface NamePolicy= disabled on kernel command line.
Feb  9 18:54:51.391393 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2
Feb  9 18:54:51.405888 kernel: ACPI: button: Power Button [PWRF]
Feb  9 18:54:51.405988 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3
Feb  9 18:54:51.421355 kernel: ACPI: button: Sleep Button [SLPF]
Feb  9 18:54:51.424475 systemd-networkd[1451]: lo: Link UP
Feb  9 18:54:51.424486 systemd-networkd[1451]: lo: Gained carrier
Feb  9 18:54:51.425036 systemd-networkd[1451]: Enumeration completed
Feb  9 18:54:51.425188 systemd-networkd[1451]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Feb  9 18:54:51.425191 systemd[1]: Started systemd-networkd.service.
Feb  9 18:54:51.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:51.429261 systemd[1]: Starting systemd-networkd-wait-online.service...
Feb  9 18:54:51.431350 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Feb  9 18:54:51.431965 systemd-networkd[1451]: eth0: Link UP
Feb  9 18:54:51.432274 systemd-networkd[1451]: eth0: Gained carrier
Feb  9 18:54:51.390000 audit[1461]: AVC avc:  denied  { confidentiality } for  pid=1461 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1
Feb  9 18:54:51.441567 systemd-networkd[1451]: eth0: DHCPv4 address 172.31.23.165/20, gateway 172.31.16.1 acquired from 172.31.16.1
Feb  9 18:54:51.454388 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1459)
Feb  9 18:54:51.390000 audit[1461]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55b12cb65660 a1=32194 a2=7f23df260bc5 a3=5 items=108 ppid=1445 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:54:51.390000 audit: CWD cwd="/"
Feb  9 18:54:51.390000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=1 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=2 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=3 name=(null) inode=14593 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=4 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=5 name=(null) inode=14594 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=6 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=7 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=8 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=9 name=(null) inode=14596 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=10 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=11 name=(null) inode=14597 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=12 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=13 name=(null) inode=14598 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=14 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=15 name=(null) inode=14599 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=16 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=17 name=(null) inode=14600 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=18 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=19 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=20 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=21 name=(null) inode=14602 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=22 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=23 name=(null) inode=14603 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=24 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=25 name=(null) inode=14604 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=26 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=27 name=(null) inode=14605 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=28 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=29 name=(null) inode=14606 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=30 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=31 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=32 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=33 name=(null) inode=14608 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=34 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=35 name=(null) inode=14609 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=36 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=37 name=(null) inode=14610 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=38 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=39 name=(null) inode=14611 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=40 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=41 name=(null) inode=14612 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=42 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=43 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=44 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=45 name=(null) inode=14614 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=46 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=47 name=(null) inode=14615 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=48 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=49 name=(null) inode=14616 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=50 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=51 name=(null) inode=14617 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=52 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=53 name=(null) inode=14618 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=55 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=56 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=57 name=(null) inode=14620 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=58 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=59 name=(null) inode=14621 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=60 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=61 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=62 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=63 name=(null) inode=14623 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=64 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=65 name=(null) inode=14624 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=66 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=67 name=(null) inode=14625 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=68 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=69 name=(null) inode=14626 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=70 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=71 name=(null) inode=14627 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=72 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=73 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=74 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=75 name=(null) inode=14629 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=76 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=77 name=(null) inode=14630 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=78 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=79 name=(null) inode=14631 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=80 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=81 name=(null) inode=14632 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=82 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=83 name=(null) inode=14633 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=84 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=85 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=86 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=87 name=(null) inode=14635 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=88 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=89 name=(null) inode=14636 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=90 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=91 name=(null) inode=14637 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=92 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=93 name=(null) inode=14638 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=94 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=95 name=(null) inode=14639 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=96 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=97 name=(null) inode=14640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=98 name=(null) inode=14640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=99 name=(null) inode=14641 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=100 name=(null) inode=14640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=101 name=(null) inode=14642 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=102 name=(null) inode=14640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=103 name=(null) inode=14643 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=104 name=(null) inode=14640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=105 name=(null) inode=14644 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=106 name=(null) inode=14640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PATH item=107 name=(null) inode=14645 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Feb  9 18:54:51.390000 audit: PROCTITLE proctitle="(udev-worker)"
Feb  9 18:54:51.500363 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255
Feb  9 18:54:51.527543 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4
Feb  9 18:54:51.547368 kernel: mousedev: PS/2 mouse device common for all mice
Feb  9 18:54:51.636695 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Feb  9 18:54:51.717799 systemd[1]: Finished systemd-udev-settle.service.
Feb  9 18:54:51.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:51.720152 systemd[1]: Starting lvm2-activation-early.service...
Feb  9 18:54:51.793072 lvm[1559]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Feb  9 18:54:51.823722 systemd[1]: Finished lvm2-activation-early.service.
Feb  9 18:54:51.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:51.825035 systemd[1]: Reached target cryptsetup.target.
Feb  9 18:54:51.827511 systemd[1]: Starting lvm2-activation.service...
Feb  9 18:54:51.834689 lvm[1560]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Feb  9 18:54:51.872952 systemd[1]: Finished lvm2-activation.service.
Feb  9 18:54:51.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:51.874223 systemd[1]: Reached target local-fs-pre.target.
Feb  9 18:54:51.875256 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw).
Feb  9 18:54:51.875344 systemd[1]: Reached target local-fs.target.
Feb  9 18:54:51.876458 systemd[1]: Reached target machines.target.
Feb  9 18:54:51.879448 systemd[1]: Starting ldconfig.service...
Feb  9 18:54:51.881129 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Feb  9 18:54:51.881203 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Feb  9 18:54:51.883133 systemd[1]: Starting systemd-boot-update.service...
Feb  9 18:54:51.885874 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service...
Feb  9 18:54:51.889318 systemd[1]: Starting systemd-machine-id-commit.service...
Feb  9 18:54:51.890924 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met.
Feb  9 18:54:51.891012 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met.
Feb  9 18:54:51.893210 systemd[1]: Starting systemd-tmpfiles-setup.service...
Feb  9 18:54:51.895566 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1562 (bootctl)
Feb  9 18:54:51.897795 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service...
Feb  9 18:54:51.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:51.937157 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service.
Feb  9 18:54:51.968127 systemd-tmpfiles[1565]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring.
Feb  9 18:54:51.975286 systemd-tmpfiles[1565]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring.
Feb  9 18:54:52.014357 systemd-tmpfiles[1565]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring.
Feb  9 18:54:52.067852 systemd-fsck[1570]: fsck.fat 4.2 (2021-01-31)
Feb  9 18:54:52.067852 systemd-fsck[1570]: /dev/nvme0n1p1: 789 files, 115339/258078 clusters
Feb  9 18:54:52.071132 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service.
Feb  9 18:54:52.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:52.075098 systemd[1]: Mounting boot.mount...
Feb  9 18:54:52.091713 systemd[1]: Mounted boot.mount.
Feb  9 18:54:52.118520 systemd[1]: Finished systemd-boot-update.service.
Feb  9 18:54:52.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:52.192689 systemd[1]: Finished systemd-tmpfiles-setup.service.
Feb  9 18:54:52.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:52.195524 systemd[1]: Starting audit-rules.service...
Feb  9 18:54:52.197740 systemd[1]: Starting clean-ca-certificates.service...
Feb  9 18:54:52.201661 systemd[1]: Starting systemd-journal-catalog-update.service...
Feb  9 18:54:52.203000 audit: BPF prog-id=27 op=LOAD
Feb  9 18:54:52.208000 audit: BPF prog-id=28 op=LOAD
Feb  9 18:54:52.206899 systemd[1]: Starting systemd-resolved.service...
Feb  9 18:54:52.211771 systemd[1]: Starting systemd-timesyncd.service...
Feb  9 18:54:52.218055 systemd[1]: Starting systemd-update-utmp.service...
Feb  9 18:54:52.234000 audit[1592]: SYSTEM_BOOT pid=1592 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:52.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:52.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:52.238628 systemd[1]: Finished clean-ca-certificates.service.
Feb  9 18:54:52.240046 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Feb  9 18:54:52.241940 systemd[1]: Finished systemd-update-utmp.service.
Feb  9 18:54:52.416627 systemd[1]: Started systemd-timesyncd.service.
Feb  9 18:54:52.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:52.418203 systemd[1]: Reached target time-set.target.
Feb  9 18:54:52.475889 systemd-resolved[1588]: Positive Trust Anchors:
Feb  9 18:54:52.478133 systemd-resolved[1588]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Feb  9 18:54:52.478199 systemd-resolved[1588]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Feb  9 18:54:52.531565 systemd[1]: Finished systemd-journal-catalog-update.service.
Feb  9 18:54:52.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:54:52.620179 systemd-timesyncd[1589]: Contacted time server 23.150.40.242:123 (0.flatcar.pool.ntp.org).
Feb  9 18:54:52.620278 systemd-timesyncd[1589]: Initial clock synchronization to Fri 2024-02-09 18:54:52.781478 UTC.
Feb  9 18:54:52.669000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1
Feb  9 18:54:52.669000 audit[1607]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe4618e170 a2=420 a3=0 items=0 ppid=1584 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:54:52.669000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573
Feb  9 18:54:52.670692 augenrules[1607]: No rules
Feb  9 18:54:52.671599 systemd[1]: Finished audit-rules.service.
Feb  9 18:54:52.706974 systemd-resolved[1588]: Defaulting to hostname 'linux'.
Feb  9 18:54:52.708697 systemd[1]: Started systemd-resolved.service.
Feb  9 18:54:52.709892 systemd[1]: Reached target network.target.
Feb  9 18:54:52.711187 systemd[1]: Reached target nss-lookup.target.
Feb  9 18:54:52.773468 systemd[1]: etc-machine\x2did.mount: Deactivated successfully.
Feb  9 18:54:52.774306 systemd[1]: Finished systemd-machine-id-commit.service.
Feb  9 18:54:53.342538 systemd-networkd[1451]: eth0: Gained IPv6LL
Feb  9 18:54:53.351155 systemd[1]: Finished systemd-networkd-wait-online.service.
Feb  9 18:54:53.353113 systemd[1]: Reached target network-online.target.
Feb  9 18:54:53.465021 ldconfig[1561]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start.
Feb  9 18:54:53.470320 systemd[1]: Finished ldconfig.service.
Feb  9 18:54:53.472748 systemd[1]: Starting systemd-update-done.service...
Feb  9 18:54:53.480783 systemd[1]: Finished systemd-update-done.service.
Feb  9 18:54:53.481979 systemd[1]: Reached target sysinit.target.
Feb  9 18:54:53.483062 systemd[1]: Started motdgen.path.
Feb  9 18:54:53.483982 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path.
Feb  9 18:54:53.485560 systemd[1]: Started logrotate.timer.
Feb  9 18:54:53.487392 systemd[1]: Started mdadm.timer.
Feb  9 18:54:53.488325 systemd[1]: Started systemd-tmpfiles-clean.timer.
Feb  9 18:54:53.489501 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate).
Feb  9 18:54:53.489593 systemd[1]: Reached target paths.target.
Feb  9 18:54:53.490556 systemd[1]: Reached target timers.target.
Feb  9 18:54:53.491951 systemd[1]: Listening on dbus.socket.
Feb  9 18:54:53.494056 systemd[1]: Starting docker.socket...
Feb  9 18:54:53.497493 systemd[1]: Listening on sshd.socket.
Feb  9 18:54:53.498468 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Feb  9 18:54:53.499100 systemd[1]: Listening on docker.socket.
Feb  9 18:54:53.500012 systemd[1]: Reached target sockets.target.
Feb  9 18:54:53.501091 systemd[1]: Reached target basic.target.
Feb  9 18:54:53.502199 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met.
Feb  9 18:54:53.502226 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met.
Feb  9 18:54:53.503498 systemd[1]: Started amazon-ssm-agent.service.
Feb  9 18:54:53.506079 systemd[1]: Starting containerd.service...
Feb  9 18:54:53.510312 systemd[1]: Starting coreos-metadata-sshkeys@core.service...
Feb  9 18:54:53.513000 systemd[1]: Starting dbus.service...
Feb  9 18:54:53.516032 systemd[1]: Starting enable-oem-cloudinit.service...
Feb  9 18:54:53.522681 systemd[1]: Starting extend-filesystems.service...
Feb  9 18:54:53.523945 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment).
Feb  9 18:54:53.532642 systemd[1]: Starting motdgen.service...
Feb  9 18:54:53.535761 systemd[1]: Started nvidia.service.
Feb  9 18:54:53.539202 systemd[1]: Starting prepare-cni-plugins.service...
Feb  9 18:54:53.543537 systemd[1]: Starting prepare-critools.service...
Feb  9 18:54:53.556821 systemd[1]: Starting prepare-helm.service...
Feb  9 18:54:53.593228 jq[1621]: false
Feb  9 18:54:53.560849 systemd[1]: Starting ssh-key-proc-cmdline.service...
Feb  9 18:54:53.565906 systemd[1]: Starting sshd-keygen.service...
Feb  9 18:54:53.572320 systemd[1]: Starting systemd-logind.service...
Feb  9 18:54:53.573468 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Feb  9 18:54:53.573527 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0).
Feb  9 18:54:53.574679 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details.
Feb  9 18:54:53.576630 systemd[1]: Starting update-engine.service...
Feb  9 18:54:53.579256 systemd[1]: Starting update-ssh-keys-after-ignition.service...
Feb  9 18:54:53.596109 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'.
Feb  9 18:54:53.596341 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped.
Feb  9 18:54:53.661155 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully.
Feb  9 18:54:53.754003 jq[1634]: true
Feb  9 18:54:53.661392 systemd[1]: Finished ssh-key-proc-cmdline.service.
Feb  9 18:54:53.755565 tar[1636]: ./
Feb  9 18:54:53.755565 tar[1636]: ./macvlan
Feb  9 18:54:53.779641 tar[1642]: linux-amd64/helm
Feb  9 18:54:53.756938 dbus-daemon[1620]: [system] SELinux support is enabled
Feb  9 18:54:53.757127 systemd[1]: Started dbus.service.
Feb  9 18:54:53.764693 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml).
Feb  9 18:54:53.797455 jq[1646]: true
Feb  9 18:54:53.792580 dbus-daemon[1620]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1451 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0")
Feb  9 18:54:53.764736 systemd[1]: Reached target system-config.target.
Feb  9 18:54:53.766097 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url).
Feb  9 18:54:53.766132 systemd[1]: Reached target user-config.target.
Feb  9 18:54:53.798030 tar[1637]: crictl
Feb  9 18:54:53.794782 systemd[1]: motdgen.service: Deactivated successfully.
Feb  9 18:54:53.795115 systemd[1]: Finished motdgen.service.
Feb  9 18:54:53.821166 dbus-daemon[1620]: [system] Successfully activated service 'org.freedesktop.systemd1'
Feb  9 18:54:53.826976 systemd[1]: Starting systemd-hostnamed.service...
Feb  9 18:54:53.848031 extend-filesystems[1622]: Found nvme0n1
Feb  9 18:54:53.894564 extend-filesystems[1622]: Found nvme0n1p1
Feb  9 18:54:53.895957 extend-filesystems[1622]: Found nvme0n1p2
Feb  9 18:54:53.916555 extend-filesystems[1622]: Found nvme0n1p3
Feb  9 18:54:53.919516 extend-filesystems[1622]: Found usr
Feb  9 18:54:53.921952 extend-filesystems[1622]: Found nvme0n1p4
Feb  9 18:54:53.925211 extend-filesystems[1622]: Found nvme0n1p6
Feb  9 18:54:53.966219 extend-filesystems[1622]: Found nvme0n1p7
Feb  9 18:54:53.966219 extend-filesystems[1622]: Found nvme0n1p9
Feb  9 18:54:53.966219 extend-filesystems[1622]: Checking size of /dev/nvme0n1p9
Feb  9 18:54:53.994511 extend-filesystems[1622]: Resized partition /dev/nvme0n1p9
Feb  9 18:54:54.012932 amazon-ssm-agent[1617]: 2024/02/09 18:54:54 Failed to load instance info from vault. RegistrationKey does not exist.
Feb  9 18:54:54.035549 extend-filesystems[1690]: resize2fs 1.46.5 (30-Dec-2021)
Feb  9 18:54:54.050932 bash[1691]: Updated "/home/core/.ssh/authorized_keys"
Feb  9 18:54:54.051965 systemd[1]: Finished update-ssh-keys-after-ignition.service.
Feb  9 18:54:54.059408 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks
Feb  9 18:54:54.068379 update_engine[1633]: I0209 18:54:54.067273  1633 main.cc:92] Flatcar Update Engine starting
Feb  9 18:54:54.076306 amazon-ssm-agent[1617]: Initializing new seelog logger
Feb  9 18:54:54.076306 amazon-ssm-agent[1617]: New Seelog Logger Creation Complete
Feb  9 18:54:54.076306 amazon-ssm-agent[1617]: 2024/02/09 18:54:54 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json.
Feb  9 18:54:54.076306 amazon-ssm-agent[1617]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json.
Feb  9 18:54:54.076306 amazon-ssm-agent[1617]: 2024/02/09 18:54:54 processing appconfig overrides
Feb  9 18:54:54.077709 systemd[1]: Started update-engine.service.
Feb  9 18:54:54.078397 update_engine[1633]: I0209 18:54:54.078222  1633 update_check_scheduler.cc:74] Next update check in 4m11s
Feb  9 18:54:54.082375 systemd[1]: Started locksmithd.service.
Feb  9 18:54:54.123584 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915
Feb  9 18:54:54.152921 extend-filesystems[1690]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required
Feb  9 18:54:54.152921 extend-filesystems[1690]: old_desc_blocks = 1, new_desc_blocks = 1
Feb  9 18:54:54.152921 extend-filesystems[1690]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long.
Feb  9 18:54:54.151225 systemd[1]: extend-filesystems.service: Deactivated successfully.
Feb  9 18:54:54.163668 extend-filesystems[1622]: Resized filesystem in /dev/nvme0n1p9
Feb  9 18:54:54.151527 systemd[1]: Finished extend-filesystems.service.
Feb  9 18:54:54.188469 env[1645]: time="2024-02-09T18:54:54.188289088Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16
Feb  9 18:54:54.194222 tar[1636]: ./static
Feb  9 18:54:54.231695 systemd-logind[1632]: Watching system buttons on /dev/input/event1 (Power Button)
Feb  9 18:54:54.232094 systemd-logind[1632]: Watching system buttons on /dev/input/event2 (Sleep Button)
Feb  9 18:54:54.232214 systemd-logind[1632]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard)
Feb  9 18:54:54.232522 systemd-logind[1632]: New seat seat0.
Feb  9 18:54:54.235403 systemd[1]: Started systemd-logind.service.
Feb  9 18:54:54.314725 tar[1636]: ./vlan
Feb  9 18:54:54.331809 systemd[1]: nvidia.service: Deactivated successfully.
Feb  9 18:54:54.351575 dbus-daemon[1620]: [system] Successfully activated service 'org.freedesktop.hostname1'
Feb  9 18:54:54.351749 systemd[1]: Started systemd-hostnamed.service.
Feb  9 18:54:54.354614 dbus-daemon[1620]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1663 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0")
Feb  9 18:54:54.359007 systemd[1]: Starting polkit.service...
Feb  9 18:54:54.387600 polkitd[1713]: Started polkitd version 121
Feb  9 18:54:54.414318 polkitd[1713]: Loading rules from directory /etc/polkit-1/rules.d
Feb  9 18:54:54.414423 polkitd[1713]: Loading rules from directory /usr/share/polkit-1/rules.d
Feb  9 18:54:54.416543 polkitd[1713]: Finished loading, compiling and executing 2 rules
Feb  9 18:54:54.424633 dbus-daemon[1620]: [system] Successfully activated service 'org.freedesktop.PolicyKit1'
Feb  9 18:54:54.424885 systemd[1]: Started polkit.service.
Feb  9 18:54:54.426427 polkitd[1713]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
Feb  9 18:54:54.443514 systemd-hostnamed[1663]: Hostname set to <ip-172-31-23-165> (transient)
Feb  9 18:54:54.443649 systemd-resolved[1588]: System hostname changed to 'ip-172-31-23-165'.
