Feb 12 22:02:38.126950 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 22:02:38.127044 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 22:02:38.127148 kernel: BIOS-provided physical RAM map: Feb 12 22:02:38.127161 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 12 22:02:38.127172 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 12 22:02:38.127182 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 12 22:02:38.127198 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Feb 12 22:02:38.127210 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Feb 12 22:02:38.127223 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Feb 12 22:02:38.127235 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 12 22:02:38.127246 kernel: NX (Execute Disable) protection: active Feb 12 22:02:38.127258 kernel: SMBIOS 2.7 present. Feb 12 22:02:38.127270 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Feb 12 22:02:38.127282 kernel: Hypervisor detected: KVM Feb 12 22:02:38.127300 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 12 22:02:38.127314 kernel: kvm-clock: cpu 0, msr 44faa001, primary cpu clock Feb 12 22:02:38.127327 kernel: kvm-clock: using sched offset of 6728949103 cycles Feb 12 22:02:38.127390 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 12 22:02:38.127405 kernel: tsc: Detected 2500.004 MHz processor Feb 12 22:02:38.127420 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 22:02:38.127436 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 22:02:38.127449 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Feb 12 22:02:38.127462 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 22:02:38.127475 kernel: Using GB pages for direct mapping Feb 12 22:02:38.127489 kernel: ACPI: Early table checksum verification disabled Feb 12 22:02:38.127503 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Feb 12 22:02:38.127517 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Feb 12 22:02:38.127529 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Feb 12 22:02:38.127542 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Feb 12 22:02:38.127560 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Feb 12 22:02:38.127591 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Feb 12 22:02:38.127605 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Feb 12 22:02:38.127618 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Feb 12 22:02:38.127632 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Feb 12 22:02:38.127645 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Feb 12 22:02:38.127658 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Feb 12 22:02:38.127671 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Feb 12 22:02:38.127688 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Feb 12 22:02:38.127702 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Feb 12 22:02:38.127715 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Feb 12 22:02:38.127734 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Feb 12 22:02:38.127748 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Feb 12 22:02:38.127763 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Feb 12 22:02:38.127777 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Feb 12 22:02:38.127794 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Feb 12 22:02:38.127807 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Feb 12 22:02:38.127821 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Feb 12 22:02:38.127835 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 12 22:02:38.127850 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 12 22:02:38.127865 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Feb 12 22:02:38.127880 kernel: NUMA: Initialized distance table, cnt=1 Feb 12 22:02:38.127986 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Feb 12 22:02:38.128006 kernel: Zone ranges: Feb 12 22:02:38.128020 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 22:02:38.128036 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Feb 12 22:02:38.128051 kernel: Normal empty Feb 12 22:02:38.128066 kernel: Movable zone start for each node Feb 12 22:02:38.128081 kernel: Early memory node ranges Feb 12 22:02:38.128096 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 12 22:02:38.128117 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Feb 12 22:02:38.128131 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Feb 12 22:02:38.128148 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 22:02:38.128162 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 12 22:02:38.128176 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Feb 12 22:02:38.128190 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 12 22:02:38.128205 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 