Feb  9 18:54:54.447744 env[1645]: time="2024-02-09T18:54:54.447676892Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1
Feb  9 18:54:54.449331 env[1645]: time="2024-02-09T18:54:54.449299201Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1
Feb  9 18:54:54.452269 env[1645]: time="2024-02-09T18:54:54.452228094Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1
Feb  9 18:54:54.460451 env[1645]: time="2024-02-09T18:54:54.460407199Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1
Feb  9 18:54:54.460923 env[1645]: time="2024-02-09T18:54:54.460890820Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Feb  9 18:54:54.461034 env[1645]: time="2024-02-09T18:54:54.461017525Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1
Feb  9 18:54:54.461110 env[1645]: time="2024-02-09T18:54:54.461094344Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured"
Feb  9 18:54:54.461168 env[1645]: time="2024-02-09T18:54:54.461156663Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1
Feb  9 18:54:54.461371 env[1645]: time="2024-02-09T18:54:54.461331223Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1
Feb  9 18:54:54.461747 env[1645]: time="2024-02-09T18:54:54.461722889Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1
Feb  9 18:54:54.462229 env[1645]: time="2024-02-09T18:54:54.462199810Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Feb  9 18:54:54.468444 env[1645]: time="2024-02-09T18:54:54.468400594Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1
Feb  9 18:54:54.468690 env[1645]: time="2024-02-09T18:54:54.468669884Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured"
Feb  9 18:54:54.470754 env[1645]: time="2024-02-09T18:54:54.470719668Z" level=info msg="metadata content store policy set" policy=shared
Feb  9 18:54:54.478378 env[1645]: time="2024-02-09T18:54:54.478318626Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1
Feb  9 18:54:54.478506 env[1645]: time="2024-02-09T18:54:54.478390422Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1
Feb  9 18:54:54.478506 env[1645]: time="2024-02-09T18:54:54.478409637Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1
Feb  9 18:54:54.478506 env[1645]: time="2024-02-09T18:54:54.478448861Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1
Feb  9 18:54:54.478506 env[1645]: time="2024-02-09T18:54:54.478469042Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1
Feb  9 18:54:54.478506 env[1645]: time="2024-02-09T18:54:54.478489385Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1
Feb  9 18:54:54.478704 env[1645]: time="2024-02-09T18:54:54.478506684Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1
Feb  9 18:54:54.478704 env[1645]: time="2024-02-09T18:54:54.478526919Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1
Feb  9 18:54:54.478704 env[1645]: time="2024-02-09T18:54:54.478549891Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1
Feb  9 18:54:54.478704 env[1645]: time="2024-02-09T18:54:54.478576829Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1
Feb  9 18:54:54.478704 env[1645]: time="2024-02-09T18:54:54.478596767Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1
Feb  9 18:54:54.478704 env[1645]: time="2024-02-09T18:54:54.478615550Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1
Feb  9 18:54:54.478919 env[1645]: time="2024-02-09T18:54:54.478762894Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2
Feb  9 18:54:54.478919 env[1645]: time="2024-02-09T18:54:54.478864470Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1
Feb  9 18:54:54.479308 env[1645]: time="2024-02-09T18:54:54.479278264Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1
Feb  9 18:54:54.479413 env[1645]: time="2024-02-09T18:54:54.479325826Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1
Feb  9 18:54:54.479413 env[1645]: time="2024-02-09T18:54:54.479361138Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1
Feb  9 18:54:54.479496 env[1645]: time="2024-02-09T18:54:54.479423665Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1
Feb  9 18:54:54.479496 env[1645]: time="2024-02-09T18:54:54.479443843Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1
Feb  9 18:54:54.479496 env[1645]: time="2024-02-09T18:54:54.479462485Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1
Feb  9 18:54:54.479496 env[1645]: time="2024-02-09T18:54:54.479481330Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1
Feb  9 18:54:54.479651 env[1645]: time="2024-02-09T18:54:54.479500464Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1
Feb  9 18:54:54.479651 env[1645]: time="2024-02-09T18:54:54.479519211Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1
Feb  9 18:54:54.479651 env[1645]: time="2024-02-09T18:54:54.479538984Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1
Feb  9 18:54:54.479651 env[1645]: time="2024-02-09T18:54:54.479556082Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1
Feb  9 18:54:54.479651 env[1645]: time="2024-02-09T18:54:54.479578148Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1
Feb  9 18:54:54.479849 env[1645]: time="2024-02-09T18:54:54.479737488Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1
Feb  9 18:54:54.479849 env[1645]: time="2024-02-09T18:54:54.479765127Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1
Feb  9 18:54:54.479849 env[1645]: time="2024-02-09T18:54:54.479783758Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1
Feb  9 18:54:54.479849 env[1645]: time="2024-02-09T18:54:54.479802339Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1
Feb  9 18:54:54.479849 env[1645]: time="2024-02-09T18:54:54.479824485Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1
Feb  9 18:54:54.479849 env[1645]: time="2024-02-09T18:54:54.479843741Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1
Feb  9 18:54:54.480072 env[1645]: time="2024-02-09T18:54:54.479870491Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin"
Feb  9 18:54:54.480072 env[1645]: time="2024-02-09T18:54:54.479916236Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1
Feb  9 18:54:54.480298 env[1645]: time="2024-02-09T18:54:54.480230331Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}"
Feb  9 18:54:54.482543 env[1645]: time="2024-02-09T18:54:54.480312518Z" level=info msg="Connect containerd service"
Feb  9 18:54:54.482543 env[1645]: time="2024-02-09T18:54:54.480379050Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\""
Feb  9 18:54:54.482543 env[1645]: time="2024-02-09T18:54:54.481847304Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Feb  9 18:54:54.482543 env[1645]: time="2024-02-09T18:54:54.482026703Z" level=info msg="Start subscribing containerd event"
Feb  9 18:54:54.482543 env[1645]: time="2024-02-09T18:54:54.482259700Z" level=info msg="Start recovering state"
Feb  9 18:54:54.482543 env[1645]: time="2024-02-09T18:54:54.482410943Z" level=info msg="Start event monitor"
Feb  9 18:54:54.482543 env[1645]: time="2024-02-09T18:54:54.482428574Z" level=info msg="Start snapshots syncer"
Feb  9 18:54:54.482543 env[1645]: time="2024-02-09T18:54:54.482447525Z" level=info msg="Start cni network conf syncer for default"
Feb  9 18:54:54.482543 env[1645]: time="2024-02-09T18:54:54.482459784Z" level=info msg="Start streaming server"
Feb  9 18:54:54.507427 tar[1636]: ./portmap
Feb  9 18:54:54.508970 env[1645]: time="2024-02-09T18:54:54.508926599Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc
Feb  9 18:54:54.509072 env[1645]: time="2024-02-09T18:54:54.509013003Z" level=info msg=serving... address=/run/containerd/containerd.sock
Feb  9 18:54:54.509204 systemd[1]: Started containerd.service.
Feb  9 18:54:54.510500 env[1645]: time="2024-02-09T18:54:54.509346307Z" level=info msg="containerd successfully booted in 0.435544s"
Feb  9 18:54:54.694414 tar[1636]: ./host-local
Feb  9 18:54:54.746535 coreos-metadata[1619]: Feb 09 18:54:54.746 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1
Feb  9 18:54:54.752651 coreos-metadata[1619]: Feb 09 18:54:54.752 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1
Feb  9 18:54:54.756567 coreos-metadata[1619]: Feb 09 18:54:54.756 INFO Fetch successful
Feb  9 18:54:54.756820 coreos-metadata[1619]: Feb 09 18:54:54.756 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1
Feb  9 18:54:54.757743 coreos-metadata[1619]: Feb 09 18:54:54.757 INFO Fetch successful
Feb  9 18:54:54.760641 unknown[1619]: wrote ssh authorized keys file for user: core
Feb  9 18:54:54.790469 update-ssh-keys[1764]: Updated "/home/core/.ssh/authorized_keys"
Feb  9 18:54:54.791916 systemd[1]: Finished coreos-metadata-sshkeys@core.service.
Feb  9 18:54:54.843026 tar[1636]: ./vrf
Feb  9 18:54:54.928842 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO Create new startup processor
Feb  9 18:54:54.929226 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [LongRunningPluginsManager] registered plugins: {}
Feb  9 18:54:54.929479 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO Initializing bookkeeping folders
Feb  9 18:54:54.929602 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO removing the completed state files
Feb  9 18:54:54.929714 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO Initializing bookkeeping folders for long running plugins
Feb  9 18:54:54.929818 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO Initializing replies folder for MDS reply requests that couldn't reach the service
Feb  9 18:54:54.929905 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO Initializing healthcheck folders for long running plugins
Feb  9 18:54:54.929982 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO Initializing locations for inventory plugin
Feb  9 18:54:54.930078 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO Initializing default location for custom inventory
Feb  9 18:54:54.930157 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO Initializing default location for file inventory
Feb  9 18:54:54.930241 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO Initializing default location for role inventory
Feb  9 18:54:54.930330 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO Init the cloudwatchlogs publisher
Feb  9 18:54:54.930424 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [instanceID=i-07cc3edced18f274b] Successfully loaded platform independent plugin aws:softwareInventory
Feb  9 18:54:54.930527 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [instanceID=i-07cc3edced18f274b] Successfully loaded platform independent plugin aws:configureDocker
Feb  9 18:54:54.930609 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [instanceID=i-07cc3edced18f274b] Successfully loaded platform independent plugin aws:downloadContent
Feb  9 18:54:54.930696 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [instanceID=i-07cc3edced18f274b] Successfully loaded platform independent plugin aws:runDocument
Feb  9 18:54:54.930779 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [instanceID=i-07cc3edced18f274b] Successfully loaded platform independent plugin aws:configurePackage
Feb  9 18:54:54.930867 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [instanceID=i-07cc3edced18f274b] Successfully loaded platform independent plugin aws:runPowerShellScript
Feb  9 18:54:54.930946 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [instanceID=i-07cc3edced18f274b] Successfully loaded platform independent plugin aws:updateSsmAgent
Feb  9 18:54:54.931036 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [instanceID=i-07cc3edced18f274b] Successfully loaded platform independent plugin aws:runDockerAction
Feb  9 18:54:54.931122 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [instanceID=i-07cc3edced18f274b] Successfully loaded platform independent plugin aws:refreshAssociation
Feb  9 18:54:54.931211 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [instanceID=i-07cc3edced18f274b] Successfully loaded platform dependent plugin aws:runShellScript
Feb  9 18:54:54.931289 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0
Feb  9 18:54:54.931386 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO OS: linux, Arch: amd64
Feb  9 18:54:54.940170 amazon-ssm-agent[1617]: datastore file /var/lib/amazon/ssm/i-07cc3edced18f274b/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute
Feb  9 18:54:54.981834 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [MessagingDeliveryService] Starting document processing engine...
Feb  9 18:54:55.006566 tar[1636]: ./bridge
Feb  9 18:54:55.083957 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [MessagingDeliveryService] [EngineProcessor] Starting
Feb  9 18:54:55.179950 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing
Feb  9 18:54:55.201417 tar[1636]: ./tuning
Feb  9 18:54:55.274519 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [MessagingDeliveryService] Starting message polling
Feb  9 18:54:55.318461 tar[1636]: ./firewall
Feb  9 18:54:55.369212 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [MessagingDeliveryService] Starting send replies to MDS
Feb  9 18:54:55.427079 tar[1636]: ./host-device
Feb  9 18:54:55.464118 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [instanceID=i-07cc3edced18f274b] Starting association polling
Feb  9 18:54:55.515304 tar[1636]: ./sbr
Feb  9 18:54:55.559488 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting
Feb  9 18:54:55.612805 tar[1636]: ./loopback
Feb  9 18:54:55.654706 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [MessagingDeliveryService] [Association] Launching response handler
Feb  9 18:54:55.689681 tar[1636]: ./dhcp
Feb  9 18:54:55.749083 tar[1642]: linux-amd64/LICENSE
Feb  9 18:54:55.750162 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing
Feb  9 18:54:55.750402 tar[1642]: linux-amd64/README.md
Feb  9 18:54:55.762887 systemd[1]: Finished prepare-helm.service.
Feb  9 18:54:55.845983 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service
Feb  9 18:54:55.856102 systemd[1]: Finished prepare-critools.service.
Feb  9 18:54:55.866706 tar[1636]: ./ptp
Feb  9 18:54:55.923762 tar[1636]: ./ipvlan
Feb  9 18:54:55.941863 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized
Feb  9 18:54:55.985858 tar[1636]: ./bandwidth
Feb  9 18:54:56.037962 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [MessageGatewayService] Starting session document processing engine...
Feb  9 18:54:56.074866 systemd[1]: Finished prepare-cni-plugins.service.
Feb  9 18:54:56.134250 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [MessageGatewayService] [EngineProcessor] Starting
Feb  9 18:54:56.231043 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module.
Feb  9 18:54:56.278182 locksmithd[1698]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot"
Feb  9 18:54:56.327667 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-07cc3edced18f274b, requestId: c0eea840-8302-4277-af93-f1b7bddd55b2
Feb  9 18:54:56.424667 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [OfflineService] Starting document processing engine...
Feb  9 18:54:56.522045 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [OfflineService] [EngineProcessor] Starting
Feb  9 18:54:56.619576 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [OfflineService] [EngineProcessor] Initial processing
Feb  9 18:54:56.717321 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [OfflineService] Starting message polling
Feb  9 18:54:56.815112 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [OfflineService] Starting send replies to MDS
Feb  9 18:54:56.914124 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [LongRunningPluginsManager] starting long running plugin manager
Feb  9 18:54:57.012677 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [MessageGatewayService] listening reply.
Feb  9 18:54:57.111545 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute
Feb  9 18:54:57.212333 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [HealthCheck] HealthCheck reporting agent health.
Feb  9 18:54:57.311830 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [StartupProcessor] Executing startup processor tasks
Feb  9 18:54:57.411041 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running
Feb  9 18:54:57.510302 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk
Feb  9 18:54:57.610088 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.2
Feb  9 18:54:57.710439 amazon-ssm-agent[1617]: 2024-02-09 18:54:54 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck
Feb  9 18:54:57.810117 amazon-ssm-agent[1617]: 2024-02-09 18:54:55 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-07cc3edced18f274b?role=subscribe&stream=input
Feb  9 18:54:57.910621 amazon-ssm-agent[1617]: 2024-02-09 18:54:55 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-07cc3edced18f274b?role=subscribe&stream=input
Feb  9 18:54:57.972128 sshd_keygen[1661]: ssh-keygen: generating new host keys: RSA ECDSA ED25519
Feb  9 18:54:57.999604 systemd[1]: Finished sshd-keygen.service.
Feb  9 18:54:58.003371 systemd[1]: Starting issuegen.service...
Feb  9 18:54:58.010070 systemd[1]: issuegen.service: Deactivated successfully.
Feb  9 18:54:58.011479 amazon-ssm-agent[1617]: 2024-02-09 18:54:55 INFO [MessageGatewayService] Starting receiving message from control channel
Feb  9 18:54:58.010234 systemd[1]: Finished issuegen.service.
Feb  9 18:54:58.013185 systemd[1]: Starting systemd-user-sessions.service...
Feb  9 18:54:58.021018 systemd[1]: Finished systemd-user-sessions.service.
Feb  9 18:54:58.023875 systemd[1]: Started getty@tty1.service.
Feb  9 18:54:58.026371 systemd[1]: Started serial-getty@ttyS0.service.
Feb  9 18:54:58.027942 systemd[1]: Reached target getty.target.
Feb  9 18:54:58.028939 systemd[1]: Reached target multi-user.target.
Feb  9 18:54:58.031562 systemd[1]: Starting systemd-update-utmp-runlevel.service...
Feb  9 18:54:58.041136 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully.
Feb  9 18:54:58.042384 systemd[1]: Finished systemd-update-utmp-runlevel.service.
Feb  9 18:54:58.043961 systemd[1]: Startup finished in 811ms (kernel) + 9.050s (initrd) + 13.155s (userspace) = 23.017s.
Feb  9 18:54:58.110727 amazon-ssm-agent[1617]: 2024-02-09 18:54:55 INFO [MessageGatewayService] [EngineProcessor] Initial processing
Feb  9 18:55:03.588272 systemd[1]: Created slice system-sshd.slice.
Feb  9 18:55:03.592045 systemd[1]: Started sshd@0-172.31.23.165:22-139.178.68.195:53080.service.
Feb  9 18:55:03.830152 sshd[1835]: Accepted publickey for core from 139.178.68.195 port 53080 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg
Feb  9 18:55:03.836979 sshd[1835]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 18:55:03.877481 systemd[1]: Created slice user-500.slice.
Feb  9 18:55:03.880848 systemd[1]: Starting user-runtime-dir@500.service...
Feb  9 18:55:03.889011 systemd-logind[1632]: New session 1 of user core.
Feb  9 18:55:03.920708 systemd[1]: Finished user-runtime-dir@500.service.
Feb  9 18:55:03.923276 systemd[1]: Starting user@500.service...
Feb  9 18:55:03.928112 (systemd)[1838]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0)
Feb  9 18:55:04.128918 systemd[1838]: Queued start job for default target default.target.
Feb  9 18:55:04.130377 systemd[1838]: Reached target paths.target.
Feb  9 18:55:04.130412 systemd[1838]: Reached target sockets.target.
Feb  9 18:55:04.130430 systemd[1838]: Reached target timers.target.
Feb  9 18:55:04.130447 systemd[1838]: Reached target basic.target.
Feb  9 18:55:04.130576 systemd[1]: Started user@500.service.
Feb  9 18:55:04.133799 systemd[1]: Started session-1.scope.
Feb  9 18:55:04.134376 systemd[1838]: Reached target default.target.
Feb  9 18:55:04.134608 systemd[1838]: Startup finished in 199ms.
Feb  9 18:55:04.285769 systemd[1]: Started sshd@1-172.31.23.165:22-139.178.68.195:53084.service.
Feb  9 18:55:04.471364 sshd[1847]: Accepted publickey for core from 139.178.68.195 port 53084 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg
Feb  9 18:55:04.472773 sshd[1847]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 18:55:04.477870 systemd-logind[1632]: New session 2 of user core.
Feb  9 18:55:04.478460 systemd[1]: Started session-2.scope.
Feb  9 18:55:04.628495 sshd[1847]: pam_unix(sshd:session): session closed for user core
Feb  9 18:55:04.632800 systemd[1]: sshd@1-172.31.23.165:22-139.178.68.195:53084.service: Deactivated successfully.
Feb  9 18:55:04.634992 systemd[1]: session-2.scope: Deactivated successfully.
Feb  9 18:55:04.636973 systemd-logind[1632]: Session 2 logged out. Waiting for processes to exit.
Feb  9 18:55:04.642271 systemd-logind[1632]: Removed session 2.
Feb  9 18:55:04.655487 systemd[1]: Started sshd@2-172.31.23.165:22-139.178.68.195:53092.service.
Feb  9 18:55:04.826541 sshd[1853]: Accepted publickey for core from 139.178.68.195 port 53092 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg
Feb  9 18:55:04.828834 sshd[1853]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 18:55:04.834388 systemd-logind[1632]: New session 3 of user core.
Feb  9 18:55:04.835072 systemd[1]: Started session-3.scope.
Feb  9 18:55:04.956764 sshd[1853]: pam_unix(sshd:session): session closed for user core
Feb  9 18:55:04.962235 systemd[1]: sshd@2-172.31.23.165:22-139.178.68.195:53092.service: Deactivated successfully.
Feb  9 18:55:04.965123 systemd[1]: session-3.scope: Deactivated successfully.
Feb  9 18:55:04.971712 systemd-logind[1632]: Session 3 logged out. Waiting for processes to exit.
Feb  9 18:55:04.973244 systemd-logind[1632]: Removed session 3.
Feb  9 18:55:04.989918 systemd[1]: Started sshd@3-172.31.23.165:22-139.178.68.195:53104.service.
Feb  9 18:55:05.042786 amazon-ssm-agent[1617]: 2024-02-09 18:55:05 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds.
Feb  9 18:55:05.176423 sshd[1859]: Accepted publickey for core from 139.178.68.195 port 53104 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg
Feb  9 18:55:05.177313 sshd[1859]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 18:55:05.182779 systemd[1]: Started session-4.scope.
Feb  9 18:55:05.183617 systemd-logind[1632]: New session 4 of user core.
Feb  9 18:55:05.310818 sshd[1859]: pam_unix(sshd:session): session closed for user core
Feb  9 18:55:05.314029 systemd[1]: sshd@3-172.31.23.165:22-139.178.68.195:53104.service: Deactivated successfully.
Feb  9 18:55:05.314908 systemd[1]: session-4.scope: Deactivated successfully.
Feb  9 18:55:05.315603 systemd-logind[1632]: Session 4 logged out. Waiting for processes to exit.
Feb  9 18:55:05.316803 systemd-logind[1632]: Removed session 4.
Feb  9 18:55:05.336893 systemd[1]: Started sshd@4-172.31.23.165:22-139.178.68.195:53108.service.
Feb  9 18:55:05.502840 sshd[1865]: Accepted publickey for core from 139.178.68.195 port 53108 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg
Feb  9 18:55:05.504318 sshd[1865]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 18:55:05.510175 systemd[1]: Started session-5.scope.
Feb  9 18:55:05.510988 systemd-logind[1632]: New session 5 of user core.
Feb  9 18:55:05.626752 sudo[1868]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1
Feb  9 18:55:05.627052 sudo[1868]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Feb  9 18:55:05.634571 dbus-daemon[1620]: \xd0]y\xfa\xc4U:  received setenforce notice (enforcing=-32683648)
Feb  9 18:55:05.636553 sudo[1868]: pam_unix(sudo:session): session closed for user root
Feb  9 18:55:05.660458 sshd[1865]: pam_unix(sshd:session): session closed for user core
Feb  9 18:55:05.664051 systemd-logind[1632]: Session 5 logged out. Waiting for processes to exit.
Feb  9 18:55:05.664458 systemd[1]: sshd@4-172.31.23.165:22-139.178.68.195:53108.service: Deactivated successfully.
Feb  9 18:55:05.665679 systemd[1]: session-5.scope: Deactivated successfully.
Feb  9 18:55:05.666711 systemd-logind[1632]: Removed session 5.
Feb  9 18:55:05.686475 systemd[1]: Started sshd@5-172.31.23.165:22-139.178.68.195:53114.service.
Feb  9 18:55:05.854309 sshd[1872]: Accepted publickey for core from 139.178.68.195 port 53114 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg
Feb  9 18:55:05.856498 sshd[1872]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 18:55:05.861329 systemd-logind[1632]: New session 6 of user core.