12 22:02:38.128219 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Feb 12 22:02:38.128233 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 12 22:02:38.128248 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 22:02:38.128262 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 12 22:02:38.128279 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 12 22:02:38.128294 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 22:02:38.128308 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 12 22:02:38.128322 kernel: TSC deadline timer available Feb 12 22:02:38.128335 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 12 22:02:38.128349 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Feb 12 22:02:38.128363 kernel: Booting paravirtualized kernel on KVM Feb 12 22:02:38.128378 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 22:02:38.128392 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 12 22:02:38.128409 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 12 22:02:38.128423 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 12 22:02:38.128437 kernel: pcpu-alloc: [0] 0 1 Feb 12 22:02:38.128451 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Feb 12 22:02:38.128465 kernel: kvm-guest: PV spinlocks enabled Feb 12 22:02:38.128480 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 12 22:02:38.128494 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Feb 12 22:02:38.128508 kernel: Policy zone: DMA32 Feb 12 22:02:38.128525 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 22:02:38.128542 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 22:02:38.128556 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 22:02:38.128597 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 22:02:38.128611 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 22:02:38.128625 kernel: Memory: 1936476K/2057760K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121024K reserved, 0K cma-reserved) Feb 12 22:02:38.128638 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 22:02:38.128652 kernel: Kernel/User page tables isolation: enabled Feb 12 22:02:38.128665 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 22:02:38.128682 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 22:02:38.128697 kernel: rcu: Hierarchical RCU implementation. Feb 12 22:02:38.128711 kernel: rcu: RCU event tracing is enabled. Feb 12 22:02:38.128726 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 22:02:38.128740 kernel: Rude variant of Tasks RCU enabled. Feb 12 22:02:38.128754 kernel: Tracing variant of Tasks RCU enabled. Feb 12 22:02:38.128768 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 22:02:38.128783 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 22:02:38.128847 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 12 22:02:38.128867 kernel: random: crng init done Feb 12 22:02:38.128881 kernel: Console: colour VGA+ 80x25 Feb 12 22:02:38.128895 kernel: printk: console [ttyS0] enabled Feb 12 22:02:38.128909 kernel: ACPI: Core revision 20210730 Feb 12 22:02:38.128923 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Feb 12 22:02:38.128938 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 22:02:38.128952 kernel: x2apic enabled Feb 12 22:02:38.128966 kernel: Switched APIC routing to physical x2apic. Feb 12 22:02:38.128980 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093d6e846, max_idle_ns: 440795249997 ns Feb 12 22:02:38.128997 kernel: Calibrating delay loop (skipped) preset value.. 5000.00 BogoMIPS (lpj=2500004) Feb 12 22:02:38.129011 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 12 22:02:38.129026 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 12 22:02:38.129040 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 22:02:38.129065 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 22:02:38.129082 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 22:02:38.129096 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 22:02:38.129111 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Feb 12 22:02:38.129126 kernel: RETBleed: Vulnerable Feb 12 22:02:38.129140 kernel: Speculative Store Bypass: Vulnerable Feb 12 22:02:38.129155 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 22:02:38.129169 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 22:02:38.129183 kernel: GDS: Unknown: Dependent on hypervisor status Feb 12 22:02:38.129198 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 22:02:38.129216 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 22:02:38.129231 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 22:02:38.129245 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 12 22:02:38.129259 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 12 22:02:38.129273 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Feb 12 22:02:38.129290 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Feb 12 22:02:38.129305 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Feb 12 22:02:38.129320 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Feb 12 22:02:38.129336 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 22:02:38.129350 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 12 22:02:38.129365 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 12 22:02:38.129380 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Feb 12 22:02:38.129395 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Feb 12 22:02:38.129410 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Feb 12 22:02:38.129425 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Feb 12 22:02:38.129440 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Feb 12 22:02:38.129455 kernel: Freeing SMP alternatives memory: 32K Feb 12 22:02:38.129473 kernel: pid_max: default: 32768 minimum: 301 Feb 12 22:02:38.129487 kernel: LSM: Security Framework initializing Feb 12 22:02:38.129502 kernel: SELinux: Initializing. Feb 12 22:02:38.129517 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 22:02:38.129532 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 22:02:38.129546 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Feb 12 22:02:38.129578 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Feb 12 22:02:38.129591 kernel: signal: max sigframe size: 3632 Feb 12 22:02:38.129604 kernel: rcu: Hierarchical SRCU implementation. Feb 12 22:02:38.129617 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 12 22:02:38.129632 kernel: smp: Bringing up secondary CPUs ... Feb 12 22:02:38.129646 kernel: x86: Booting SMP configuration: Feb 12 22:02:38.129660 kernel: .... node #0, CPUs: #1 Feb 12 22:02:38.129672 kernel: kvm-clock: cpu 1, msr 44faa041, secondary cpu clock Feb 12 22:02:38.129684 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Feb 12 22:02:38.129697 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Feb 12 22:02:38.129711 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 12 22:02:38.129724 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 22:02:38.129737 kernel: smpboot: Max logical packages: 1 Feb 12 22:02:38.129754 kernel: smpboot: Total of 2 processors activated (10000.01 BogoMIPS) Feb 12 22:02:38.129768 kernel: devtmpfs: initialized Feb 12 22:02:38.129782 kernel: x86/mm: Memory block size: 128MB Feb 12 22:02:38.129796 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 22:02:38.129811 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 22:02:38.129825 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 22:02:38.129838 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 22:02:38.129852 kernel: audit: initializing netlink subsys (disabled) Feb 12 22:02:38.129973 kernel: audit: type=2000 audit(1707775356.885:1): state=initialized audit_enabled=0 res=1 Feb 12 22:02:38.129993 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 22:02:38.130008 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 22:02:38.130021 kernel: cpuidle: using governor menu Feb 12 22:02:38.130034 kernel: ACPI: bus type PCI registered Feb 12 22:02:38.130047 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 22:02:38.130061 kernel: dca service started, version 1.12.1 Feb 12 22:02:38.130074 kernel: PCI: Using configuration type 1 for base access Feb 12 22:02:38.130087 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 22:02:38.130101 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 22:02:38.130119 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 22:02:38.130131 kernel: ACPI: Added _OSI(Module Device) Feb 12 22:02:38.130145 kernel: ACPI: Added _OSI(Processor Device) Feb 12 22:02:38.130160 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 22:02:38.130175 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 22:02:38.130189 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 22:02:38.130202 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 22:02:38.130216 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 22:02:38.130231 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Feb 12 22:02:38.130249 kernel: ACPI: Interpreter enabled Feb 12 22:02:38.130261 kernel: ACPI: PM: (supports S0 S5) Feb 12 22:02:38.130274 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 22:02:38.130287 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 22:02:38.130300 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Feb 12 22:02:38.130312 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 22:02:38.130707 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 12 22:02:38.130923 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 12 22:02:38.130952 kernel: acpiphp: Slot [3] registered Feb 12 