Feb  9 18:55:05.861923 systemd[1]: Started session-6.scope.
Feb  9 18:55:05.981775 sudo[1876]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules
Feb  9 18:55:05.982087 sudo[1876]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Feb  9 18:55:06.008033 sudo[1876]: pam_unix(sudo:session): session closed for user root
Feb  9 18:55:06.023231 sudo[1875]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules
Feb  9 18:55:06.023622 sudo[1875]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Feb  9 18:55:06.053634 systemd[1]: Stopping audit-rules.service...
Feb  9 18:55:06.056000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Feb  9 18:55:06.058814 kernel: kauditd_printk_skb: 132 callbacks suppressed
Feb  9 18:55:06.058894 kernel: audit: type=1305 audit(1707504906.056:166): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Feb  9 18:55:06.058926 auditctl[1879]: No rules
Feb  9 18:55:06.059493 systemd[1]: audit-rules.service: Deactivated successfully.
Feb  9 18:55:06.059700 systemd[1]: Stopped audit-rules.service.
Feb  9 18:55:06.069767 kernel: audit: type=1300 audit(1707504906.056:166): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe68c1dce0 a2=420 a3=0 items=0 ppid=1 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:06.056000 audit[1879]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe68c1dce0 a2=420 a3=0 items=0 ppid=1 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:06.056000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44
Feb  9 18:55:06.071278 systemd[1]: Starting audit-rules.service...
Feb  9 18:55:06.072978 kernel: audit: type=1327 audit(1707504906.056:166): proctitle=2F7362696E2F617564697463746C002D44
Feb  9 18:55:06.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:06.079378 kernel: audit: type=1131 audit(1707504906.058:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:06.094990 augenrules[1896]: No rules
Feb  9 18:55:06.095978 systemd[1]: Finished audit-rules.service.
Feb  9 18:55:06.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:06.097680 sudo[1875]: pam_unix(sudo:session): session closed for user root
Feb  9 18:55:06.096000 audit[1875]: USER_END pid=1875 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:06.108152 kernel: audit: type=1130 audit(1707504906.095:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:06.108255 kernel: audit: type=1106 audit(1707504906.096:169): pid=1875 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:06.108497 kernel: audit: type=1104 audit(1707504906.096:170): pid=1875 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:06.096000 audit[1875]: CRED_DISP pid=1875 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:06.120240 sshd[1872]: pam_unix(sshd:session): session closed for user core
Feb  9 18:55:06.120000 audit[1872]: USER_END pid=1872 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 18:55:06.124379 systemd[1]: sshd@5-172.31.23.165:22-139.178.68.195:53114.service: Deactivated successfully.
Feb  9 18:55:06.125258 systemd[1]: session-6.scope: Deactivated successfully.
Feb  9 18:55:06.127028 systemd-logind[1632]: Session 6 logged out. Waiting for processes to exit.
Feb  9 18:55:06.128974 systemd-logind[1632]: Removed session 6.
Feb  9 18:55:06.121000 audit[1872]: CRED_DISP pid=1872 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 18:55:06.130384 kernel: audit: type=1106 audit(1707504906.120:171): pid=1872 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 18:55:06.130546 kernel: audit: type=1104 audit(1707504906.121:172): pid=1872 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 18:55:06.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.23.165:22-139.178.68.195:53114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:06.136354 kernel: audit: type=1131 audit(1707504906.121:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.23.165:22-139.178.68.195:53114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:06.145943 systemd[1]: Started sshd@6-172.31.23.165:22-139.178.68.195:50854.service.
Feb  9 18:55:06.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.23.165:22-139.178.68.195:50854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:06.313000 audit[1902]: USER_ACCT pid=1902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 18:55:06.314985 sshd[1902]: Accepted publickey for core from 139.178.68.195 port 50854 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg
Feb  9 18:55:06.314000 audit[1902]: CRED_ACQ pid=1902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 18:55:06.314000 audit[1902]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2363bd30 a2=3 a3=0 items=0 ppid=1 pid=1902 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:06.314000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Feb  9 18:55:06.316647 sshd[1902]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Feb  9 18:55:06.325216 systemd[1]: Started session-7.scope.
Feb  9 18:55:06.326816 systemd-logind[1632]: New session 7 of user core.
Feb  9 18:55:06.339000 audit[1902]: USER_START pid=1902 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 18:55:06.341000 audit[1904]: CRED_ACQ pid=1904 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 18:55:06.438000 audit[1905]: USER_ACCT pid=1905 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:06.438000 audit[1905]: CRED_REFR pid=1905 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:06.439168 sudo[1905]:     core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh
Feb  9 18:55:06.439488 sudo[1905]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Feb  9 18:55:06.445000 audit[1905]: USER_START pid=1905 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:07.060105 systemd[1]: Starting docker.service...
Feb  9 18:55:07.114760 env[1920]: time="2024-02-09T18:55:07.114677274Z" level=info msg="Starting up"
Feb  9 18:55:07.116094 env[1920]: time="2024-02-09T18:55:07.116053571Z" level=info msg="parsed scheme: \"unix\"" module=grpc
Feb  9 18:55:07.116094 env[1920]: time="2024-02-09T18:55:07.116087551Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc
Feb  9 18:55:07.116303 env[1920]: time="2024-02-09T18:55:07.116116362Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock  <nil> 0 <nil>}] <nil> <nil>}" module=grpc
Feb  9 18:55:07.116303 env[1920]: time="2024-02-09T18:55:07.116130007Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc
Feb  9 18:55:07.118166 env[1920]: time="2024-02-09T18:55:07.118129853Z" level=info msg="parsed scheme: \"unix\"" module=grpc
Feb  9 18:55:07.118166 env[1920]: time="2024-02-09T18:55:07.118150993Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc
Feb  9 18:55:07.118309 env[1920]: time="2024-02-09T18:55:07.118170926Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock  <nil> 0 <nil>}] <nil> <nil>}" module=grpc
Feb  9 18:55:07.118309 env[1920]: time="2024-02-09T18:55:07.118183454Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc
Feb  9 18:55:07.128385 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3532684253-merged.mount: Deactivated successfully.
Feb  9 18:55:07.221928 env[1920]: time="2024-02-09T18:55:07.221882946Z" level=info msg="Loading containers: start."
Feb  9 18:55:07.287000 audit[1950]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.287000 audit[1950]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff49deea10 a2=0 a3=7fff49dee9fc items=0 ppid=1920 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.287000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552
Feb  9 18:55:07.289000 audit[1952]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1952 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.289000 audit[1952]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe47cda590 a2=0 a3=7ffe47cda57c items=0 ppid=1920 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.289000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552
Feb  9 18:55:07.292000 audit[1954]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1954 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.292000 audit[1954]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc5ec2b900 a2=0 a3=7ffc5ec2b8ec items=0 ppid=1920 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.292000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31
Feb  9 18:55:07.295000 audit[1956]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1956 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.295000 audit[1956]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc6eaefab0 a2=0 a3=7ffc6eaefa9c items=0 ppid=1920 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.295000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32
Feb  9 18:55:07.298000 audit[1958]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1958 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.298000 audit[1958]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd0d648ca0 a2=0 a3=7ffd0d648c8c items=0 ppid=1920 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.298000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E
Feb  9 18:55:07.317000 audit[1963]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1963 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.317000 audit[1963]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffc25ac4d0 a2=0 a3=7fffc25ac4bc items=0 ppid=1920 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.317000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E
Feb  9 18:55:07.327000 audit[1965]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1965 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.327000 audit[1965]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffbde41760 a2=0 a3=7fffbde4174c items=0 ppid=1920 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.327000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552
Feb  9 18:55:07.330000 audit[1967]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1967 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.330000 audit[1967]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffcad261d30 a2=0 a3=7ffcad261d1c items=0 ppid=1920 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.330000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E
Feb  9 18:55:07.332000 audit[1969]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1969 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.332000 audit[1969]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff8a4faf50 a2=0 a3=7fff8a4faf3c items=0 ppid=1920 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.332000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552
Feb  9 18:55:07.344000 audit[1973]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1973 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.344000 audit[1973]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff6ad975c0 a2=0 a3=7fff6ad975ac items=0 ppid=1920 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.344000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552
Feb  9 18:55:07.345000 audit[1974]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1974 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.345000 audit[1974]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe188c2d00 a2=0 a3=7ffe188c2cec items=0 ppid=1920 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.345000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552
Feb  9 18:55:07.357357 kernel: Initializing XFRM netlink socket
Feb  9 18:55:07.402873 env[1920]: time="2024-02-09T18:55:07.402828139Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address"
Feb  9 18:55:07.403877 (udev-worker)[1930]: Network interface NamePolicy= disabled on kernel command line.
Feb  9 18:55:07.445000 audit[1982]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1982 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.445000 audit[1982]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff5e9fe830 a2=0 a3=7fff5e9fe81c items=0 ppid=1920 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.445000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445
Feb  9 18:55:07.522000 audit[1985]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1985 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.522000 audit[1985]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffccc508b10 a2=0 a3=7ffccc508afc items=0 ppid=1920 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.522000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E
Feb  9 18:55:07.526000 audit[1988]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1988 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.526000 audit[1988]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff6e963420 a2=0 a3=7fff6e96340c items=0 ppid=1920 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.526000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054
Feb  9 18:55:07.529000 audit[1990]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1990 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.529000 audit[1990]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc89607610 a2=0 a3=7ffc896075fc items=0 ppid=1920 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.529000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054
Feb  9 18:55:07.531000 audit[1992]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.531000 audit[1992]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff742b4060 a2=0 a3=7fff742b404c items=0 ppid=1920 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.531000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552
Feb  9 18:55:07.533000 audit[1994]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.533000 audit[1994]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe0e37fcc0 a2=0 a3=7ffe0e37fcac items=0 ppid=1920 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.533000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38
Feb  9 18:55:07.536000 audit[1996]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1996 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.536000 audit[1996]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff14632c00 a2=0 a3=7fff14632bec items=0 ppid=1920 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.536000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552
Feb  9 18:55:07.545000 audit[1999]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1999 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.545000 audit[1999]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffde4ba5890 a2=0 a3=7ffde4ba587c items=0 ppid=1920 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.545000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054
Feb  9 18:55:07.548000 audit[2001]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2001 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.548000 audit[2001]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffce1056b70 a2=0 a3=7ffce1056b5c items=0 ppid=1920 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.548000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31
Feb  9 18:55:07.550000 audit[2003]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2003 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.550000 audit[2003]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff46282b10 a2=0 a3=7fff46282afc items=0 ppid=1920 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.550000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32
Feb  9 18:55:07.552000 audit[2005]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2005 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.552000 audit[2005]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcacd57c60 a2=0 a3=7ffcacd57c4c items=0 ppid=1920 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.552000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50
Feb  9 18:55:07.554948 systemd-networkd[1451]: docker0: Link UP
Feb  9 18:55:07.566000 audit[2009]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2009 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.566000 audit[2009]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffefb517ab0 a2=0 a3=7ffefb517a9c items=0 ppid=1920 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.566000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552
Feb  9 18:55:07.568000 audit[2010]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2010 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:07.568000 audit[2010]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe814f75b0 a2=0 a3=7ffe814f759c items=0 ppid=1920 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:07.568000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552
Feb  9 18:55:07.571285 env[1920]: time="2024-02-09T18:55:07.571249156Z" level=info msg="Loading containers: done."
Feb  9 18:55:07.585883 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck4169574801-merged.mount: Deactivated successfully.
Feb  9 18:55:07.608027 env[1920]: time="2024-02-09T18:55:07.607968341Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2
Feb  9 18:55:07.608261 env[1920]: time="2024-02-09T18:55:07.608198796Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23
Feb  9 18:55:07.608351 env[1920]: time="2024-02-09T18:55:07.608321708Z" level=info msg="Daemon has completed initialization"
Feb  9 18:55:07.634935 systemd[1]: Started docker.service.
Feb  9 18:55:07.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:07.650838 env[1920]: time="2024-02-09T18:55:07.650768358Z" level=info msg="API listen on /run/docker.sock"
Feb  9 18:55:07.674394 systemd[1]: Reloading.
Feb  9 18:55:07.740955 /usr/lib/systemd/system-generators/torcx-generator[2057]: time="2024-02-09T18:55:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]"
Feb  9 18:55:07.740994 /usr/lib/systemd/system-generators/torcx-generator[2057]: time="2024-02-09T18:55:07Z" level=info msg="torcx already run"
Feb  9 18:55:07.881036 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Feb  9 18:55:07.881093 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Feb  9 18:55:07.902840 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Feb  9 18:55:07.990000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.990000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.990000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.990000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.990000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.990000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.990000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.990000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.990000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.991000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.991000 audit: BPF prog-id=37 op=LOAD
Feb  9 18:55:07.991000 audit: BPF prog-id=28 op=UNLOAD
Feb  9 18:55:07.993000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.993000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.993000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.993000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.993000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.993000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.993000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.993000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.993000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.994000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.994000 audit: BPF prog-id=38 op=LOAD
Feb  9 18:55:07.994000 audit: BPF prog-id=32 op=UNLOAD
Feb  9 18:55:07.994000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.994000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.994000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.994000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.994000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.994000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.994000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.994000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.994000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.994000 audit: BPF prog-id=39 op=LOAD
Feb  9 18:55:07.994000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.994000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.994000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.994000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.994000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.994000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.994000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.994000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.994000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.994000 audit: BPF prog-id=40 op=LOAD
Feb  9 18:55:07.994000 audit: BPF prog-id=33 op=UNLOAD
Feb  9 18:55:07.994000 audit: BPF prog-id=34 op=UNLOAD
Feb  9 18:55:07.995000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.995000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.995000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.995000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.995000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.995000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.995000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.995000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.995000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.996000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.996000 audit: BPF prog-id=41 op=LOAD
Feb  9 18:55:07.996000 audit: BPF prog-id=24 op=UNLOAD
Feb  9 18:55:07.996000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.996000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.996000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.996000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.996000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.996000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.996000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.996000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.996000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.996000 audit: BPF prog-id=42 op=LOAD
Feb  9 18:55:07.996000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.996000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.996000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.996000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.996000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.996000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.996000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.996000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.996000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.996000 audit: BPF prog-id=43 op=LOAD
Feb  9 18:55:07.996000 audit: BPF prog-id=25 op=UNLOAD
Feb  9 18:55:07.996000 audit: BPF prog-id=26 op=UNLOAD
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit: BPF prog-id=44 op=LOAD
Feb  9 18:55:07.997000 audit: BPF prog-id=18 op=UNLOAD
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit: BPF prog-id=45 op=LOAD
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.997000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.998000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.998000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.998000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.998000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.998000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.998000 audit: BPF prog-id=46 op=LOAD
Feb  9 18:55:07.998000 audit: BPF prog-id=19 op=UNLOAD
Feb  9 18:55:07.998000 audit: BPF prog-id=20 op=UNLOAD
Feb  9 18:55:07.999000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.999000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.999000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.999000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.999000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.999000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.999000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.999000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:07.999000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.000000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.000000 audit: BPF prog-id=47 op=LOAD
Feb  9 18:55:08.000000 audit: BPF prog-id=27 op=UNLOAD
Feb  9 18:55:08.001000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.001000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.001000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.001000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.001000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.001000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.001000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.001000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.001000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.001000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.001000 audit: BPF prog-id=48 op=LOAD
Feb  9 18:55:08.001000 audit: BPF prog-id=35 op=UNLOAD
Feb  9 18:55:08.002000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.002000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.002000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.002000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.002000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.002000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.002000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.002000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.002000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.002000 audit: BPF prog-id=49 op=LOAD
Feb  9 18:55:08.002000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.002000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.002000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.002000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.002000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.002000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.002000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.002000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.002000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.002000 audit: BPF prog-id=50 op=LOAD
Feb  9 18:55:08.002000 audit: BPF prog-id=21 op=UNLOAD
Feb  9 18:55:08.002000 audit: BPF prog-id=22 op=UNLOAD
Feb  9 18:55:08.003000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.003000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.003000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.003000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.003000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.003000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.003000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.003000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.003000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.004000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.004000 audit: BPF prog-id=51 op=LOAD
Feb  9 18:55:08.004000 audit: BPF prog-id=23 op=UNLOAD
Feb  9 18:55:08.005000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.005000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.005000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.005000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.005000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.005000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.005000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.005000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.005000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.006000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.006000 audit: BPF prog-id=52 op=LOAD
Feb  9 18:55:08.006000 audit: BPF prog-id=29 op=UNLOAD
Feb  9 18:55:08.006000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.006000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.006000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.006000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.006000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.006000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.006000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.006000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.006000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.006000 audit: BPF prog-id=53 op=LOAD
Feb  9 18:55:08.006000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.006000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.006000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.006000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.006000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.006000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.006000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.006000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.006000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:08.006000 audit: BPF prog-id=54 op=LOAD
Feb  9 18:55:08.006000 audit: BPF prog-id=30 op=UNLOAD
Feb  9 18:55:08.006000 audit: BPF prog-id=31 op=UNLOAD
Feb  9 18:55:08.020262 systemd[1]: Started kubelet.service.
Feb  9 18:55:08.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:08.116802 kubelet[2108]: E0209 18:55:08.116742    2108 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set"
Feb  9 18:55:08.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Feb  9 18:55:08.120745 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Feb  9 18:55:08.120921 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Feb  9 18:55:08.604222 env[1645]: time="2024-02-09T18:55:08.604182152Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\""
Feb  9 18:55:09.187932 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1175434847.mount: Deactivated successfully.
Feb  9 18:55:11.899980 env[1645]: time="2024-02-09T18:55:11.899925796Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:11.931986 env[1645]: time="2024-02-09T18:55:11.931853936Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:11.950485 env[1645]: time="2024-02-09T18:55:11.950434689Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:11.955759 env[1645]: time="2024-02-09T18:55:11.955707274Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:11.956603 env[1645]: time="2024-02-09T18:55:11.956559574Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f\""
Feb  9 18:55:11.968805 env[1645]: time="2024-02-09T18:55:11.968768653Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\""
Feb  9 18:55:15.109346 env[1645]: time="2024-02-09T18:55:15.109284398Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:15.113008 env[1645]: time="2024-02-09T18:55:15.112958847Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:15.115751 env[1645]: time="2024-02-09T18:55:15.115604382Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:15.127759 env[1645]: time="2024-02-09T18:55:15.127710257Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:15.128845 env[1645]: time="2024-02-09T18:55:15.128805858Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486\""
Feb  9 18:55:15.145081 env[1645]: time="2024-02-09T18:55:15.145040666Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\""
Feb  9 18:55:16.977462 env[1645]: time="2024-02-09T18:55:16.977414434Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:16.982403 env[1645]: time="2024-02-09T18:55:16.982357572Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:16.988842 env[1645]: time="2024-02-09T18:55:16.988800085Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:16.991757 env[1645]: time="2024-02-09T18:55:16.991718716Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:16.992532 env[1645]: time="2024-02-09T18:55:16.992496086Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e\""
Feb  9 18:55:17.005259 env[1645]: time="2024-02-09T18:55:17.005226667Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\""
Feb  9 18:55:18.205288 kernel: kauditd_printk_skb: 292 callbacks suppressed
Feb  9 18:55:18.205465 kernel: audit: type=1130 audit(1707504918.179:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:18.205507 kernel: audit: type=1131 audit(1707504918.193:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:18.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:18.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:18.176131 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount234113730.mount: Deactivated successfully.
Feb  9 18:55:18.178917 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1.
Feb  9 18:55:18.179994 systemd[1]: Stopped kubelet.service.
Feb  9 18:55:18.196872 systemd[1]: Started kubelet.service.
Feb  9 18:55:18.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:18.213394 kernel: audit: type=1130 audit(1707504918.196:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:18.318287 kubelet[2143]: E0209 18:55:18.318233    2143 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set"
Feb  9 18:55:18.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Feb  9 18:55:18.327930 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Feb  9 18:55:18.328107 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Feb  9 18:55:18.334390 kernel: audit: type=1131 audit(1707504918.327:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Feb  9 18:55:19.032765 env[1645]: time="2024-02-09T18:55:19.032706433Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:19.035903 env[1645]: time="2024-02-09T18:55:19.035846571Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:19.038294 env[1645]: time="2024-02-09T18:55:19.038257413Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:19.052558 env[1645]: time="2024-02-09T18:55:19.052492791Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:19.052870 env[1645]: time="2024-02-09T18:55:19.052833725Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\""
Feb  9 18:55:19.065690 env[1645]: time="2024-02-09T18:55:19.065653640Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\""
Feb  9 18:55:19.573057 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount34459251.mount: Deactivated successfully.
Feb  9 18:55:19.582290 env[1645]: time="2024-02-09T18:55:19.582241433Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:19.584876 env[1645]: time="2024-02-09T18:55:19.584832907Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:19.586980 env[1645]: time="2024-02-09T18:55:19.586943380Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:19.589005 env[1645]: time="2024-02-09T18:55:19.588969512Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:19.589556 env[1645]: time="2024-02-09T18:55:19.589522915Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\""
Feb  9 18:55:19.601781 env[1645]: time="2024-02-09T18:55:19.601734619Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\""
Feb  9 18:55:20.525465 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3539568968.mount: Deactivated successfully.
Feb  9 18:55:24.476991 systemd[1]: systemd-hostnamed.service: Deactivated successfully.