22:02:38.130967 kernel: acpiphp: Slot [4] registered Feb 12 22:02:38.130982 kernel: acpiphp: Slot [5] registered Feb 12 22:02:38.130997 kernel: acpiphp: Slot [6] registered Feb 12 22:02:38.131012 kernel: acpiphp: Slot [7] registered Feb 12 22:02:38.131027 kernel: acpiphp: Slot [8] registered Feb 12 22:02:38.131041 kernel: acpiphp: Slot [9] registered Feb 12 22:02:38.131056 kernel: acpiphp: Slot [10] registered Feb 12 22:02:38.131072 kernel: acpiphp: Slot [11] registered Feb 12 22:02:38.131090 kernel: acpiphp: Slot [12] registered Feb 12 22:02:38.131105 kernel: acpiphp: Slot [13] registered Feb 12 22:02:38.131120 kernel: acpiphp: Slot [14] registered Feb 12 22:02:38.131134 kernel: acpiphp: Slot [15] registered Feb 12 22:02:38.131149 kernel: acpiphp: Slot [16] registered Feb 12 22:02:38.131164 kernel: acpiphp: Slot [17] registered Feb 12 22:02:38.131179 kernel: acpiphp: Slot [18] registered Feb 12 22:02:38.131194 kernel: acpiphp: Slot [19] registered Feb 12 22:02:38.131209 kernel: acpiphp: Slot [20] registered Feb 12 22:02:38.131226 kernel: acpiphp: Slot [21] registered Feb 12 22:02:38.131240 kernel: acpiphp: Slot [22] registered Feb 12 22:02:38.131255 kernel: acpiphp: Slot [23] registered Feb 12 22:02:38.131270 kernel: acpiphp: Slot [24] registered Feb 12 22:02:38.131285 kernel: acpiphp: Slot [25] registered Feb 12 22:02:38.131299 kernel: acpiphp: Slot [26] registered Feb 12 22:02:38.131313 kernel: acpiphp: Slot [27] registered Feb 12 22:02:38.131325 kernel: acpiphp: Slot [28] registered Feb 12 22:02:38.131339 kernel: acpiphp: Slot [29] registered Feb 12 22:02:38.131353 kernel: acpiphp: Slot [30] registered Feb 12 22:02:38.131370 kernel: acpiphp: Slot [31] registered Feb 12 22:02:38.131385 kernel: PCI host bridge to bus 0000:00 Feb 12 22:02:38.131518 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 22:02:38.131651 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 22:02:38.131766 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 22:02:38.131879 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 12 22:02:38.131990 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 22:02:38.132146 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 12 22:02:38.132285 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 12 22:02:38.132520 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Feb 12 22:02:38.132667 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 12 22:02:38.132841 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Feb 12 22:02:38.132979 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Feb 12 22:02:38.133106 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Feb 12 22:02:38.133238 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Feb 12 22:02:38.133365 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Feb 12 22:02:38.133489 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Feb 12 22:02:38.133628 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Feb 12 22:02:38.133766 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Feb 12 22:02:38.133895 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Feb 12 22:02:38.134024 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Feb 12 22:02:38.134358 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 22:02:38.134506 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Feb 12 22:02:38.134656 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Feb 12 22:02:38.134788 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Feb 12 22:02:38.134917 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Feb 12 22:02:38.134935 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 12 22:02:38.134952 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 12 22:02:38.134963 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 22:02:38.134976 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 12 22:02:38.134990 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 12 22:02:38.135003 kernel: iommu: Default domain type: Translated Feb 12 22:02:38.135016 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 22:02:38.135221 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Feb 12 22:02:38.135343 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 22:02:38.135463 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Feb 12 22:02:38.135483 kernel: vgaarb: loaded Feb 12 22:02:38.135497 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 22:02:38.135511 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 22:02:38.135524 kernel: PTP clock support registered Feb 12 22:02:38.135538 kernel: PCI: Using ACPI for IRQ routing Feb 12 22:02:38.135551 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 22:02:38.135578 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 12 22:02:38.135592 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Feb 