Feb  9 18:55:24.483425 kernel: audit: type=1131 audit(1707504924.475:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:24.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:24.500000 audit: BPF prog-id=40 op=UNLOAD
Feb  9 18:55:24.500000 audit: BPF prog-id=39 op=UNLOAD
Feb  9 18:55:24.505347 kernel: audit: type=1334 audit(1707504924.500:421): prog-id=40 op=UNLOAD
Feb  9 18:55:24.505431 kernel: audit: type=1334 audit(1707504924.500:422): prog-id=39 op=UNLOAD
Feb  9 18:55:24.505483 kernel: audit: type=1334 audit(1707504924.500:423): prog-id=38 op=UNLOAD
Feb  9 18:55:24.500000 audit: BPF prog-id=38 op=UNLOAD
Feb  9 18:55:26.032815 env[1645]: time="2024-02-09T18:55:26.032694719Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:26.037450 env[1645]: time="2024-02-09T18:55:26.037408219Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:26.040439 env[1645]: time="2024-02-09T18:55:26.040402245Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:26.042984 env[1645]: time="2024-02-09T18:55:26.042900142Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:26.043768 env[1645]: time="2024-02-09T18:55:26.043731558Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\""
Feb  9 18:55:26.062269 env[1645]: time="2024-02-09T18:55:26.062224846Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\""
Feb  9 18:55:26.680722 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount541287957.mount: Deactivated successfully.
Feb  9 18:55:27.351682 env[1645]: time="2024-02-09T18:55:27.351600186Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:27.354546 env[1645]: time="2024-02-09T18:55:27.354490272Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:27.357306 env[1645]: time="2024-02-09T18:55:27.357268984Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:27.359440 env[1645]: time="2024-02-09T18:55:27.359402061Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:27.361217 env[1645]: time="2024-02-09T18:55:27.361176455Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\""
Feb  9 18:55:28.466411 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2.
Feb  9 18:55:28.466692 systemd[1]: Stopped kubelet.service.
Feb  9 18:55:28.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:28.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:28.479700 kernel: audit: type=1130 audit(1707504928.465:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:28.479850 kernel: audit: type=1131 audit(1707504928.465:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:28.480575 systemd[1]: Started kubelet.service.
Feb  9 18:55:28.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:28.495618 kernel: audit: type=1130 audit(1707504928.480:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:28.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Feb  9 18:55:28.615044 kubelet[2221]: E0209 18:55:28.604193    2221 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set"
Feb  9 18:55:28.607833 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Feb  9 18:55:28.615369 kernel: audit: type=1131 audit(1707504928.606:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Feb  9 18:55:28.608009 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Feb  9 18:55:30.528577 systemd[1]: Stopped kubelet.service.
Feb  9 18:55:30.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:30.539632 kernel: audit: type=1130 audit(1707504930.527:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:30.539773 kernel: audit: type=1131 audit(1707504930.527:429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:30.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:30.557589 systemd[1]: Reloading.
Feb  9 18:55:30.670585 /usr/lib/systemd/system-generators/torcx-generator[2252]: time="2024-02-09T18:55:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]"
Feb  9 18:55:30.670635 /usr/lib/systemd/system-generators/torcx-generator[2252]: time="2024-02-09T18:55:30Z" level=info msg="torcx already run"
Feb  9 18:55:30.768935 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Feb  9 18:55:30.768959 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Feb  9 18:55:30.816183 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Feb  9 18:55:30.902000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.913038 kernel: audit: type=1400 audit(1707504930.902:430): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.913130 kernel: audit: type=1400 audit(1707504930.902:431): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.913177 kernel: audit: type=1400 audit(1707504930.902:432): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.902000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.902000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.902000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.922226 kernel: audit: type=1400 audit(1707504930.902:433): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.922358 kernel: audit: type=1400 audit(1707504930.902:434): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.902000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.902000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.930691 kernel: audit: type=1400 audit(1707504930.902:435): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.930762 kernel: audit: type=1400 audit(1707504930.902:436): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.902000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.902000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.939011 kernel: audit: type=1400 audit(1707504930.902:437): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.902000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.911000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.911000 audit: BPF prog-id=55 op=LOAD
Feb  9 18:55:30.911000 audit: BPF prog-id=37 op=UNLOAD
Feb  9 18:55:30.911000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.911000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.911000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.911000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.911000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.911000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.911000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.911000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.911000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.916000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.916000 audit: BPF prog-id=56 op=LOAD
Feb  9 18:55:30.916000 audit: BPF prog-id=41 op=UNLOAD
Feb  9 18:55:30.916000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.916000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.916000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.916000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.916000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.916000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.916000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.916000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.925000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.925000 audit: BPF prog-id=57 op=LOAD
Feb  9 18:55:30.925000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.925000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.925000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.925000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.925000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.925000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.925000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.925000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.938000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.938000 audit: BPF prog-id=58 op=LOAD
Feb  9 18:55:30.938000 audit: BPF prog-id=42 op=UNLOAD
Feb  9 18:55:30.938000 audit: BPF prog-id=43 op=UNLOAD
Feb  9 18:55:30.938000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.938000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.938000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.938000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.938000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.938000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.938000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.938000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.938000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.939000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.939000 audit: BPF prog-id=59 op=LOAD
Feb  9 18:55:30.939000 audit: BPF prog-id=44 op=UNLOAD
Feb  9 18:55:30.939000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.939000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.939000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.939000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.939000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.939000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.939000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.939000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.939000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.939000 audit: BPF prog-id=60 op=LOAD
Feb  9 18:55:30.939000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.939000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.939000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.939000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.939000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.939000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.939000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.939000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.939000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.939000 audit: BPF prog-id=61 op=LOAD
Feb  9 18:55:30.939000 audit: BPF prog-id=45 op=UNLOAD
Feb  9 18:55:30.939000 audit: BPF prog-id=46 op=UNLOAD
Feb  9 18:55:30.941000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.941000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.941000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.941000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.942000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.942000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.942000 audit: BPF prog-id=62 op=LOAD
Feb  9 18:55:30.942000 audit: BPF prog-id=47 op=UNLOAD
Feb  9 18:55:30.943000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.943000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.943000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.943000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.943000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.943000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.943000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.943000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.943000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.943000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.943000 audit: BPF prog-id=63 op=LOAD
Feb  9 18:55:30.943000 audit: BPF prog-id=48 op=UNLOAD
Feb  9 18:55:30.944000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.944000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.944000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.944000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.944000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.944000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.944000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.944000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.944000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.944000 audit: BPF prog-id=64 op=LOAD
Feb  9 18:55:30.944000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.944000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.944000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.944000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.944000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.944000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.944000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.944000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.944000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.944000 audit: BPF prog-id=65 op=LOAD
Feb  9 18:55:30.944000 audit: BPF prog-id=49 op=UNLOAD
Feb  9 18:55:30.944000 audit: BPF prog-id=50 op=UNLOAD
Feb  9 18:55:30.945000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.945000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.945000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.945000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.945000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.945000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.945000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.945000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.945000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.945000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.945000 audit: BPF prog-id=66 op=LOAD
Feb  9 18:55:30.945000 audit: BPF prog-id=51 op=UNLOAD
Feb  9 18:55:30.947000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.947000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.947000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.947000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.947000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.947000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.947000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.947000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.947000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.948000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.948000 audit: BPF prog-id=67 op=LOAD
Feb  9 18:55:30.948000 audit: BPF prog-id=52 op=UNLOAD
Feb  9 18:55:30.949000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.949000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.949000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.949000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.949000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.949000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.949000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.949000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.949000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.949000 audit: BPF prog-id=68 op=LOAD
Feb  9 18:55:30.949000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.949000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.949000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.949000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.949000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.949000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.949000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.949000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.949000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:30.949000 audit: BPF prog-id=69 op=LOAD
Feb  9 18:55:30.949000 audit: BPF prog-id=53 op=UNLOAD
Feb  9 18:55:30.949000 audit: BPF prog-id=54 op=UNLOAD
Feb  9 18:55:30.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:30.970177 systemd[1]: Started kubelet.service.
Feb  9 18:55:31.034590 kubelet[2304]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI.
Feb  9 18:55:31.034590 kubelet[2304]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Feb  9 18:55:31.035007 kubelet[2304]: I0209 18:55:31.034658    2304 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime"
Feb  9 18:55:31.036206 kubelet[2304]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI.
Feb  9 18:55:31.036206 kubelet[2304]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Feb  9 18:55:31.440048 kubelet[2304]: I0209 18:55:31.440018    2304 server.go:412] "Kubelet version" kubeletVersion="v1.26.5"
Feb  9 18:55:31.440048 kubelet[2304]: I0209 18:55:31.440049    2304 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
Feb  9 18:55:31.440598 kubelet[2304]: I0209 18:55:31.440589    2304 server.go:836] "Client rotation is on, will bootstrap in background"
Feb  9 18:55:31.452300 kubelet[2304]: I0209 18:55:31.452260    2304 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Feb  9 18:55:31.452977 kubelet[2304]: E0209 18:55:31.452943    2304 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.23.165:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:31.454927 kubelet[2304]: I0209 18:55:31.454895    2304 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified.  defaulting to /"
Feb  9 18:55:31.455155 kubelet[2304]: I0209 18:55:31.455136    2304 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[]
Feb  9 18:55:31.455273 kubelet[2304]: I0209 18:55:31.455233    2304 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.1} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity:<nil> Percentage:0.05} GracePeriod:0s MinReclaim:<nil>} {Signal:imagefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.15} GracePeriod:0s MinReclaim:<nil>}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}
Feb  9 18:55:31.455436 kubelet[2304]: I0209 18:55:31.455287    2304 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container"
Feb  9 18:55:31.455436 kubelet[2304]: I0209 18:55:31.455310    2304 container_manager_linux.go:308] "Creating device plugin manager"
Feb  9 18:55:31.455536 kubelet[2304]: I0209 18:55:31.455455    2304 state_mem.go:36] "Initialized new in-memory state store"
Feb  9 18:55:31.465937 kubelet[2304]: I0209 18:55:31.465907    2304 kubelet.go:398] "Attempting to sync node with API server"
Feb  9 18:55:31.465937 kubelet[2304]: I0209 18:55:31.465944    2304 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests"
Feb  9 18:55:31.466208 kubelet[2304]: I0209 18:55:31.465974    2304 kubelet.go:297] "Adding apiserver pod source"
Feb  9 18:55:31.466208 kubelet[2304]: I0209 18:55:31.465992    2304 apiserver.go:42] "Waiting for node sync before watching apiserver pods"
Feb  9 18:55:31.469589 kubelet[2304]: W0209 18:55:31.469530    2304 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.23.165:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-23-165&limit=500&resourceVersion=0": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:31.469728 kubelet[2304]: E0209 18:55:31.469605    2304 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.23.165:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-23-165&limit=500&resourceVersion=0": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:31.469728 kubelet[2304]: I0209 18:55:31.469719    2304 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1"
Feb  9 18:55:31.470221 kubelet[2304]: W0209 18:55:31.470192    2304 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.
Feb  9 18:55:31.471016 kubelet[2304]: I0209 18:55:31.470980    2304 server.go:1186] "Started kubelet"
Feb  9 18:55:31.475000 audit[2304]: AVC avc:  denied  { mac_admin } for  pid=2304 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:31.475000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Feb  9 18:55:31.475000 audit[2304]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bfae10 a1=c00005dc80 a2=c000bfade0 a3=25 items=0 ppid=1 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.475000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Feb  9 18:55:31.476000 audit[2304]: AVC avc:  denied  { mac_admin } for  pid=2304 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:31.476000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Feb  9 18:55:31.476000 audit[2304]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000caa5c0 a1=c00005dc98 a2=c000bfaea0 a3=25 items=0 ppid=1 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.476000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Feb  9 18:55:31.477138 kubelet[2304]: I0209 18:55:31.476381    2304 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument"
Feb  9 18:55:31.477138 kubelet[2304]: I0209 18:55:31.476431    2304 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument"
Feb  9 18:55:31.477138 kubelet[2304]: I0209 18:55:31.476566    2304 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer"
Feb  9 18:55:31.480840 kubelet[2304]: I0209 18:55:31.480783    2304 server.go:161] "Starting to listen" address="0.0.0.0" port=10250
Feb  9 18:55:31.485915 kubelet[2304]: I0209 18:55:31.485889    2304 volume_manager.go:293] "Starting Kubelet Volume Manager"
Feb  9 18:55:31.488000 audit[2314]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:31.488000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcbd5fa590 a2=0 a3=7ffcbd5fa57c items=0 ppid=2304 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.488000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Feb  9 18:55:31.490000 audit[2315]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:31.490000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0cf61e10 a2=0 a3=7ffc0cf61dfc items=0 ppid=2304 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.490000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Feb  9 18:55:31.491863 kubelet[2304]: I0209 18:55:31.491832    2304 desired_state_of_world_populator.go:151] "Desired state populator starts to run"
Feb  9 18:55:31.494247 kubelet[2304]: I0209 18:55:31.494218    2304 server.go:451] "Adding debug handlers to kubelet server"
Feb  9 18:55:31.493000 audit[2317]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:31.493000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcfbf7c660 a2=0 a3=7ffcfbf7c64c items=0 ppid=2304 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.493000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Feb  9 18:55:31.503814 kubelet[2304]: W0209 18:55:31.503727    2304 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.23.165:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:31.504158 kubelet[2304]: E0209 18:55:31.504061    2304 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.23.165:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:31.504534 kubelet[2304]: E0209 18:55:31.504510    2304 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://172.31.23.165:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-23-165?timeout=10s": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:31.505686 kubelet[2304]: E0209 18:55:31.505673    2304 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs"
Feb  9 18:55:31.505000 audit[2319]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:31.505000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd367af5b0 a2=0 a3=7ffd367af59c items=0 ppid=2304 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.505000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Feb  9 18:55:31.506083 kubelet[2304]: E0209 18:55:31.506064    2304 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem"
Feb  9 18:55:31.508185 kubelet[2304]: W0209 18:55:31.508141    2304 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.23.165:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:31.508367 kubelet[2304]: E0209 18:55:31.508219    2304 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.23.165:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:31.508611 kubelet[2304]: E0209 18:55:31.508436    2304 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-165.17b246b03c8dcf3f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-165", UID:"ip-172-31-23-165", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-165"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 31, 470954303, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 31, 470954303, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://172.31.23.165:6443/api/v1/namespaces/default/events": dial tcp 172.31.23.165:6443: connect: connection refused'(may retry after sleeping)
Feb  9 18:55:31.523000 audit[2322]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:31.523000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe05f3bf50 a2=0 a3=7ffe05f3bf3c items=0 ppid=2304 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.523000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38
Feb  9 18:55:31.530000 audit[2326]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:31.530000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdce81df60 a2=0 a3=7ffdce81df4c items=0 ppid=2304 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.530000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174
Feb  9 18:55:31.538183 kubelet[2304]: E0209 18:55:31.538078    2304 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-165.17b246b03c8dcf3f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-165", UID:"ip-172-31-23-165", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-165"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 31, 470954303, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 31, 470954303, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://172.31.23.165:6443/api/v1/namespaces/default/events": dial tcp 172.31.23.165:6443: connect: connection refused'(may retry after sleeping)
Feb  9 18:55:31.550000 audit[2330]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:31.550000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffff84b1640 a2=0 a3=7ffff84b162c items=0 ppid=2304 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.550000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030
Feb  9 18:55:31.554828 kubelet[2304]: I0209 18:55:31.554804    2304 cpu_manager.go:214] "Starting CPU manager" policy="none"
Feb  9 18:55:31.555021 kubelet[2304]: I0209 18:55:31.555008    2304 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s"
Feb  9 18:55:31.555161 kubelet[2304]: I0209 18:55:31.555151    2304 state_mem.go:36] "Initialized new in-memory state store"
Feb  9 18:55:31.555000 audit[2333]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:31.555000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffec25dd1f0 a2=0 a3=7ffec25dd1dc items=0 ppid=2304 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.555000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B
Feb  9 18:55:31.557000 audit[2334]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:31.557000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe6d832e60 a2=0 a3=7ffe6d832e4c items=0 ppid=2304 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.557000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174
Feb  9 18:55:31.558582 kubelet[2304]: I0209 18:55:31.558562    2304 policy_none.go:49] "None policy: Start"
Feb  9 18:55:31.558000 audit[2335]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:31.558000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff24020970 a2=0 a3=7fff2402095c items=0 ppid=2304 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.558000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Feb  9 18:55:31.559746 kubelet[2304]: I0209 18:55:31.559730    2304 memory_manager.go:169] "Starting memorymanager" policy="None"
Feb  9 18:55:31.559856 kubelet[2304]: I0209 18:55:31.559847    2304 state_mem.go:35] "Initializing new in-memory state store"
Feb  9 18:55:31.561000 audit[2337]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:31.561000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff5b6dccc0 a2=0 a3=7fff5b6dccac items=0 ppid=2304 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.561000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030
Feb  9 18:55:31.566000 audit[2339]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:31.566000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffc391ac930 a2=0 a3=7ffc391ac91c items=0 ppid=2304 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.566000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Feb  9 18:55:31.568314 systemd[1]: Created slice kubepods.slice.
Feb  9 18:55:31.570000 audit[2341]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:31.570000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7fff29e9a690 a2=0 a3=7fff29e9a67c items=0 ppid=2304 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.570000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E
Feb  9 18:55:31.573000 audit[2343]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:31.573000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffea099fa20 a2=0 a3=7ffea099fa0c items=0 ppid=2304 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.573000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030
Feb  9 18:55:31.577000 audit[2345]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:31.577000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7fff965e4060 a2=0 a3=7fff965e404c items=0 ppid=2304 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.577000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445
Feb  9 18:55:31.577875 kubelet[2304]: I0209 18:55:31.577845    2304 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4
Feb  9 18:55:31.578000 audit[2346]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:55:31.578000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeb5b9e4e0 a2=0 a3=7ffeb5b9e4cc items=0 ppid=2304 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.578000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Feb  9 18:55:31.580000 audit[2347]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:31.580000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd8cb5d70 a2=0 a3=7ffcd8cb5d5c items=0 ppid=2304 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.580000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Feb  9 18:55:31.582000 audit[2348]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:55:31.582000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff05dc0a30 a2=0 a3=7fff05dc0a1c items=0 ppid=2304 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.582000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174
Feb  9 18:55:31.584000 audit[2349]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:31.584000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeecf07530 a2=0 a3=7ffeecf0751c items=0 ppid=2304 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.587497 systemd[1]: Created slice kubepods-burstable.slice.
Feb  9 18:55:31.584000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Feb  9 18:55:31.594800 systemd[1]: Created slice kubepods-besteffort.slice.