12 22:02:38.135608 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 12 22:02:38.135622 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Feb 12 22:02:38.135635 kernel: clocksource: Switched to clocksource kvm-clock Feb 12 22:02:38.135649 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 22:02:38.135663 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 22:02:38.135677 kernel: pnp: PnP ACPI init Feb 12 22:02:38.135690 kernel: pnp: PnP ACPI: found 5 devices Feb 12 22:02:38.135704 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 22:02:38.135717 kernel: NET: Registered PF_INET protocol family Feb 12 22:02:38.135734 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 22:02:38.135747 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 12 22:02:38.135761 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 22:02:38.135774 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 22:02:38.135787 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 12 22:02:38.135801 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 12 22:02:38.135814 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 22:02:38.135827 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 22:02:38.135840 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 22:02:38.135856 kernel: NET: Registered PF_XDP protocol family Feb 12 22:02:38.135965 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 22:02:38.136074 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 22:02:38.136188 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 22:02:38.136292 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 12 22:02:38.136411 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 22:02:38.136525 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 12 22:02:38.136546 kernel: PCI: CLS 0 bytes, default 64 Feb 12 22:02:38.136558 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 12 22:02:38.137648 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093d6e846, max_idle_ns: 440795249997 ns Feb 12 22:02:38.137671 kernel: clocksource: Switched to clocksource tsc Feb 12 22:02:38.137687 kernel: Initialise system trusted keyrings Feb 12 22:02:38.137703 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 12 22:02:38.137719 kernel: Key type asymmetric registered Feb 12 22:02:38.137733 kernel: Asymmetric key parser 'x509' registered Feb 12 22:02:38.137748 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 22:02:38.137768 kernel: io scheduler mq-deadline registered Feb 12 22:02:38.137783 kernel: io scheduler kyber registered Feb 12 22:02:38.137798 kernel: io scheduler bfq registered Feb 12 22:02:38.137814 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 22:02:38.137829 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 22:02:38.137845 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 22:02:38.137860 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 12 22:02:38.137875 kernel: i8042: Warning: Keylock active Feb 12 22:02:38.137889 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 22:02:38.137908 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 22:02:38.138063 kernel: rtc_cmos 00:00: RTC can wake from S4 Feb 12 22:02:38.138186 kernel: rtc_cmos 00:00: registered as rtc0 Feb 12 22:02:38.138303 kernel: rtc_cmos 00:00: setting system clock to 2024-02-12T22:02:37 UTC (1707775357) Feb 12 22:02:38.138441 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Feb 12 22:02:38.138460 kernel: intel_pstate: CPU model not supported Feb 12 22:02:38.138474 kernel: NET: Registered PF_INET6 protocol family Feb 12 22:02:38.138488 kernel: Segment Routing with IPv6 Feb 12 22:02:38.138506 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 22:02:38.138521 kernel: NET: Registered PF_PACKET protocol family Feb 12 22:02:38.138537 kernel: Key type dns_resolver registered Feb 12 22:02:38.138551 kernel: IPI shorthand broadcast: enabled Feb 12 22:02:38.138580 kernel: sched_clock: Marking stable (497409452, 349701017)->(1019611576, -172501107) Feb 12 22:02:38.138595 kernel: registered taskstats version 1 Feb 12 22:02:38.138610 kernel: Loading compiled-in X.509 certificates Feb 12 22:02:38.138626 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 22:02:38.138640 kernel: Key type .fscrypt registered Feb 12 22:02:38.138658 kernel: Key type fscrypt-provisioning registered Feb 12 22:02:38.138673 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 22:02:38.138688 kernel: ima: Allocated hash algorithm: sha1 Feb 12 22:02:38.138704 kernel: ima: No architecture policies found Feb 12 22:02:38.138719 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 22:02:38.138735 kernel: Write protecting the kernel read-only data: 28672k Feb 12 22:02:38.138750 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 