Feb  9 18:55:31.594000 audit[2353]: NETFILTER_CFG table=nat:45 family=10 entries=1 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:55:31.594000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd2e8e3730 a2=0 a3=7ffd2e8e371c items=0 ppid=2304 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.594000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030
Feb  9 18:55:31.596120 kubelet[2304]: I0209 18:55:31.596089    2304 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-23-165"
Feb  9 18:55:31.598000 audit[2354]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Feb  9 18:55:31.598000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe683cd1d0 a2=0 a3=7ffe683cd1bc items=0 ppid=2304 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.598000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Feb  9 18:55:31.599237 kubelet[2304]: E0209 18:55:31.599216    2304 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.23.165:6443/api/v1/nodes\": dial tcp 172.31.23.165:6443: connect: connection refused" node="ip-172-31-23-165"
Feb  9 18:55:31.600000 audit[2355]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:55:31.600000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff1e908720 a2=0 a3=7fff1e90870c items=0 ppid=2304 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.600000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Feb  9 18:55:31.602130 kubelet[2304]: I0209 18:55:31.602110    2304 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found"
Feb  9 18:55:31.601000 audit[2304]: AVC avc:  denied  { mac_admin } for  pid=2304 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:31.601000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Feb  9 18:55:31.601000 audit[2304]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d831d0 a1=c001180af8 a2=c000d831a0 a3=25 items=0 ppid=1 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.601000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Feb  9 18:55:31.602486 kubelet[2304]: I0209 18:55:31.602181    2304 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument"
Feb  9 18:55:31.602486 kubelet[2304]: I0209 18:55:31.602414    2304 plugin_manager.go:118] "Starting Kubelet Plugin Manager"
Feb  9 18:55:31.604427 kubelet[2304]: E0209 18:55:31.604411    2304 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-23-165\" not found"
Feb  9 18:55:31.609000 audit[2357]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2357 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:55:31.609000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffcc0347ce0 a2=0 a3=7ffcc0347ccc items=0 ppid=2304 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.609000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B
Feb  9 18:55:31.610000 audit[2358]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:55:31.610000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffda25eb300 a2=0 a3=7ffda25eb2ec items=0 ppid=2304 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.610000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174
Feb  9 18:55:31.613000 audit[2359]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:55:31.613000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcec1092b0 a2=0 a3=7ffcec10929c items=0 ppid=2304 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.613000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Feb  9 18:55:31.615000 audit[2361]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:55:31.615000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc121005c0 a2=0 a3=7ffc121005ac items=0 ppid=2304 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.615000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030
Feb  9 18:55:31.618000 audit[2363]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:55:31.618000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffb01e47c0 a2=0 a3=7fffb01e47ac items=0 ppid=2304 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.618000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Feb  9 18:55:31.621000 audit[2365]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:55:31.621000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffe9daa8ff0 a2=0 a3=7ffe9daa8fdc items=0 ppid=2304 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.621000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E
Feb  9 18:55:31.624000 audit[2367]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:55:31.624000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffd18e67820 a2=0 a3=7ffd18e6780c items=0 ppid=2304 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.624000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030
Feb  9 18:55:31.629000 audit[2369]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=2369 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:55:31.629000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7fffb6f3e5f0 a2=0 a3=7fffb6f3e5dc items=0 ppid=2304 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.629000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445
Feb  9 18:55:31.630629 kubelet[2304]: I0209 18:55:31.630606    2304 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6
Feb  9 18:55:31.630738 kubelet[2304]: I0209 18:55:31.630636    2304 status_manager.go:176] "Starting to sync pod status with apiserver"
Feb  9 18:55:31.630738 kubelet[2304]: I0209 18:55:31.630659    2304 kubelet.go:2113] "Starting kubelet main sync loop"
Feb  9 18:55:31.630738 kubelet[2304]: E0209 18:55:31.630721    2304 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful"
Feb  9 18:55:31.632255 kubelet[2304]: W0209 18:55:31.632228    2304 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.23.165:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:31.632413 kubelet[2304]: E0209 18:55:31.632402    2304 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.23.165:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:31.632000 audit[2370]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:55:31.632000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc073f6fb0 a2=0 a3=7ffc073f6f9c items=0 ppid=2304 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.632000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Feb  9 18:55:31.633000 audit[2371]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:55:31.633000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc732f2d70 a2=0 a3=7ffc732f2d5c items=0 ppid=2304 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.633000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Feb  9 18:55:31.634000 audit[2372]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Feb  9 18:55:31.634000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd12621cd0 a2=0 a3=7ffd12621cbc items=0 ppid=2304 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:31.634000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Feb  9 18:55:31.706827 kubelet[2304]: E0209 18:55:31.706711    2304 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://172.31.23.165:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-23-165?timeout=10s": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:31.731878 kubelet[2304]: I0209 18:55:31.731836    2304 topology_manager.go:210] "Topology Admit Handler"
Feb  9 18:55:31.733128 kubelet[2304]: I0209 18:55:31.733106    2304 topology_manager.go:210] "Topology Admit Handler"
Feb  9 18:55:31.734853 kubelet[2304]: I0209 18:55:31.734830    2304 status_manager.go:698] "Failed to get status for pod" podUID=4ec352f9b85e5431f7c6642e4166b4d7 pod="kube-system/kube-scheduler-ip-172-31-23-165" err="Get \"https://172.31.23.165:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ip-172-31-23-165\": dial tcp 172.31.23.165:6443: connect: connection refused"
Feb  9 18:55:31.735957 kubelet[2304]: I0209 18:55:31.735933    2304 topology_manager.go:210] "Topology Admit Handler"
Feb  9 18:55:31.737263 kubelet[2304]: I0209 18:55:31.737251    2304 status_manager.go:698] "Failed to get status for pod" podUID=c6c4960f4343bc2791194a139341b04b pod="kube-system/kube-apiserver-ip-172-31-23-165" err="Get \"https://172.31.23.165:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ip-172-31-23-165\": dial tcp 172.31.23.165:6443: connect: connection refused"
Feb  9 18:55:31.738803 kubelet[2304]: I0209 18:55:31.738788    2304 status_manager.go:698] "Failed to get status for pod" podUID=332cc97edb850ce12d7f51b5f53f42eb pod="kube-system/kube-controller-manager-ip-172-31-23-165" err="Get \"https://172.31.23.165:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ip-172-31-23-165\": dial tcp 172.31.23.165:6443: connect: connection refused"
Feb  9 18:55:31.740067 systemd[1]: Created slice kubepods-burstable-pod4ec352f9b85e5431f7c6642e4166b4d7.slice.
Feb  9 18:55:31.749209 systemd[1]: Created slice kubepods-burstable-pod332cc97edb850ce12d7f51b5f53f42eb.slice.
Feb  9 18:55:31.752447 systemd[1]: Created slice kubepods-burstable-podc6c4960f4343bc2791194a139341b04b.slice.
Feb  9 18:55:31.793265 kubelet[2304]: I0209 18:55:31.793230    2304 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4ec352f9b85e5431f7c6642e4166b4d7-kubeconfig\") pod \"kube-scheduler-ip-172-31-23-165\" (UID: \"4ec352f9b85e5431f7c6642e4166b4d7\") " pod="kube-system/kube-scheduler-ip-172-31-23-165"
Feb  9 18:55:31.793265 kubelet[2304]: I0209 18:55:31.793275    2304 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c6c4960f4343bc2791194a139341b04b-ca-certs\") pod \"kube-apiserver-ip-172-31-23-165\" (UID: \"c6c4960f4343bc2791194a139341b04b\") " pod="kube-system/kube-apiserver-ip-172-31-23-165"
Feb  9 18:55:31.793520 kubelet[2304]: I0209 18:55:31.793297    2304 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c6c4960f4343bc2791194a139341b04b-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-23-165\" (UID: \"c6c4960f4343bc2791194a139341b04b\") " pod="kube-system/kube-apiserver-ip-172-31-23-165"
Feb  9 18:55:31.793520 kubelet[2304]: I0209 18:55:31.793328    2304 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/332cc97edb850ce12d7f51b5f53f42eb-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-23-165\" (UID: \"332cc97edb850ce12d7f51b5f53f42eb\") " pod="kube-system/kube-controller-manager-ip-172-31-23-165"
Feb  9 18:55:31.793520 kubelet[2304]: I0209 18:55:31.793370    2304 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/332cc97edb850ce12d7f51b5f53f42eb-k8s-certs\") pod \"kube-controller-manager-ip-172-31-23-165\" (UID: \"332cc97edb850ce12d7f51b5f53f42eb\") " pod="kube-system/kube-controller-manager-ip-172-31-23-165"
Feb  9 18:55:31.793520 kubelet[2304]: I0209 18:55:31.793393    2304 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/332cc97edb850ce12d7f51b5f53f42eb-kubeconfig\") pod \"kube-controller-manager-ip-172-31-23-165\" (UID: \"332cc97edb850ce12d7f51b5f53f42eb\") " pod="kube-system/kube-controller-manager-ip-172-31-23-165"
Feb  9 18:55:31.793520 kubelet[2304]: I0209 18:55:31.793411    2304 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c6c4960f4343bc2791194a139341b04b-k8s-certs\") pod \"kube-apiserver-ip-172-31-23-165\" (UID: \"c6c4960f4343bc2791194a139341b04b\") " pod="kube-system/kube-apiserver-ip-172-31-23-165"
Feb  9 18:55:31.793648 kubelet[2304]: I0209 18:55:31.793431    2304 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/332cc97edb850ce12d7f51b5f53f42eb-ca-certs\") pod \"kube-controller-manager-ip-172-31-23-165\" (UID: \"332cc97edb850ce12d7f51b5f53f42eb\") " pod="kube-system/kube-controller-manager-ip-172-31-23-165"
Feb  9 18:55:31.793648 kubelet[2304]: I0209 18:55:31.793453    2304 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/332cc97edb850ce12d7f51b5f53f42eb-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-23-165\" (UID: \"332cc97edb850ce12d7f51b5f53f42eb\") " pod="kube-system/kube-controller-manager-ip-172-31-23-165"
Feb  9 18:55:31.801402 kubelet[2304]: I0209 18:55:31.801352    2304 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-23-165"
Feb  9 18:55:31.801402 kubelet[2304]: E0209 18:55:31.801709    2304 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.23.165:6443/api/v1/nodes\": dial tcp 172.31.23.165:6443: connect: connection refused" node="ip-172-31-23-165"
Feb  9 18:55:32.047139 env[1645]: time="2024-02-09T18:55:32.047087839Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-23-165,Uid:4ec352f9b85e5431f7c6642e4166b4d7,Namespace:kube-system,Attempt:0,}"
Feb  9 18:55:32.054326 env[1645]: time="2024-02-09T18:55:32.054277942Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-23-165,Uid:332cc97edb850ce12d7f51b5f53f42eb,Namespace:kube-system,Attempt:0,}"
Feb  9 18:55:32.055535 env[1645]: time="2024-02-09T18:55:32.055493126Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-23-165,Uid:c6c4960f4343bc2791194a139341b04b,Namespace:kube-system,Attempt:0,}"
Feb  9 18:55:32.107620 kubelet[2304]: E0209 18:55:32.107581    2304 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://172.31.23.165:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-23-165?timeout=10s": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:32.204578 kubelet[2304]: I0209 18:55:32.204540    2304 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-23-165"
Feb  9 18:55:32.205108 kubelet[2304]: E0209 18:55:32.204999    2304 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.23.165:6443/api/v1/nodes\": dial tcp 172.31.23.165:6443: connect: connection refused" node="ip-172-31-23-165"
Feb  9 18:55:32.430754 kubelet[2304]: W0209 18:55:32.430629    2304 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.23.165:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-23-165&limit=500&resourceVersion=0": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:32.430754 kubelet[2304]: E0209 18:55:32.430677    2304 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.23.165:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-23-165&limit=500&resourceVersion=0": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:32.535109 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount511364269.mount: Deactivated successfully.
Feb  9 18:55:32.546236 env[1645]: time="2024-02-09T18:55:32.546178234Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:32.547638 env[1645]: time="2024-02-09T18:55:32.547594419Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:32.553286 env[1645]: time="2024-02-09T18:55:32.553238390Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:32.555038 env[1645]: time="2024-02-09T18:55:32.554997919Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:32.556011 env[1645]: time="2024-02-09T18:55:32.555976748Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:32.559214 env[1645]: time="2024-02-09T18:55:32.559177960Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:32.560685 env[1645]: time="2024-02-09T18:55:32.560633056Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:32.561571 env[1645]: time="2024-02-09T18:55:32.561534904Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:32.562825 env[1645]: time="2024-02-09T18:55:32.562797127Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:32.564857 env[1645]: time="2024-02-09T18:55:32.564825016Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:32.565947 env[1645]: time="2024-02-09T18:55:32.565915270Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:32.570979 env[1645]: time="2024-02-09T18:55:32.570843920Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Feb  9 18:55:32.632824 env[1645]: time="2024-02-09T18:55:32.632696687Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 18:55:32.632982 env[1645]: time="2024-02-09T18:55:32.632850401Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 18:55:32.632982 env[1645]: time="2024-02-09T18:55:32.632884773Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 18:55:32.636284 env[1645]: time="2024-02-09T18:55:32.636200469Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 18:55:32.636734 env[1645]: time="2024-02-09T18:55:32.636695296Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 18:55:32.637065 env[1645]: time="2024-02-09T18:55:32.637021381Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 18:55:32.637237 env[1645]: time="2024-02-09T18:55:32.637046620Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5ab402d4cc0e6ce4f49d48bce79b5a54bb4b73a21a3e3026cf7d186f8aa3545a pid=2393 runtime=io.containerd.runc.v2
Feb  9 18:55:32.637648 env[1645]: time="2024-02-09T18:55:32.637608868Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1c1ce5ec5da622b01f408e1cd1f54dc9164c363f28550d04af958f8bc0a5d820 pid=2392 runtime=io.containerd.runc.v2
Feb  9 18:55:32.637770 env[1645]: time="2024-02-09T18:55:32.637633074Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Feb  9 18:55:32.637770 env[1645]: time="2024-02-09T18:55:32.637675292Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Feb  9 18:55:32.637770 env[1645]: time="2024-02-09T18:55:32.637709631Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Feb  9 18:55:32.638007 env[1645]: time="2024-02-09T18:55:32.637953797Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e0fce0be23580ed4b1cbe03e16433b75017470b44aa10d4d05cfd309d2d5250e pid=2401 runtime=io.containerd.runc.v2
Feb  9 18:55:32.660107 systemd[1]: Started cri-containerd-e0fce0be23580ed4b1cbe03e16433b75017470b44aa10d4d05cfd309d2d5250e.scope.
Feb  9 18:55:32.693713 systemd[1]: Started cri-containerd-5ab402d4cc0e6ce4f49d48bce79b5a54bb4b73a21a3e3026cf7d186f8aa3545a.scope.
Feb  9 18:55:32.701000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.701000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.701000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.701000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.701000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.701000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.701000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.701000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.701000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.701000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.701000 audit: BPF prog-id=70 op=LOAD
Feb  9 18:55:32.705000 audit[2428]: AVC avc:  denied  { bpf } for  pid=2428 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.705000 audit[2428]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2401 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:32.704167 systemd[1]: Started cri-containerd-1c1ce5ec5da622b01f408e1cd1f54dc9164c363f28550d04af958f8bc0a5d820.scope.
Feb  9 18:55:32.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530666365306265323335383065643462316362653033653136343333
Feb  9 18:55:32.725000 audit[2428]: AVC avc:  denied  { perfmon } for  pid=2428 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.725000 audit[2428]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2401 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:32.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530666365306265323335383065643462316362653033653136343333
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { bpf } for  pid=2428 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { bpf } for  pid=2428 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { bpf } for  pid=2428 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { perfmon } for  pid=2428 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { perfmon } for  pid=2428 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { perfmon } for  pid=2428 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { perfmon } for  pid=2428 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { perfmon } for  pid=2428 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { bpf } for  pid=2428 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { bpf } for  pid=2428 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit: BPF prog-id=71 op=LOAD
Feb  9 18:55:32.726000 audit[2428]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003528e0 items=0 ppid=2401 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:32.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530666365306265323335383065643462316362653033653136343333
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { bpf } for  pid=2428 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { bpf } for  pid=2428 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { perfmon } for  pid=2428 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { perfmon } for  pid=2428 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { perfmon } for  pid=2428 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { perfmon } for  pid=2428 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { perfmon } for  pid=2428 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { bpf } for  pid=2428 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { bpf } for  pid=2428 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit: BPF prog-id=72 op=LOAD
Feb  9 18:55:32.726000 audit[2428]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000352928 items=0 ppid=2401 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:32.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530666365306265323335383065643462316362653033653136343333
Feb  9 18:55:32.726000 audit: BPF prog-id=72 op=UNLOAD
Feb  9 18:55:32.726000 audit: BPF prog-id=71 op=UNLOAD
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { bpf } for  pid=2428 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { bpf } for  pid=2428 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { bpf } for  pid=2428 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { perfmon } for  pid=2428 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { perfmon } for  pid=2428 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { perfmon } for  pid=2428 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { perfmon } for  pid=2428 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { perfmon } for  pid=2428 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { bpf } for  pid=2428 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit[2428]: AVC avc:  denied  { bpf } for  pid=2428 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.726000 audit: BPF prog-id=73 op=LOAD
Feb  9 18:55:32.726000 audit[2428]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000352d38 items=0 ppid=2401 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:32.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530666365306265323335383065643462316362653033653136343333
Feb  9 18:55:32.746000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.746000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.746000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.746000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.746000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.746000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.746000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.746000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.746000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.746000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.746000 audit: BPF prog-id=74 op=LOAD
Feb  9 18:55:32.748000 audit[2429]: AVC avc:  denied  { bpf } for  pid=2429 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.748000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2392 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:32.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163316365356563356461363232623031663430386531636431663534
Feb  9 18:55:32.748000 audit[2429]: AVC avc:  denied  { perfmon } for  pid=2429 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.748000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2392 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:32.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163316365356563356461363232623031663430386531636431663534
Feb  9 18:55:32.748000 audit[2429]: AVC avc:  denied  { bpf } for  pid=2429 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.748000 audit[2429]: AVC avc:  denied  { bpf } for  pid=2429 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.748000 audit[2429]: AVC avc:  denied  { bpf } for  pid=2429 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.748000 audit[2429]: AVC avc:  denied  { perfmon } for  pid=2429 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.748000 audit[2429]: AVC avc:  denied  { perfmon } for  pid=2429 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.748000 audit[2429]: AVC avc:  denied  { perfmon } for  pid=2429 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.748000 audit[2429]: AVC avc:  denied  { perfmon } for  pid=2429 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.748000 audit[2429]: AVC avc:  denied  { perfmon } for  pid=2429 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.748000 audit[2429]: AVC avc:  denied  { bpf } for  pid=2429 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.748000 audit[2429]: AVC avc:  denied  { bpf } for  pid=2429 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.748000 audit: BPF prog-id=75 op=LOAD
Feb  9 18:55:32.748000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a2870 items=0 ppid=2392 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:32.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163316365356563356461363232623031663430386531636431663534
Feb  9 18:55:32.749000 audit[2429]: AVC avc:  denied  { bpf } for  pid=2429 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.749000 audit[2429]: AVC avc:  denied  { bpf } for  pid=2429 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.749000 audit[2429]: AVC avc:  denied  { perfmon } for  pid=2429 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.749000 audit[2429]: AVC avc:  denied  { perfmon } for  pid=2429 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.749000 audit[2429]: AVC avc:  denied  { perfmon } for  pid=2429 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.749000 audit[2429]: AVC avc:  denied  { perfmon } for  pid=2429 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.749000 audit[2429]: AVC avc:  denied  { perfmon } for  pid=2429 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.749000 audit[2429]: AVC avc:  denied  { bpf } for  pid=2429 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.749000 audit[2429]: AVC avc:  denied  { bpf } for  pid=2429 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.749000 audit: BPF prog-id=76 op=LOAD
Feb  9 18:55:32.749000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a28b8 items=0 ppid=2392 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:32.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163316365356563356461363232623031663430386531636431663534
Feb  9 18:55:32.751000 audit: BPF prog-id=76 op=UNLOAD
Feb  9 18:55:32.751000 audit: BPF prog-id=75 op=UNLOAD
Feb  9 18:55:32.751000 audit[2429]: AVC avc:  denied  { bpf } for  pid=2429 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.751000 audit[2429]: AVC avc:  denied  { bpf } for  pid=2429 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.751000 audit[2429]: AVC avc:  denied  { bpf } for  pid=2429 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.751000 audit[2429]: AVC avc:  denied  { perfmon } for  pid=2429 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.751000 audit[2429]: AVC avc:  denied  { perfmon } for  pid=2429 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.751000 audit[2429]: AVC avc:  denied  { perfmon } for  pid=2429 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.751000 audit[2429]: AVC avc:  denied  { perfmon } for  pid=2429 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.751000 audit[2429]: AVC avc:  denied  { perfmon } for  pid=2429 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.751000 audit[2429]: AVC avc:  denied  { bpf } for  pid=2429 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.751000 audit[2429]: AVC avc:  denied  { bpf } for  pid=2429 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.751000 audit: BPF prog-id=77 op=LOAD
Feb  9 18:55:32.751000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a2cc8 items=0 ppid=2392 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:32.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163316365356563356461363232623031663430386531636431663534
Feb  9 18:55:32.759000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.759000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.759000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.759000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.759000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.759000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.759000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.759000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.759000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.759000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.759000 audit: BPF prog-id=78 op=LOAD
Feb  9 18:55:32.759000 audit[2427]: AVC avc:  denied  { bpf } for  pid=2427 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.759000 audit[2427]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2393 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:32.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561623430326434636330653663653466343964343862636537396235
Feb  9 18:55:32.759000 audit[2427]: AVC avc:  denied  { perfmon } for  pid=2427 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.759000 audit[2427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2393 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:32.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561623430326434636330653663653466343964343862636537396235
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { bpf } for  pid=2427 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { bpf } for  pid=2427 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { bpf } for  pid=2427 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { perfmon } for  pid=2427 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { perfmon } for  pid=2427 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { perfmon } for  pid=2427 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { perfmon } for  pid=2427 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { perfmon } for  pid=2427 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { bpf } for  pid=2427 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { bpf } for  pid=2427 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit: BPF prog-id=79 op=LOAD
Feb  9 18:55:32.760000 audit[2427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00028a510 items=0 ppid=2393 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:32.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561623430326434636330653663653466343964343862636537396235
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { bpf } for  pid=2427 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { bpf } for  pid=2427 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { perfmon } for  pid=2427 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { perfmon } for  pid=2427 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { perfmon } for  pid=2427 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { perfmon } for  pid=2427 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { perfmon } for  pid=2427 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { bpf } for  pid=2427 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { bpf } for  pid=2427 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit: BPF prog-id=80 op=LOAD
Feb  9 18:55:32.760000 audit[2427]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00028a558 items=0 ppid=2393 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:32.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561623430326434636330653663653466343964343862636537396235
Feb  9 18:55:32.760000 audit: BPF prog-id=80 op=UNLOAD
Feb  9 18:55:32.760000 audit: BPF prog-id=79 op=UNLOAD
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { bpf } for  pid=2427 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { bpf } for  pid=2427 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { bpf } for  pid=2427 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { perfmon } for  pid=2427 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { perfmon } for  pid=2427 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { perfmon } for  pid=2427 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { perfmon } for  pid=2427 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { perfmon } for  pid=2427 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { bpf } for  pid=2427 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit[2427]: AVC avc:  denied  { bpf } for  pid=2427 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.760000 audit: BPF prog-id=81 op=LOAD
Feb  9 18:55:32.760000 audit[2427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00028a968 items=0 ppid=2393 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:32.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561623430326434636330653663653466343964343862636537396235
Feb  9 18:55:32.792694 env[1645]: time="2024-02-09T18:55:32.792645199Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-23-165,Uid:332cc97edb850ce12d7f51b5f53f42eb,Namespace:kube-system,Attempt:0,} returns sandbox id \"e0fce0be23580ed4b1cbe03e16433b75017470b44aa10d4d05cfd309d2d5250e\""
Feb  9 18:55:32.797216 env[1645]: time="2024-02-09T18:55:32.797172271Z" level=info msg="CreateContainer within sandbox \"e0fce0be23580ed4b1cbe03e16433b75017470b44aa10d4d05cfd309d2d5250e\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}"
Feb  9 18:55:32.824020 env[1645]: time="2024-02-09T18:55:32.823972616Z" level=info msg="CreateContainer within sandbox \"e0fce0be23580ed4b1cbe03e16433b75017470b44aa10d4d05cfd309d2d5250e\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"f77686d6d0194d9a8c298ad6a1f8cb84f5ec08a0d8b4fd0026a96fa50bc37a63\""
Feb  9 18:55:32.827648 env[1645]: time="2024-02-09T18:55:32.827603197Z" level=info msg="StartContainer for \"f77686d6d0194d9a8c298ad6a1f8cb84f5ec08a0d8b4fd0026a96fa50bc37a63\""
Feb  9 18:55:32.844866 env[1645]: time="2024-02-09T18:55:32.841324980Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-23-165,Uid:c6c4960f4343bc2791194a139341b04b,Namespace:kube-system,Attempt:0,} returns sandbox id \"1c1ce5ec5da622b01f408e1cd1f54dc9164c363f28550d04af958f8bc0a5d820\""
Feb  9 18:55:32.845444 kubelet[2304]: W0209 18:55:32.845384    2304 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.23.165:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:32.845444 kubelet[2304]: E0209 18:55:32.845443    2304 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.23.165:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:32.847845 env[1645]: time="2024-02-09T18:55:32.847790266Z" level=info msg="CreateContainer within sandbox \"1c1ce5ec5da622b01f408e1cd1f54dc9164c363f28550d04af958f8bc0a5d820\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}"
Feb  9 18:55:32.881841 env[1645]: time="2024-02-09T18:55:32.881634879Z" level=info msg="CreateContainer within sandbox \"1c1ce5ec5da622b01f408e1cd1f54dc9164c363f28550d04af958f8bc0a5d820\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"01aae86a684fcf7cfb5bc6620f765c312090c235eaa65483530e9c0cbcd350a8\""
Feb  9 18:55:32.882412 env[1645]: time="2024-02-09T18:55:32.882351953Z" level=info msg="StartContainer for \"01aae86a684fcf7cfb5bc6620f765c312090c235eaa65483530e9c0cbcd350a8\""
Feb  9 18:55:32.883040 env[1645]: time="2024-02-09T18:55:32.883008541Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-23-165,Uid:4ec352f9b85e5431f7c6642e4166b4d7,Namespace:kube-system,Attempt:0,} returns sandbox id \"5ab402d4cc0e6ce4f49d48bce79b5a54bb4b73a21a3e3026cf7d186f8aa3545a\""
Feb  9 18:55:32.887826 env[1645]: time="2024-02-09T18:55:32.887787429Z" level=info msg="CreateContainer within sandbox \"5ab402d4cc0e6ce4f49d48bce79b5a54bb4b73a21a3e3026cf7d186f8aa3545a\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}"
Feb  9 18:55:32.891675 systemd[1]: Started cri-containerd-f77686d6d0194d9a8c298ad6a1f8cb84f5ec08a0d8b4fd0026a96fa50bc37a63.scope.