22:02:38.138765 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 22:02:38.138781 kernel: Run /init as init process Feb 12 22:02:38.138798 kernel: with arguments: Feb 12 22:02:38.138813 kernel: /init Feb 12 22:02:38.138827 kernel: with environment: Feb 12 22:02:38.138842 kernel: HOME=/ Feb 12 22:02:38.138856 kernel: TERM=linux Feb 12 22:02:38.138871 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 22:02:38.138890 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 22:02:38.138908 systemd[1]: Detected virtualization amazon. Feb 12 22:02:38.138927 systemd[1]: Detected architecture x86-64. Feb 12 22:02:38.138943 systemd[1]: Running in initrd. Feb 12 22:02:38.138958 systemd[1]: No hostname configured, using default hostname. Feb 12 22:02:38.138974 systemd[1]: Hostname set to . Feb 12 22:02:38.139008 systemd[1]: Initializing machine ID from VM UUID. Feb 12 22:02:38.139027 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 22:02:38.139044 systemd[1]: Queued start job for default target initrd.target. Feb 12 22:02:38.139060 systemd[1]: Started systemd-ask-password-console.path. Feb 12 22:02:38.139076 systemd[1]: Reached target cryptsetup.target. Feb 12 22:02:38.139091 systemd[1]: Reached target paths.target. Feb 12 22:02:38.139108 systemd[1]: Reached target slices.target. Feb 12 22:02:38.139124 systemd[1]: Reached target swap.target. Feb 12 22:02:38.139140 systemd[1]: Reached target timers.target. Feb 12 22:02:38.139161 systemd[1]: Listening on iscsid.socket. Feb 12 22:02:38.139177 systemd[1]: Listening on iscsiuio.socket. Feb 12 22:02:38.139194 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 22:02:38.139211 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 22:02:38.139227 systemd[1]: Listening on systemd-journald.socket. Feb 12 22:02:38.139246 systemd[1]: Listening on systemd-networkd.socket. Feb 12 22:02:38.139262 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 22:02:38.139279 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 22:02:38.139295 systemd[1]: Reached target sockets.target. Feb 12 22:02:38.139314 systemd[1]: Starting kmod-static-nodes.service... Feb 12 22:02:38.139330 systemd[1]: Finished network-cleanup.service. Feb 12 22:02:38.139347 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 22:02:38.139364 systemd[1]: Starting systemd-journald.service... Feb 12 22:02:38.139380 systemd[1]: Starting systemd-modules-load.service... Feb 12 22:02:38.139396 systemd[1]: Starting systemd-resolved.service... Feb 12 22:02:38.139414 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 22:02:38.139442 systemd-journald[185]: Journal started Feb 12 22:02:38.139518 systemd-journald[185]: Runtime Journal (/run/log/journal/ec2b1f2c1eee6fa4d39132887d699305) is 4.8M, max 38.7M, 33.9M free. Feb 12 22:02:38.143582 systemd[1]: Started systemd-journald.service. Feb 12 22:02:38.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:38.151122 systemd-modules-load[186]: Inserted module 'overlay' Feb 12 22:02:38.152654 kernel: audit: type=1130 audit(1707775358.145:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:38.152728 systemd[1]: Finished kmod-static-nodes.service. Feb 12 22:02:38.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:38.161580 kernel: audit: type=1130 audit(1707775358.156:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:38.161684 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 22:02:38.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:38.172187 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 22:02:38.173867 kernel: audit: type=1130 audit(1707775358.163:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:38.198595 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 22:02:38.199378 systemd-modules-load[186]: Inserted module 'br_netfilter' Feb 12 22:02:38.342416 kernel: Bridge firewalling registered Feb 12 22:02:38.342454 kernel: SCSI subsystem initialized Feb 12 22:02:38.342474 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 22:02:38.342492 kernel: device-mapper: uevent: version 1.0.3 Feb 12 22:02:38.342507 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 22:02:38.202870 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 22:02:38.244836 systemd-resolved[187]: Positive Trust Anchors: Feb 12 22:02:38.244850 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 22:02:38.244899 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 22:02:38.252732 systemd-resolved[187]: Defaulting to hostname 'linux'. Feb 12 22:02:38.266851 systemd-modules-load[186]: Inserted module 'dm_multipath' Feb 12 22:02:38.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:38.356239 systemd[1]: Started systemd-resolved.service. Feb 12 22:02:38.364170 kernel: audit: type=1130 audit(1707775358.355:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:38.