Feb  9 18:55:32.911667 kubelet[2304]: E0209 18:55:32.908570    2304 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://172.31.23.165:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-23-165?timeout=10s": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:32.927000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.927000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.927000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.927000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.927000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.927000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.927000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.927000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.927000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.927000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.927000 audit: BPF prog-id=82 op=LOAD
Feb  9 18:55:32.930363 kubelet[2304]: W0209 18:55:32.927075    2304 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.23.165:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:32.930363 kubelet[2304]: E0209 18:55:32.927165    2304 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.23.165:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:32.930000 audit[2495]: AVC avc:  denied  { bpf } for  pid=2495 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.930000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2401 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:32.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637373638366436643031393464396138633239386164366131663863
Feb  9 18:55:32.933000 audit[2495]: AVC avc:  denied  { perfmon } for  pid=2495 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.933000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2401 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:32.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637373638366436643031393464396138633239386164366131663863
Feb  9 18:55:32.933000 audit[2495]: AVC avc:  denied  { bpf } for  pid=2495 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.933000 audit[2495]: AVC avc:  denied  { bpf } for  pid=2495 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.933000 audit[2495]: AVC avc:  denied  { bpf } for  pid=2495 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.933000 audit[2495]: AVC avc:  denied  { perfmon } for  pid=2495 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.933000 audit[2495]: AVC avc:  denied  { perfmon } for  pid=2495 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.933000 audit[2495]: AVC avc:  denied  { perfmon } for  pid=2495 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.933000 audit[2495]: AVC avc:  denied  { perfmon } for  pid=2495 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.933000 audit[2495]: AVC avc:  denied  { perfmon } for  pid=2495 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.933000 audit[2495]: AVC avc:  denied  { bpf } for  pid=2495 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.933000 audit[2495]: AVC avc:  denied  { bpf } for  pid=2495 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.933000 audit: BPF prog-id=83 op=LOAD
Feb  9 18:55:32.933000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003d2930 items=0 ppid=2401 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:32.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637373638366436643031393464396138633239386164366131663863
Feb  9 18:55:32.933000 audit[2495]: AVC avc:  denied  { bpf } for  pid=2495 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.933000 audit[2495]: AVC avc:  denied  { bpf } for  pid=2495 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.933000 audit[2495]: AVC avc:  denied  { perfmon } for  pid=2495 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.933000 audit[2495]: AVC avc:  denied  { perfmon } for  pid=2495 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.933000 audit[2495]: AVC avc:  denied  { perfmon } for  pid=2495 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.933000 audit[2495]: AVC avc:  denied  { perfmon } for  pid=2495 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.933000 audit[2495]: AVC avc:  denied  { perfmon } for  pid=2495 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.933000 audit[2495]: AVC avc:  denied  { bpf } for  pid=2495 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.933000 audit[2495]: AVC avc:  denied  { bpf } for  pid=2495 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.933000 audit: BPF prog-id=84 op=LOAD
Feb  9 18:55:32.933000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003d2978 items=0 ppid=2401 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:32.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637373638366436643031393464396138633239386164366131663863
Feb  9 18:55:32.933000 audit: BPF prog-id=84 op=UNLOAD
Feb  9 18:55:32.934000 audit: BPF prog-id=83 op=UNLOAD
Feb  9 18:55:32.934000 audit[2495]: AVC avc:  denied  { bpf } for  pid=2495 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.934000 audit[2495]: AVC avc:  denied  { bpf } for  pid=2495 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.934000 audit[2495]: AVC avc:  denied  { bpf } for  pid=2495 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.934000 audit[2495]: AVC avc:  denied  { perfmon } for  pid=2495 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.934000 audit[2495]: AVC avc:  denied  { perfmon } for  pid=2495 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.934000 audit[2495]: AVC avc:  denied  { perfmon } for  pid=2495 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.934000 audit[2495]: AVC avc:  denied  { perfmon } for  pid=2495 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.934000 audit[2495]: AVC avc:  denied  { perfmon } for  pid=2495 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.934000 audit[2495]: AVC avc:  denied  { bpf } for  pid=2495 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.934000 audit[2495]: AVC avc:  denied  { bpf } for  pid=2495 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:32.934000 audit: BPF prog-id=85 op=LOAD
Feb  9 18:55:32.934000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003d2d88 items=0 ppid=2401 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:32.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637373638366436643031393464396138633239386164366131663863
Feb  9 18:55:32.946451 env[1645]: time="2024-02-09T18:55:32.946389753Z" level=info msg="CreateContainer within sandbox \"5ab402d4cc0e6ce4f49d48bce79b5a54bb4b73a21a3e3026cf7d186f8aa3545a\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"8dcf2440845557d371a143039c61e10b378fab54be1bae3c9e93bd1cf4285d49\""
Feb  9 18:55:32.947680 env[1645]: time="2024-02-09T18:55:32.947565109Z" level=info msg="StartContainer for \"8dcf2440845557d371a143039c61e10b378fab54be1bae3c9e93bd1cf4285d49\""
Feb  9 18:55:32.963162 systemd[1]: Started cri-containerd-01aae86a684fcf7cfb5bc6620f765c312090c235eaa65483530e9c0cbcd350a8.scope.
Feb  9 18:55:33.009375 kubelet[2304]: I0209 18:55:33.007699    2304 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-23-165"
Feb  9 18:55:33.009375 kubelet[2304]: E0209 18:55:33.008309    2304 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.23.165:6443/api/v1/nodes\": dial tcp 172.31.23.165:6443: connect: connection refused" node="ip-172-31-23-165"
Feb  9 18:55:33.014471 systemd[1]: Started cri-containerd-8dcf2440845557d371a143039c61e10b378fab54be1bae3c9e93bd1cf4285d49.scope.
Feb  9 18:55:33.024000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.024000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.024000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.024000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.024000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.024000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.024000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.024000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.024000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.024000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.024000 audit: BPF prog-id=86 op=LOAD
Feb  9 18:55:33.026000 audit[2528]: AVC avc:  denied  { bpf } for  pid=2528 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.026000 audit[2528]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2392 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:33.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031616165383661363834666366376366623562633636323066373635
Feb  9 18:55:33.026000 audit[2528]: AVC avc:  denied  { perfmon } for  pid=2528 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.026000 audit[2528]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2392 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:33.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031616165383661363834666366376366623562633636323066373635
Feb  9 18:55:33.027000 audit[2528]: AVC avc:  denied  { bpf } for  pid=2528 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.027000 audit[2528]: AVC avc:  denied  { bpf } for  pid=2528 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.027000 audit[2528]: AVC avc:  denied  { bpf } for  pid=2528 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.027000 audit[2528]: AVC avc:  denied  { perfmon } for  pid=2528 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.027000 audit[2528]: AVC avc:  denied  { perfmon } for  pid=2528 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.027000 audit[2528]: AVC avc:  denied  { perfmon } for  pid=2528 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.027000 audit[2528]: AVC avc:  denied  { perfmon } for  pid=2528 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.027000 audit[2528]: AVC avc:  denied  { perfmon } for  pid=2528 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.027000 audit[2528]: AVC avc:  denied  { bpf } for  pid=2528 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.027000 audit[2528]: AVC avc:  denied  { bpf } for  pid=2528 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.027000 audit: BPF prog-id=87 op=LOAD
Feb  9 18:55:33.027000 audit[2528]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00020f310 items=0 ppid=2392 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:33.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031616165383661363834666366376366623562633636323066373635
Feb  9 18:55:33.028000 audit[2528]: AVC avc:  denied  { bpf } for  pid=2528 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.028000 audit[2528]: AVC avc:  denied  { bpf } for  pid=2528 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.028000 audit[2528]: AVC avc:  denied  { perfmon } for  pid=2528 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.028000 audit[2528]: AVC avc:  denied  { perfmon } for  pid=2528 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.028000 audit[2528]: AVC avc:  denied  { perfmon } for  pid=2528 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.028000 audit[2528]: AVC avc:  denied  { perfmon } for  pid=2528 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.028000 audit[2528]: AVC avc:  denied  { perfmon } for  pid=2528 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.028000 audit[2528]: AVC avc:  denied  { bpf } for  pid=2528 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.028000 audit[2528]: AVC avc:  denied  { bpf } for  pid=2528 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.028000 audit: BPF prog-id=88 op=LOAD
Feb  9 18:55:33.028000 audit[2528]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00020f358 items=0 ppid=2392 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:33.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031616165383661363834666366376366623562633636323066373635
Feb  9 18:55:33.030000 audit: BPF prog-id=88 op=UNLOAD
Feb  9 18:55:33.030000 audit: BPF prog-id=87 op=UNLOAD
Feb  9 18:55:33.032000 audit[2528]: AVC avc:  denied  { bpf } for  pid=2528 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.032000 audit[2528]: AVC avc:  denied  { bpf } for  pid=2528 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.032000 audit[2528]: AVC avc:  denied  { bpf } for  pid=2528 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.032000 audit[2528]: AVC avc:  denied  { perfmon } for  pid=2528 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.032000 audit[2528]: AVC avc:  denied  { perfmon } for  pid=2528 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.032000 audit[2528]: AVC avc:  denied  { perfmon } for  pid=2528 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.032000 audit[2528]: AVC avc:  denied  { perfmon } for  pid=2528 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.032000 audit[2528]: AVC avc:  denied  { perfmon } for  pid=2528 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.032000 audit[2528]: AVC avc:  denied  { bpf } for  pid=2528 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.032000 audit[2528]: AVC avc:  denied  { bpf } for  pid=2528 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.032000 audit: BPF prog-id=89 op=LOAD
Feb  9 18:55:33.032000 audit[2528]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00020f768 items=0 ppid=2392 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:33.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031616165383661363834666366376366623562633636323066373635
Feb  9 18:55:33.064000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.064000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.064000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.064000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.064000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.064000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.064000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.064000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.064000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.064000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.064000 audit: BPF prog-id=90 op=LOAD
Feb  9 18:55:33.068000 audit[2542]: AVC avc:  denied  { bpf } for  pid=2542 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.068000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2393 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:33.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864636632343430383435353537643337316131343330333963363165
Feb  9 18:55:33.069000 audit[2542]: AVC avc:  denied  { perfmon } for  pid=2542 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.069000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2393 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:33.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864636632343430383435353537643337316131343330333963363165
Feb  9 18:55:33.070000 audit[2542]: AVC avc:  denied  { bpf } for  pid=2542 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.070000 audit[2542]: AVC avc:  denied  { bpf } for  pid=2542 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.070000 audit[2542]: AVC avc:  denied  { bpf } for  pid=2542 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.070000 audit[2542]: AVC avc:  denied  { perfmon } for  pid=2542 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.070000 audit[2542]: AVC avc:  denied  { perfmon } for  pid=2542 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.070000 audit[2542]: AVC avc:  denied  { perfmon } for  pid=2542 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.070000 audit[2542]: AVC avc:  denied  { perfmon } for  pid=2542 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.070000 audit[2542]: AVC avc:  denied  { perfmon } for  pid=2542 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.070000 audit[2542]: AVC avc:  denied  { bpf } for  pid=2542 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.070000 audit[2542]: AVC avc:  denied  { bpf } for  pid=2542 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.070000 audit: BPF prog-id=91 op=LOAD
Feb  9 18:55:33.070000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002c1070 items=0 ppid=2393 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:33.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864636632343430383435353537643337316131343330333963363165
Feb  9 18:55:33.071000 audit[2542]: AVC avc:  denied  { bpf } for  pid=2542 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.071000 audit[2542]: AVC avc:  denied  { bpf } for  pid=2542 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.071000 audit[2542]: AVC avc:  denied  { perfmon } for  pid=2542 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.071000 audit[2542]: AVC avc:  denied  { perfmon } for  pid=2542 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.071000 audit[2542]: AVC avc:  denied  { perfmon } for  pid=2542 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.071000 audit[2542]: AVC avc:  denied  { perfmon } for  pid=2542 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.071000 audit[2542]: AVC avc:  denied  { perfmon } for  pid=2542 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.071000 audit[2542]: AVC avc:  denied  { bpf } for  pid=2542 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.071000 audit[2542]: AVC avc:  denied  { bpf } for  pid=2542 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.071000 audit: BPF prog-id=92 op=LOAD
Feb  9 18:55:33.071000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002c10b8 items=0 ppid=2393 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:33.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864636632343430383435353537643337316131343330333963363165
Feb  9 18:55:33.072000 audit: BPF prog-id=92 op=UNLOAD
Feb  9 18:55:33.073000 audit: BPF prog-id=91 op=UNLOAD
Feb  9 18:55:33.073000 audit[2542]: AVC avc:  denied  { bpf } for  pid=2542 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.073000 audit[2542]: AVC avc:  denied  { bpf } for  pid=2542 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.073000 audit[2542]: AVC avc:  denied  { bpf } for  pid=2542 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.073000 audit[2542]: AVC avc:  denied  { perfmon } for  pid=2542 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.073000 audit[2542]: AVC avc:  denied  { perfmon } for  pid=2542 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.073000 audit[2542]: AVC avc:  denied  { perfmon } for  pid=2542 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.073000 audit[2542]: AVC avc:  denied  { perfmon } for  pid=2542 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.073000 audit[2542]: AVC avc:  denied  { perfmon } for  pid=2542 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.073000 audit[2542]: AVC avc:  denied  { bpf } for  pid=2542 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.073000 audit[2542]: AVC avc:  denied  { bpf } for  pid=2542 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:33.073000 audit: BPF prog-id=93 op=LOAD
Feb  9 18:55:33.073000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002c14c8 items=0 ppid=2393 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:33.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864636632343430383435353537643337316131343330333963363165
Feb  9 18:55:33.080547 env[1645]: time="2024-02-09T18:55:33.080499466Z" level=info msg="StartContainer for \"f77686d6d0194d9a8c298ad6a1f8cb84f5ec08a0d8b4fd0026a96fa50bc37a63\" returns successfully"
Feb  9 18:55:33.102364 env[1645]: time="2024-02-09T18:55:33.102304805Z" level=info msg="StartContainer for \"01aae86a684fcf7cfb5bc6620f765c312090c235eaa65483530e9c0cbcd350a8\" returns successfully"
Feb  9 18:55:33.132427 env[1645]: time="2024-02-09T18:55:33.132374332Z" level=info msg="StartContainer for \"8dcf2440845557d371a143039c61e10b378fab54be1bae3c9e93bd1cf4285d49\" returns successfully"
Feb  9 18:55:33.189193 kubelet[2304]: W0209 18:55:33.189102    2304 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.23.165:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:33.189193 kubelet[2304]: E0209 18:55:33.189162    2304 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.23.165:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:33.542964 kubelet[2304]: E0209 18:55:33.542936    2304 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.23.165:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.23.165:6443: connect: connection refused
Feb  9 18:55:33.641049 kubelet[2304]: I0209 18:55:33.641024    2304 status_manager.go:698] "Failed to get status for pod" podUID=4ec352f9b85e5431f7c6642e4166b4d7 pod="kube-system/kube-scheduler-ip-172-31-23-165" err="Get \"https://172.31.23.165:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ip-172-31-23-165\": dial tcp 172.31.23.165:6443: connect: connection refused"
Feb  9 18:55:33.648986 kubelet[2304]: I0209 18:55:33.648961    2304 status_manager.go:698] "Failed to get status for pod" podUID=332cc97edb850ce12d7f51b5f53f42eb pod="kube-system/kube-controller-manager-ip-172-31-23-165" err="Get \"https://172.31.23.165:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ip-172-31-23-165\": dial tcp 172.31.23.165:6443: connect: connection refused"
Feb  9 18:55:33.667590 kubelet[2304]: I0209 18:55:33.667560    2304 status_manager.go:698] "Failed to get status for pod" podUID=c6c4960f4343bc2791194a139341b04b pod="kube-system/kube-apiserver-ip-172-31-23-165" err="Get \"https://172.31.23.165:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ip-172-31-23-165\": dial tcp 172.31.23.165:6443: connect: connection refused"
Feb  9 18:55:34.199000 audit[2520]: AVC avc:  denied  { watch } for  pid=2520 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 18:55:34.199000 audit[2520]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c66000 a2=fc6 a3=0 items=0 ppid=2401 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c827 key=(null)
Feb  9 18:55:34.199000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 18:55:34.200000 audit[2520]: AVC avc:  denied  { watch } for  pid=2520 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 18:55:34.200000 audit[2520]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c54040 a2=fc6 a3=0 items=0 ppid=2401 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c827 key=(null)
Feb  9 18:55:34.200000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 18:55:34.611006 kubelet[2304]: I0209 18:55:34.610980    2304 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-23-165"
Feb  9 18:55:35.076841 amazon-ssm-agent[1617]: 2024-02-09 18:55:35 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated
Feb  9 18:55:37.134000 audit[2548]: AVC avc:  denied  { watch } for  pid=2548 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c685 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 18:55:37.143446 kernel: kauditd_printk_skb: 624 callbacks suppressed
Feb  9 18:55:37.143682 kernel: audit: type=1400 audit(1707504937.134:749): avc:  denied  { watch } for  pid=2548 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c685 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 18:55:37.134000 audit[2548]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c006b58000 a2=fc6 a3=0 items=0 ppid=2392 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c685 key=(null)
Feb  9 18:55:37.151481 kernel: audit: type=1300 audit(1707504937.134:749): arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c006b58000 a2=fc6 a3=0 items=0 ppid=2392 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c685 key=(null)
Feb  9 18:55:37.157784 kernel: audit: type=1327 audit(1707504937.134:749): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313635002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 18:55:37.134000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313635002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 18:55:37.163740 kernel: audit: type=1400 audit(1707504937.134:750): avc:  denied  { watch } for  pid=2548 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c685 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 18:55:37.134000 audit[2548]: AVC avc:  denied  { watch } for  pid=2548 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c685 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 18:55:37.171989 kernel: audit: type=1300 audit(1707504937.134:750): arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00283a320 a2=fc6 a3=0 items=0 ppid=2392 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c685 key=(null)
Feb  9 18:55:37.134000 audit[2548]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00283a320 a2=fc6 a3=0 items=0 ppid=2392 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c685 key=(null)
Feb  9 18:55:37.178529 kernel: audit: type=1327 audit(1707504937.134:750): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313635002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 18:55:37.134000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313635002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 18:55:37.135000 audit[2548]: AVC avc:  denied  { watch } for  pid=2548 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c685 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 18:55:37.193481 kernel: audit: type=1400 audit(1707504937.135:751): avc:  denied  { watch } for  pid=2548 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c685 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 18:55:37.135000 audit[2548]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c006b58120 a2=fc6 a3=0 items=0 ppid=2392 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c685 key=(null)
Feb  9 18:55:37.201714 kernel: audit: type=1300 audit(1707504937.135:751): arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c006b58120 a2=fc6 a3=0 items=0 ppid=2392 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c685 key=(null)
Feb  9 18:55:37.135000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313635002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 18:55:37.214034 kernel: audit: type=1327 audit(1707504937.135:751): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313635002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 18:55:37.214164 kernel: audit: type=1400 audit(1707504937.156:752): avc:  denied  { watch } for  pid=2548 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c685 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 18:55:37.156000 audit[2548]: AVC avc:  denied  { watch } for  pid=2548 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c685 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 18:55:37.156000 audit[2548]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c00b0218c0 a2=fc6 a3=0 items=0 ppid=2392 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c685 key=(null)
Feb  9 18:55:37.156000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313635002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 18:55:37.223000 audit[2548]: AVC avc:  denied  { watch } for  pid=2548 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c685 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 18:55:37.223000 audit[2548]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c002976b40 a2=fc6 a3=0 items=0 ppid=2392 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c685 key=(null)
Feb  9 18:55:37.223000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313635002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 18:55:37.224000 audit[2548]: AVC avc:  denied  { watch } for  pid=2548 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c685 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 18:55:37.224000 audit[2548]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c00b2da1b0 a2=fc6 a3=0 items=0 ppid=2392 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c685 key=(null)
Feb  9 18:55:37.224000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313635002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Feb  9 18:55:37.386784 kubelet[2304]: E0209 18:55:37.386669    2304 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-23-165\" not found" node="ip-172-31-23-165"
Feb  9 18:55:37.434968 kubelet[2304]: I0209 18:55:37.434939    2304 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-23-165"
Feb  9 18:55:37.486095 kubelet[2304]: I0209 18:55:37.486031    2304 apiserver.go:52] "Watching apiserver"
Feb  9 18:55:37.493666 kubelet[2304]: I0209 18:55:37.493634    2304 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world"
Feb  9 18:55:37.533653 kubelet[2304]: I0209 18:55:37.533617    2304 reconciler.go:41] "Reconciler: start to sync state"
Feb  9 18:55:37.855282 kubelet[2304]: E0209 18:55:37.855252    2304 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ip-172-31-23-165\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ip-172-31-23-165"
Feb  9 18:55:38.136154 kubelet[2304]: E0209 18:55:38.134880    2304 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-23-165\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ip-172-31-23-165"
Feb  9 18:55:39.032954 update_engine[1633]: I0209 18:55:39.032902  1633 update_attempter.cc:509] Updating boot flags...
Feb  9 18:55:39.624000 audit[2520]: AVC avc:  denied  { watch } for  pid=2520 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 18:55:39.624000 audit[2520]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c55720 a2=fc6 a3=0 items=0 ppid=2401 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c827 key=(null)
Feb  9 18:55:39.624000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 18:55:39.626000 audit[2520]: AVC avc:  denied  { watch } for  pid=2520 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 18:55:39.626000 audit[2520]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000fc7800 a2=fc6 a3=0 items=0 ppid=2401 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c827 key=(null)
Feb  9 18:55:39.627000 audit[2520]: AVC avc:  denied  { watch } for  pid=2520 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 18:55:39.627000 audit[2520]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fc7940 a2=fc6 a3=0 items=0 ppid=2401 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c827 key=(null)
Feb  9 18:55:39.627000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 18:55:39.626000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 18:55:39.627000 audit[2520]: AVC avc:  denied  { watch } for  pid=2520 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 18:55:39.627000 audit[2520]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000c55e80 a2=fc6 a3=0 items=0 ppid=2401 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c827 key=(null)
Feb  9 18:55:39.627000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 18:55:40.157248 systemd[1]: Reloading.
Feb  9 18:55:40.271106 /usr/lib/systemd/system-generators/torcx-generator[2804]: time="2024-02-09T18:55:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]"
Feb  9 18:55:40.271733 /usr/lib/systemd/system-generators/torcx-generator[2804]: time="2024-02-09T18:55:40Z" level=info msg="torcx already run"
Feb  9 18:55:40.408675 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Feb  9 18:55:40.408696 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Feb  9 18:55:40.431471 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Feb  9 18:55:40.531000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.531000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.531000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.531000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.531000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.531000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.531000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.531000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.531000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.532000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.532000 audit: BPF prog-id=94 op=LOAD
Feb  9 18:55:40.532000 audit: BPF prog-id=55 op=UNLOAD
Feb  9 18:55:40.533000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.533000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.533000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.533000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.533000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.533000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.533000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.533000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.533000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.534000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.534000 audit: BPF prog-id=95 op=LOAD
Feb  9 18:55:40.534000 audit: BPF prog-id=82 op=UNLOAD
Feb  9 18:55:40.536000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.536000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.536000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.536000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.536000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.536000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.536000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.536000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.536000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.536000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.536000 audit: BPF prog-id=96 op=LOAD
Feb  9 18:55:40.536000 audit: BPF prog-id=70 op=UNLOAD
Feb  9 18:55:40.537000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.537000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.537000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.537000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.537000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.537000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.537000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.537000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.537000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.537000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.537000 audit: BPF prog-id=97 op=LOAD
Feb  9 18:55:40.537000 audit: BPF prog-id=86 op=UNLOAD
Feb  9 18:55:40.538000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.538000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.538000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.538000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.538000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.538000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.538000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.538000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.538000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.539000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.539000 audit: BPF prog-id=98 op=LOAD
Feb  9 18:55:40.539000 audit: BPF prog-id=56 op=UNLOAD
Feb  9 18:55:40.539000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.539000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.539000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.539000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.539000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.539000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.539000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.539000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.539000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.539000 audit: BPF prog-id=99 op=LOAD
Feb  9 18:55:40.539000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.539000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.539000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.539000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.539000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.539000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.539000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.539000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.539000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.539000 audit: BPF prog-id=100 op=LOAD
Feb  9 18:55:40.539000 audit: BPF prog-id=57 op=UNLOAD
Feb  9 18:55:40.539000 audit: BPF prog-id=58 op=UNLOAD
Feb  9 18:55:40.540000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.540000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.540000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.540000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.540000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.540000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.540000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.540000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.540000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.540000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.540000 audit: BPF prog-id=101 op=LOAD
Feb  9 18:55:40.540000 audit: BPF prog-id=78 op=UNLOAD
Feb  9 18:55:40.541000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.541000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.541000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.541000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.541000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.541000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.541000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.541000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.541000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.541000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.541000 audit: BPF prog-id=102 op=LOAD
Feb  9 18:55:40.541000 audit: BPF prog-id=59 op=UNLOAD
Feb  9 18:55:40.541000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.541000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.541000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.541000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.542000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.542000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.542000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.542000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.542000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.542000 audit: BPF prog-id=103 op=LOAD
Feb  9 18:55:40.542000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.542000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.542000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.542000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.542000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.542000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.542000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.542000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.542000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.542000 audit: BPF prog-id=104 op=LOAD
Feb  9 18:55:40.542000 audit: BPF prog-id=60 op=UNLOAD
Feb  9 18:55:40.542000 audit: BPF prog-id=61 op=UNLOAD
Feb  9 18:55:40.544000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.544000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.544000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.544000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.544000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.544000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.544000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.544000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.544000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.544000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.544000 audit: BPF prog-id=105 op=LOAD
Feb  9 18:55:40.544000 audit: BPF prog-id=62 op=UNLOAD
Feb  9 18:55:40.545000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.545000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit: BPF prog-id=106 op=LOAD
Feb  9 18:55:40.546000 audit: BPF prog-id=63 op=UNLOAD
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit: BPF prog-id=107 op=LOAD
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.546000 audit: BPF prog-id=108 op=LOAD
Feb  9 18:55:40.546000 audit: BPF prog-id=64 op=UNLOAD
Feb  9 18:55:40.547000 audit: BPF prog-id=65 op=UNLOAD
Feb  9 18:55:40.548000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.548000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.548000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.548000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.548000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.548000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.548000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.548000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.548000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.548000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.548000 audit: BPF prog-id=109 op=LOAD
Feb  9 18:55:40.548000 audit: BPF prog-id=66 op=UNLOAD
Feb  9 18:55:40.550000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.550000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.550000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.550000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.550000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.550000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.550000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.550000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.550000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.551000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.551000 audit: BPF prog-id=110 op=LOAD
Feb  9 18:55:40.551000 audit: BPF prog-id=67 op=UNLOAD
Feb  9 18:55:40.551000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.551000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.551000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.551000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.551000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.551000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.551000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.551000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.551000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.551000 audit: BPF prog-id=111 op=LOAD
Feb  9 18:55:40.551000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.551000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.551000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.551000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.551000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.551000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.551000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.551000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.551000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.551000 audit: BPF prog-id=112 op=LOAD
Feb  9 18:55:40.551000 audit: BPF prog-id=68 op=UNLOAD
Feb  9 18:55:40.551000 audit: BPF prog-id=69 op=UNLOAD
Feb  9 18:55:40.552000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.552000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.552000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.552000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.552000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.552000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.552000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.552000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.552000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.552000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.552000 audit: BPF prog-id=113 op=LOAD
Feb  9 18:55:40.552000 audit: BPF prog-id=90 op=UNLOAD
Feb  9 18:55:40.553000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.553000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.553000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.553000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.553000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.553000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.553000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.553000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.553000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.554000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.554000 audit: BPF prog-id=114 op=LOAD
Feb  9 18:55:40.554000 audit: BPF prog-id=74 op=UNLOAD
Feb  9 18:55:40.575361 kubelet[2304]: I0209 18:55:40.574460    2304 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Feb  9 18:55:40.574717 systemd[1]: Stopping kubelet.service...
Feb  9 18:55:40.595712 systemd[1]: kubelet.service: Deactivated successfully.
Feb  9 18:55:40.595961 systemd[1]: Stopped kubelet.service.
Feb  9 18:55:40.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:40.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:40.598309 systemd[1]: Started kubelet.service.
Feb  9 18:55:40.707598 kubelet[2857]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI.
Feb  9 18:55:40.708012 kubelet[2857]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Feb  9 18:55:40.708226 kubelet[2857]: I0209 18:55:40.708182    2857 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime"
Feb  9 18:55:40.712568 kubelet[2857]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI.
Feb  9 18:55:40.712741 kubelet[2857]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Feb  9 18:55:40.736581 kubelet[2857]: I0209 18:55:40.734180    2857 server.go:412] "Kubelet version" kubeletVersion="v1.26.5"
Feb  9 18:55:40.738712 kubelet[2857]: I0209 18:55:40.736838    2857 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
Feb  9 18:55:40.738712 kubelet[2857]: I0209 18:55:40.737225    2857 server.go:836] "Client rotation is on, will bootstrap in background"
Feb  9 18:55:40.744499 kubelet[2857]: I0209 18:55:40.744448    2857 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem".
Feb  9 18:55:40.759146 kubelet[2857]: I0209 18:55:40.758984    2857 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified.  defaulting to /"
Feb  9 18:55:40.759791 kubelet[2857]: I0209 18:55:40.759761    2857 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Feb  9 18:55:40.760355 kubelet[2857]: I0209 18:55:40.760136    2857 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[]
Feb  9 18:55:40.761042 kubelet[2857]: I0209 18:55:40.760893    2857 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.1} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity:<nil> Percentage:0.05} GracePeriod:0s MinReclaim:<nil>} {Signal:imagefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.15} GracePeriod:0s MinReclaim:<nil>}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}
Feb  9 18:55:40.761042 kubelet[2857]: I0209 18:55:40.760926    2857 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container"
Feb  9 18:55:40.761042 kubelet[2857]: I0209 18:55:40.760942    2857 container_manager_linux.go:308] "Creating device plugin manager"
Feb  9 18:55:40.761279 kubelet[2857]: I0209 18:55:40.761116    2857 state_mem.go:36] "Initialized new in-memory state store"
Feb  9 18:55:40.771602 kubelet[2857]: I0209 18:55:40.771529    2857 kubelet.go:398] "Attempting to sync node with API server"
Feb  9 18:55:40.771602 kubelet[2857]: I0209 18:55:40.771561    2857 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests"
Feb  9 18:55:40.771602 kubelet[2857]: I0209 18:55:40.771590    2857 kubelet.go:297] "Adding apiserver pod source"
Feb  9 18:55:40.771602 kubelet[2857]: I0209 18:55:40.771609    2857 apiserver.go:42] "Waiting for node sync before watching apiserver pods"
Feb  9 18:55:40.773143 kubelet[2857]: I0209 18:55:40.773116    2857 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1"
Feb  9 18:55:40.773956 kubelet[2857]: I0209 18:55:40.773936    2857 server.go:1186] "Started kubelet"
Feb  9 18:55:40.775000 audit[2857]: AVC avc:  denied  { mac_admin } for  pid=2857 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.775000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Feb  9 18:55:40.775000 audit[2857]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c95650 a1=c000c788a0 a2=c000c95620 a3=25 items=0 ppid=1 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:40.775000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Feb  9 18:55:40.775000 audit[2857]: AVC avc:  denied  { mac_admin } for  pid=2857 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.775000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Feb  9 18:55:40.775000 audit[2857]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000caaac0 a1=c000c788b8 a2=c000c956e0 a3=25 items=0 ppid=1 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:40.775000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Feb  9 18:55:40.777629 kubelet[2857]: I0209 18:55:40.777055    2857 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument"
Feb  9 18:55:40.777629 kubelet[2857]: I0209 18:55:40.777116    2857 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument"
Feb  9 18:55:40.777629 kubelet[2857]: I0209 18:55:40.777152    2857 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer"
Feb  9 18:55:40.789647 kubelet[2857]: I0209 18:55:40.788602    2857 server.go:161] "Starting to listen" address="0.0.0.0" port=10250
Feb  9 18:55:40.789647 kubelet[2857]: I0209 18:55:40.789486    2857 server.go:451] "Adding debug handlers to kubelet server"
Feb  9 18:55:40.794364 kubelet[2857]: I0209 18:55:40.793269    2857 volume_manager.go:293] "Starting Kubelet Volume Manager"
Feb  9 18:55:40.795617 kubelet[2857]: I0209 18:55:40.795191    2857 desired_state_of_world_populator.go:151] "Desired state populator starts to run"
Feb  9 18:55:40.831796 kubelet[2857]: E0209 18:55:40.831770    2857 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs"
Feb  9 18:55:40.832051 kubelet[2857]: E0209 18:55:40.832034    2857 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem"
Feb  9 18:55:40.833580 kubelet[2857]: I0209 18:55:40.832885    2857 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4
Feb  9 18:55:40.883027 kubelet[2857]: I0209 18:55:40.883006    2857 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6
Feb  9 18:55:40.883187 kubelet[2857]: I0209 18:55:40.883179    2857 status_manager.go:176] "Starting to sync pod status with apiserver"
Feb  9 18:55:40.883253 kubelet[2857]: I0209 18:55:40.883247    2857 kubelet.go:2113] "Starting kubelet main sync loop"
Feb  9 18:55:40.883596 kubelet[2857]: E0209 18:55:40.883582    2857 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]"
Feb  9 18:55:40.899391 kubelet[2857]: I0209 18:55:40.899367    2857 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-23-165"
Feb  9 18:55:40.925536 kubelet[2857]: I0209 18:55:40.924936    2857 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-23-165"
Feb  9 18:55:40.926567 kubelet[2857]: I0209 18:55:40.926452    2857 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-23-165"
Feb  9 18:55:40.983813 kubelet[2857]: E0209 18:55:40.983779    2857 kubelet.go:2137] "Skipping pod synchronization" err="container runtime status check may not have completed yet"
Feb  9 18:55:40.989439 kubelet[2857]: I0209 18:55:40.989409    2857 cpu_manager.go:214] "Starting CPU manager" policy="none"
Feb  9 18:55:40.989439 kubelet[2857]: I0209 18:55:40.989431    2857 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s"
Feb  9 18:55:40.989439 kubelet[2857]: I0209 18:55:40.989449    2857 state_mem.go:36] "Initialized new in-memory state store"
Feb  9 18:55:40.990055 kubelet[2857]: I0209 18:55:40.990031    2857 state_mem.go:88] "Updated default CPUSet" cpuSet=""
Feb  9 18:55:40.990055 kubelet[2857]: I0209 18:55:40.990054    2857 state_mem.go:96] "Updated CPUSet assignments" assignments=map[]
Feb  9 18:55:40.990055 kubelet[2857]: I0209 18:55:40.990062    2857 policy_none.go:49] "None policy: Start"
Feb  9 18:55:40.990897 kubelet[2857]: I0209 18:55:40.990876    2857 memory_manager.go:169] "Starting memorymanager" policy="None"
Feb  9 18:55:40.990897 kubelet[2857]: I0209 18:55:40.990899    2857 state_mem.go:35] "Initializing new in-memory state store"
Feb  9 18:55:40.991278 kubelet[2857]: I0209 18:55:40.991259    2857 state_mem.go:75] "Updated machine memory state"
Feb  9 18:55:40.996378 kubelet[2857]: I0209 18:55:40.996355    2857 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found"
Feb  9 18:55:40.995000 audit[2857]: AVC avc:  denied  { mac_admin } for  pid=2857 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:40.995000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Feb  9 18:55:40.995000 audit[2857]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f51860 a1=c000e9d0e0 a2=c000f51800 a3=25 items=0 ppid=1 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:40.995000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Feb  9 18:55:40.996829 kubelet[2857]: I0209 18:55:40.996441    2857 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument"
Feb  9 18:55:40.999018 kubelet[2857]: I0209 18:55:40.998996    2857 plugin_manager.go:118] "Starting Kubelet Plugin Manager"
Feb  9 18:55:41.184434 kubelet[2857]: I0209 18:55:41.184390    2857 topology_manager.go:210] "Topology Admit Handler"
Feb  9 18:55:41.185138 kubelet[2857]: I0209 18:55:41.185117    2857 topology_manager.go:210] "Topology Admit Handler"
Feb  9 18:55:41.185699 kubelet[2857]: I0209 18:55:41.185680    2857 topology_manager.go:210] "Topology Admit Handler"
Feb  9 18:55:41.203162 kubelet[2857]: I0209 18:55:41.203126    2857 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/332cc97edb850ce12d7f51b5f53f42eb-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-23-165\" (UID: \"332cc97edb850ce12d7f51b5f53f42eb\") " pod="kube-system/kube-controller-manager-ip-172-31-23-165"
Feb  9 18:55:41.203540 kubelet[2857]: I0209 18:55:41.203423    2857 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/332cc97edb850ce12d7f51b5f53f42eb-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-23-165\" (UID: \"332cc97edb850ce12d7f51b5f53f42eb\") " pod="kube-system/kube-controller-manager-ip-172-31-23-165"
Feb  9 18:55:41.203705 kubelet[2857]: I0209 18:55:41.203692    2857 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4ec352f9b85e5431f7c6642e4166b4d7-kubeconfig\") pod \"kube-scheduler-ip-172-31-23-165\" (UID: \"4ec352f9b85e5431f7c6642e4166b4d7\") " pod="kube-system/kube-scheduler-ip-172-31-23-165"
Feb  9 18:55:41.203811 kubelet[2857]: I0209 18:55:41.203802    2857 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c6c4960f4343bc2791194a139341b04b-ca-certs\") pod \"kube-apiserver-ip-172-31-23-165\" (UID: \"c6c4960f4343bc2791194a139341b04b\") " pod="kube-system/kube-apiserver-ip-172-31-23-165"
Feb  9 18:55:41.203908 kubelet[2857]: I0209 18:55:41.203900    2857 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c6c4960f4343bc2791194a139341b04b-k8s-certs\") pod \"kube-apiserver-ip-172-31-23-165\" (UID: \"c6c4960f4343bc2791194a139341b04b\") " pod="kube-system/kube-apiserver-ip-172-31-23-165"
Feb  9 18:55:41.204018 kubelet[2857]: I0209 18:55:41.204009    2857 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c6c4960f4343bc2791194a139341b04b-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-23-165\" (UID: \"c6c4960f4343bc2791194a139341b04b\") " pod="kube-system/kube-apiserver-ip-172-31-23-165"
Feb  9 18:55:41.204187 kubelet[2857]: I0209 18:55:41.204173    2857 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/332cc97edb850ce12d7f51b5f53f42eb-ca-certs\") pod \"kube-controller-manager-ip-172-31-23-165\" (UID: \"332cc97edb850ce12d7f51b5f53f42eb\") " pod="kube-system/kube-controller-manager-ip-172-31-23-165"
Feb  9 18:55:41.204301 kubelet[2857]: I0209 18:55:41.204291    2857 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/332cc97edb850ce12d7f51b5f53f42eb-k8s-certs\") pod \"kube-controller-manager-ip-172-31-23-165\" (UID: \"332cc97edb850ce12d7f51b5f53f42eb\") " pod="kube-system/kube-controller-manager-ip-172-31-23-165"
Feb  9 18:55:41.204422 kubelet[2857]: I0209 18:55:41.204412    2857 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/332cc97edb850ce12d7f51b5f53f42eb-kubeconfig\") pod \"kube-controller-manager-ip-172-31-23-165\" (UID: \"332cc97edb850ce12d7f51b5f53f42eb\") " pod="kube-system/kube-controller-manager-ip-172-31-23-165"
Feb  9 18:55:41.773328 kubelet[2857]: I0209 18:55:41.773262    2857 apiserver.go:52] "Watching apiserver"
Feb  9 18:55:41.796006 kubelet[2857]: I0209 18:55:41.795965    2857 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world"
Feb  9 18:55:41.807495 kubelet[2857]: I0209 18:55:41.807454    2857 reconciler.go:41] "Reconciler: start to sync state"
Feb  9 18:55:42.238723 kubelet[2857]: E0209 18:55:42.238687    2857 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-23-165\" already exists" pod="kube-system/kube-scheduler-ip-172-31-23-165"
Feb  9 18:55:42.872440 kubelet[2857]: I0209 18:55:42.872406    2857 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-23-165" podStartSLOduration=1.872317562 pod.CreationTimestamp="2024-02-09 18:55:41 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:55:42.406125908 +0000 UTC m=+1.801597963" watchObservedRunningTime="2024-02-09 18:55:42.872317562 +0000 UTC m=+2.267789592"
Feb  9 18:55:43.208238 kubelet[2857]: I0209 18:55:43.208076    2857 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-23-165" podStartSLOduration=2.207999812 pod.CreationTimestamp="2024-02-09 18:55:41 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:55:42.87361952 +0000 UTC m=+2.269091557" watchObservedRunningTime="2024-02-09 18:55:43.207999812 +0000 UTC m=+2.603471847"
Feb  9 18:55:43.780655 sudo[1905]: pam_unix(sudo:session): session closed for user root
Feb  9 18:55:43.789663 kernel: kauditd_printk_skb: 278 callbacks suppressed
Feb  9 18:55:43.789808 kernel: audit: type=1106 audit(1707504943.779:1008): pid=1905 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:43.779000 audit[1905]: USER_END pid=1905 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:43.779000 audit[1905]: CRED_DISP pid=1905 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:43.797514 kernel: audit: type=1104 audit(1707504943.779:1009): pid=1905 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:43.807873 sshd[1902]: pam_unix(sshd:session): session closed for user core
Feb  9 18:55:43.809000 audit[1902]: USER_END pid=1902 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 18:55:43.812915 systemd[1]: sshd@6-172.31.23.165:22-139.178.68.195:50854.service: Deactivated successfully.
Feb  9 18:55:43.821156 kernel: audit: type=1106 audit(1707504943.809:1010): pid=1902 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 18:55:43.820579 systemd-logind[1632]: Session 7 logged out. Waiting for processes to exit.
Feb  9 18:55:43.822188 systemd[1]: session-7.scope: Deactivated successfully.
Feb  9 18:55:43.822504 systemd[1]: session-7.scope: Consumed 3.586s CPU time.
Feb  9 18:55:43.809000 audit[1902]: CRED_DISP pid=1902 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 18:55:43.829766 kernel: audit: type=1104 audit(1707504943.809:1011): pid=1902 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'
Feb  9 18:55:43.829192 systemd-logind[1632]: Removed session 7.
Feb  9 18:55:43.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.23.165:22-139.178.68.195:50854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:43.839363 kernel: audit: type=1131 audit(1707504943.811:1012): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.23.165:22-139.178.68.195:50854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Feb  9 18:55:58.558246 systemd[1]: cri-containerd-f77686d6d0194d9a8c298ad6a1f8cb84f5ec08a0d8b4fd0026a96fa50bc37a63.scope: Deactivated successfully.
Feb  9 18:55:58.558615 systemd[1]: cri-containerd-f77686d6d0194d9a8c298ad6a1f8cb84f5ec08a0d8b4fd0026a96fa50bc37a63.scope: Consumed 1.171s CPU time.
Feb  9 18:55:58.565922 kernel: audit: type=1334 audit(1707504958.561:1013): prog-id=85 op=UNLOAD
Feb  9 18:55:58.566043 kernel: audit: type=1334 audit(1707504958.561:1014): prog-id=95 op=UNLOAD
Feb  9 18:55:58.561000 audit: BPF prog-id=85 op=UNLOAD
Feb  9 18:55:58.561000 audit: BPF prog-id=95 op=UNLOAD
Feb  9 18:55:58.587223 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f77686d6d0194d9a8c298ad6a1f8cb84f5ec08a0d8b4fd0026a96fa50bc37a63-rootfs.mount: Deactivated successfully.
Feb  9 18:55:58.615138 env[1645]: time="2024-02-09T18:55:58.615085721Z" level=info msg="shim disconnected" id=f77686d6d0194d9a8c298ad6a1f8cb84f5ec08a0d8b4fd0026a96fa50bc37a63
Feb  9 18:55:58.615138 env[1645]: time="2024-02-09T18:55:58.615133428Z" level=warning msg="cleaning up after shim disconnected" id=f77686d6d0194d9a8c298ad6a1f8cb84f5ec08a0d8b4fd0026a96fa50bc37a63 namespace=k8s.io
Feb  9 18:55:58.615795 env[1645]: time="2024-02-09T18:55:58.615146885Z" level=info msg="cleaning up dead shim"
Feb  9 18:55:58.624998 env[1645]: time="2024-02-09T18:55:58.624952240Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:55:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2940 runtime=io.containerd.runc.v2\n"
Feb  9 18:55:58.974015 kubelet[2857]: I0209 18:55:58.973979    2857 scope.go:115] "RemoveContainer" containerID="f77686d6d0194d9a8c298ad6a1f8cb84f5ec08a0d8b4fd0026a96fa50bc37a63"
Feb  9 18:55:58.977357 env[1645]: time="2024-02-09T18:55:58.977250562Z" level=info msg="CreateContainer within sandbox \"e0fce0be23580ed4b1cbe03e16433b75017470b44aa10d4d05cfd309d2d5250e\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}"
Feb  9 18:55:59.005509 env[1645]: time="2024-02-09T18:55:59.005448132Z" level=info msg="CreateContainer within sandbox \"e0fce0be23580ed4b1cbe03e16433b75017470b44aa10d4d05cfd309d2d5250e\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"935e74d74f30a77331371c25384f81772ad569fa5f2d1c77565368b7a4ec2c8a\""
Feb  9 18:55:59.006153 env[1645]: time="2024-02-09T18:55:59.006118470Z" level=info msg="StartContainer for \"935e74d74f30a77331371c25384f81772ad569fa5f2d1c77565368b7a4ec2c8a\""
Feb  9 18:55:59.033035 systemd[1]: Started cri-containerd-935e74d74f30a77331371c25384f81772ad569fa5f2d1c77565368b7a4ec2c8a.scope.
Feb  9 18:55:59.050000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.050000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.060371 kernel: audit: type=1400 audit(1707504959.050:1015): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.060478 kernel: audit: type=1400 audit(1707504959.050:1016): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.050000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.064792 kernel: audit: type=1400 audit(1707504959.050:1017): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.050000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.069120 kernel: audit: type=1400 audit(1707504959.050:1018): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.069191 kernel: audit: type=1400 audit(1707504959.050:1019): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.050000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.050000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.079423 kernel: audit: type=1400 audit(1707504959.050:1020): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.050000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.089279 kernel: audit: type=1400 audit(1707504959.050:1021): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.089423 kernel: audit: type=1400 audit(1707504959.050:1022): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.050000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.050000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.050000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.050000 audit: BPF prog-id=115 op=LOAD
Feb  9 18:55:59.051000 audit[2960]: AVC avc:  denied  { bpf } for  pid=2960 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.051000 audit[2960]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2401 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:59.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933356537346437346633306137373333313337316332353338346638
Feb  9 18:55:59.051000 audit[2960]: AVC avc:  denied  { perfmon } for  pid=2960 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.051000 audit[2960]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2401 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:59.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933356537346437346633306137373333313337316332353338346638
Feb  9 18:55:59.051000 audit[2960]: AVC avc:  denied  { bpf } for  pid=2960 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.051000 audit[2960]: AVC avc:  denied  { bpf } for  pid=2960 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.051000 audit[2960]: AVC avc:  denied  { bpf } for  pid=2960 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.051000 audit[2960]: AVC avc:  denied  { perfmon } for  pid=2960 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.051000 audit[2960]: AVC avc:  denied  { perfmon } for  pid=2960 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.051000 audit[2960]: AVC avc:  denied  { perfmon } for  pid=2960 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.051000 audit[2960]: AVC avc:  denied  { perfmon } for  pid=2960 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.051000 audit[2960]: AVC avc:  denied  { perfmon } for  pid=2960 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.051000 audit[2960]: AVC avc:  denied  { bpf } for  pid=2960 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.051000 audit[2960]: AVC avc:  denied  { bpf } for  pid=2960 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.051000 audit: BPF prog-id=116 op=LOAD
Feb  9 18:55:59.051000 audit[2960]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003095f0 items=0 ppid=2401 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:59.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933356537346437346633306137373333313337316332353338346638
Feb  9 18:55:59.055000 audit[2960]: AVC avc:  denied  { bpf } for  pid=2960 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.055000 audit[2960]: AVC avc:  denied  { bpf } for  pid=2960 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.055000 audit[2960]: AVC avc:  denied  { perfmon } for  pid=2960 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.055000 audit[2960]: AVC avc:  denied  { perfmon } for  pid=2960 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.055000 audit[2960]: AVC avc:  denied  { perfmon } for  pid=2960 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.055000 audit[2960]: AVC avc:  denied  { perfmon } for  pid=2960 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.055000 audit[2960]: AVC avc:  denied  { perfmon } for  pid=2960 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.055000 audit[2960]: AVC avc:  denied  { bpf } for  pid=2960 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.055000 audit[2960]: AVC avc:  denied  { bpf } for  pid=2960 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.055000 audit: BPF prog-id=117 op=LOAD
Feb  9 18:55:59.055000 audit[2960]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000309638 items=0 ppid=2401 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:59.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933356537346437346633306137373333313337316332353338346638
Feb  9 18:55:59.059000 audit: BPF prog-id=117 op=UNLOAD
Feb  9 18:55:59.059000 audit: BPF prog-id=116 op=UNLOAD
Feb  9 18:55:59.059000 audit[2960]: AVC avc:  denied  { bpf } for  pid=2960 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.059000 audit[2960]: AVC avc:  denied  { bpf } for  pid=2960 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.059000 audit[2960]: AVC avc:  denied  { bpf } for  pid=2960 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.059000 audit[2960]: AVC avc:  denied  { perfmon } for  pid=2960 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.059000 audit[2960]: AVC avc:  denied  { perfmon } for  pid=2960 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.059000 audit[2960]: AVC avc:  denied  { perfmon } for  pid=2960 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.059000 audit[2960]: AVC avc:  denied  { perfmon } for  pid=2960 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.059000 audit[2960]: AVC avc:  denied  { perfmon } for  pid=2960 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.059000 audit[2960]: AVC avc:  denied  { bpf } for  pid=2960 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.059000 audit[2960]: AVC avc:  denied  { bpf } for  pid=2960 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:55:59.059000 audit: BPF prog-id=118 op=LOAD
Feb  9 18:55:59.059000 audit[2960]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000309a48 items=0 ppid=2401 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:55:59.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933356537346437346633306137373333313337316332353338346638
Feb  9 18:55:59.120406 env[1645]: time="2024-02-09T18:55:59.120348687Z" level=info msg="StartContainer for \"935e74d74f30a77331371c25384f81772ad569fa5f2d1c77565368b7a4ec2c8a\" returns successfully"
Feb  9 18:56:00.303000 audit[2971]: AVC avc:  denied  { watch } for  pid=2971 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 18:56:00.303000 audit[2971]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00043cf30 a2=fc6 a3=0 items=0 ppid=2401 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c827 key=(null)
Feb  9 18:56:00.303000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 18:56:00.303000 audit[2971]: AVC avc:  denied  { watch } for  pid=2971 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c827 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Feb  9 18:56:00.303000 audit[2971]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000156280 a2=fc6 a3=0 items=0 ppid=2401 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c827 key=(null)
Feb  9 18:56:00.303000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Feb  9 18:56:01.095409 kubelet[2857]: E0209 18:56:01.095127    2857 controller.go:189] failed to update lease, error: Put "https://172.31.23.165:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-23-165?timeout=10s": context deadline exceeded
Feb  9 18:56:01.160521 kubelet[2857]: E0209 18:56:01.160477    2857 kubelet_node_status.go:540] "Error updating node status, will retry" err="failed to patch status \"{\\\"status\\\":{\\\"$setElementOrder/conditions\\\":[{\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"type\\\":\\\"DiskPressure\\\"},{\\\"type\\\":\\\"PIDPressure\\\"},{\\\"type\\\":\\\"Ready\\\"}],\\\"allocatable\\\":{\\\"ephemeral-storage\\\":\\\"5078580011\\\"},\\\"conditions\\\":[{\\\"lastHeartbeatTime\\\":\\\"2024-02-09T18:55:51Z\\\",\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2024-02-09T18:55:51Z\\\",\\\"type\\\":\\\"DiskPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2024-02-09T18:55:51Z\\\",\\\"type\\\":\\\"PIDPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2024-02-09T18:55:51Z\\\",\\\"message\\\":\\\"container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized\\\",\\\"type\\\":\\\"Ready\\\"}]}}\" for node \"ip-172-31-23-165\": the server was unable to return a response in the time allotted, but may still be processing the request (patch nodes ip-172-31-23-165)"
Feb  9 18:56:02.298091 systemd[1]: cri-containerd-8dcf2440845557d371a143039c61e10b378fab54be1bae3c9e93bd1cf4285d49.scope: Deactivated successfully.
Feb  9 18:56:02.298469 systemd[1]: cri-containerd-8dcf2440845557d371a143039c61e10b378fab54be1bae3c9e93bd1cf4285d49.scope: Consumed 2.395s CPU time.
Feb  9 18:56:02.306000 audit: BPF prog-id=93 op=UNLOAD
Feb  9 18:56:02.306000 audit: BPF prog-id=113 op=UNLOAD
Feb  9 18:56:02.413605 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8dcf2440845557d371a143039c61e10b378fab54be1bae3c9e93bd1cf4285d49-rootfs.mount: Deactivated successfully.
Feb  9 18:56:02.436490 env[1645]: time="2024-02-09T18:56:02.436432945Z" level=info msg="shim disconnected" id=8dcf2440845557d371a143039c61e10b378fab54be1bae3c9e93bd1cf4285d49
Feb  9 18:56:02.436490 env[1645]: time="2024-02-09T18:56:02.436491395Z" level=warning msg="cleaning up after shim disconnected" id=8dcf2440845557d371a143039c61e10b378fab54be1bae3c9e93bd1cf4285d49 namespace=k8s.io
Feb  9 18:56:02.437382 env[1645]: time="2024-02-09T18:56:02.436503596Z" level=info msg="cleaning up dead shim"
Feb  9 18:56:02.447138 env[1645]: time="2024-02-09T18:56:02.447080742Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:56:02Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3000 runtime=io.containerd.runc.v2\n"
Feb  9 18:56:02.986565 kubelet[2857]: I0209 18:56:02.986535    2857 scope.go:115] "RemoveContainer" containerID="8dcf2440845557d371a143039c61e10b378fab54be1bae3c9e93bd1cf4285d49"
Feb  9 18:56:02.989244 env[1645]: time="2024-02-09T18:56:02.989202108Z" level=info msg="CreateContainer within sandbox \"5ab402d4cc0e6ce4f49d48bce79b5a54bb4b73a21a3e3026cf7d186f8aa3545a\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}"
Feb  9 18:56:03.018559 env[1645]: time="2024-02-09T18:56:03.018501665Z" level=info msg="CreateContainer within sandbox \"5ab402d4cc0e6ce4f49d48bce79b5a54bb4b73a21a3e3026cf7d186f8aa3545a\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"e0ac6105e0f26af45b0e7773187badb72d94332e8eec9babcf192078249ffca6\""
Feb  9 18:56:03.019462 env[1645]: time="2024-02-09T18:56:03.019376480Z" level=info msg="StartContainer for \"e0ac6105e0f26af45b0e7773187badb72d94332e8eec9babcf192078249ffca6\""
Feb  9 18:56:03.061584 systemd[1]: Started cri-containerd-e0ac6105e0f26af45b0e7773187badb72d94332e8eec9babcf192078249ffca6.scope.
Feb  9 18:56:03.078000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.078000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.078000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.078000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.078000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.078000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.078000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.078000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.078000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit: BPF prog-id=119 op=LOAD
Feb  9 18:56:03.079000 audit[3021]: AVC avc:  denied  { bpf } for  pid=3021 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit[3021]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2393 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:56:03.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530616336313035653066323661663435623065373737333138376261
Feb  9 18:56:03.079000 audit[3021]: AVC avc:  denied  { perfmon } for  pid=3021 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit[3021]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2393 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:56:03.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530616336313035653066323661663435623065373737333138376261
Feb  9 18:56:03.079000 audit[3021]: AVC avc:  denied  { bpf } for  pid=3021 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit[3021]: AVC avc:  denied  { bpf } for  pid=3021 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit[3021]: AVC avc:  denied  { bpf } for  pid=3021 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit[3021]: AVC avc:  denied  { perfmon } for  pid=3021 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit[3021]: AVC avc:  denied  { perfmon } for  pid=3021 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit[3021]: AVC avc:  denied  { perfmon } for  pid=3021 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit[3021]: AVC avc:  denied  { perfmon } for  pid=3021 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit[3021]: AVC avc:  denied  { perfmon } for  pid=3021 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit[3021]: AVC avc:  denied  { bpf } for  pid=3021 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit[3021]: AVC avc:  denied  { bpf } for  pid=3021 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit: BPF prog-id=120 op=LOAD
Feb  9 18:56:03.079000 audit[3021]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d55d0 items=0 ppid=2393 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:56:03.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530616336313035653066323661663435623065373737333138376261
Feb  9 18:56:03.079000 audit[3021]: AVC avc:  denied  { bpf } for  pid=3021 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit[3021]: AVC avc:  denied  { bpf } for  pid=3021 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit[3021]: AVC avc:  denied  { perfmon } for  pid=3021 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit[3021]: AVC avc:  denied  { perfmon } for  pid=3021 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit[3021]: AVC avc:  denied  { perfmon } for  pid=3021 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit[3021]: AVC avc:  denied  { perfmon } for  pid=3021 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit[3021]: AVC avc:  denied  { perfmon } for  pid=3021 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit[3021]: AVC avc:  denied  { bpf } for  pid=3021 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit[3021]: AVC avc:  denied  { bpf } for  pid=3021 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.079000 audit: BPF prog-id=121 op=LOAD
Feb  9 18:56:03.079000 audit[3021]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d5618 items=0 ppid=2393 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:56:03.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530616336313035653066323661663435623065373737333138376261
Feb  9 18:56:03.080000 audit: BPF prog-id=121 op=UNLOAD
Feb  9 18:56:03.080000 audit: BPF prog-id=120 op=UNLOAD
Feb  9 18:56:03.080000 audit[3021]: AVC avc:  denied  { bpf } for  pid=3021 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.080000 audit[3021]: AVC avc:  denied  { bpf } for  pid=3021 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.080000 audit[3021]: AVC avc:  denied  { bpf } for  pid=3021 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.080000 audit[3021]: AVC avc:  denied  { perfmon } for  pid=3021 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.080000 audit[3021]: AVC avc:  denied  { perfmon } for  pid=3021 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.080000 audit[3021]: AVC avc:  denied  { perfmon } for  pid=3021 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.080000 audit[3021]: AVC avc:  denied  { perfmon } for  pid=3021 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.080000 audit[3021]: AVC avc:  denied  { perfmon } for  pid=3021 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.080000 audit[3021]: AVC avc:  denied  { bpf } for  pid=3021 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.080000 audit[3021]: AVC avc:  denied  { bpf } for  pid=3021 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Feb  9 18:56:03.080000 audit: BPF prog-id=122 op=LOAD
Feb  9 18:56:03.080000 audit[3021]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d5a28 items=0 ppid=2393 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Feb  9 18:56:03.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530616336313035653066323661663435623065373737333138376261
Feb  9 18:56:03.119814 env[1645]: time="2024-02-09T18:56:03.119752940Z" level=info msg="StartContainer for \"e0ac6105e0f26af45b0e7773187badb72d94332e8eec9babcf192078249ffca6\" returns successfully"
Feb  9 18:56:03.414233 systemd[1]: run-containerd-runc-k8s.io-e0ac6105e0f26af45b0e7773187badb72d94332e8eec9babcf192078249ffca6-runc.reZyjJ.mount: Deactivated successfully.
Feb  9 18:56:11.096953 kubelet[2857]: E0209 18:56:11.096903    2857 controller.go:189] failed to update lease, error: Put "https://172.31.23.165:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-23-165?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers)
Feb  9 18:56:11.161430 kubelet[2857]: E0209 18:56:11.161310    2857 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"ip-172-31-23-165\": Get \"https://172.31.23.165:6443/api/v1/nodes/ip-172-31-23-165?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"