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:38.364410 systemd[1]: Finished systemd-modules-load.service. Feb 12 22:02:38.375280 kernel: audit: type=1130 audit(1707775358.363:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:38.375306 kernel: audit: type=1130 audit(1707775358.369:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:38.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:38.375471 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 22:02:38.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:38.378103 systemd[1]: Reached target nss-lookup.target. Feb 12 22:02:38.383589 kernel: audit: type=1130 audit(1707775358.377:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:38.386101 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 22:02:38.392742 systemd[1]: Starting systemd-sysctl.service... Feb 12 22:02:38.405438 systemd[1]: Finished systemd-sysctl.service. Feb 12 22:02:38.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:38.410581 kernel: audit: type=1130 audit(1707775358.404:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:38.416692 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 22:02:38.418853 systemd[1]: Starting dracut-cmdline.service... Feb 12 22:02:38.426353 kernel: audit: type=1130 audit(1707775358.417:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:38.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:38.432761 dracut-cmdline[207]: dracut-dracut-053 Feb 12 22:02:38.436970 dracut-cmdline[207]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 22:02:38.524593 kernel: Loading iSCSI transport class v2.0-870. Feb 12 22:02:38.540588 kernel: iscsi: registered transport (tcp) Feb 12 22:02:38.567997 kernel: iscsi: registered transport (qla4xxx) Feb 12 22:02:38.568203 kernel: QLogic iSCSI HBA Driver Feb 12 22:02:38.611531 systemd[1]: Finished dracut-cmdline.service. Feb 12 22:02:38.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:38.615793 systemd[1]: Starting dracut-pre-udev.service... Feb 12 22:02:38.689626 kernel: raid6: avx512x4 gen() 9155 MB/s Feb 12 22:02:38.709621 kernel: raid6: avx512x4 xor() 2939 MB/s Feb 12 22:02:38.727624 kernel: raid6: avx512x2 gen() 4853 MB/s Feb 12 22:02:38.746856 kernel: raid6: avx512x2 xor() 12300 MB/s Feb 12 22:02:38.765891 kernel: raid6: avx512x1 gen() 7555 MB/s Feb 12 22:02:38.784806 kernel: raid6: avx512x1 xor() 7205 MB/s Feb 12 22:02:38.802664 kernel: raid6: avx2x4 gen() 13059 MB/s Feb 12 22:02:38.819620 kernel: raid6: avx2x4 xor() 3567 MB/s Feb 12 22:02:38.837613 kernel: raid6: avx2x2 gen() 12257 MB/s Feb 12 22:02:38.855615 kernel: raid6: avx2x2 xor() 14381 MB/s Feb 12 22:02:38.873782 kernel: raid6: avx2x1 gen() 8554 MB/s Feb 12 22:02:38.891619 kernel: raid6: avx2x1 xor() 11776 MB/s Feb 12 22:02:38.910622 kernel: raid6: sse2x4 gen() 3789 MB/s Feb 12 22:02:38.932759 kernel: raid6: sse2x4 xor() 3331 MB/s Feb 12 22:02:38.951671 kernel: raid6: sse2x2 gen() 4617 MB/s Feb 12 22:02:38.968753 kernel: raid6: sse2x2 xor() 4210 MB/s Feb 12 22:02:38.986619 kernel: raid6: sse2x1 gen() 5414 MB/s Feb 12 22:02:39.007384 kernel: raid6: sse2x1 xor() 2963 MB/s Feb 12 22:02:39.007460 kernel: raid6: using algorithm avx2x4 gen() 13059 MB/s Feb 12 22:02:39.007479 kernel: raid6: .... xor() 3567 MB/s, rmw enabled Feb 12 22:02:39.008575 kernel: raid6: using avx512x2 recovery algorithm Feb 12 22:02:39.032622 kernel: xor: automatically using best checksumming function avx Feb 12 22:02:39.171596 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 22:02:39.181302 systemd[1]: Finished dracut-pre-udev.service. Feb 12 22:02:39.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.183000 audit: BPF prog-id=7 op=LOAD Feb 12 22:02:39.183000 audit: BPF prog-id=8 op=LOAD Feb 12 22:02:39.184284 systemd[1]: Starting systemd-udevd.service... Feb 12 22:02:39.200369 systemd-udevd[385]: Using default interface naming scheme 'v252'. Feb 12 22:02:39.208549 systemd[1]: Started systemd-udevd.service. Feb 12 22:02:39.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.211692 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 22:02:39.240875 dracut-pre-trigger[389]: rd.md=0: removing MD RAID activation Feb 12 22:02:39.290041 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 22:02:39.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.291215 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 22:02:39.347555 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 22:02:39.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:39.440594 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 22:02:39.456313 kernel: nvme nvme0: pci function 0000:00:04.0 Feb 12 22:02:39.456602 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 12 22:02:39.464586 kernel: nvme nvme0: 2/0/0 default/read/poll queues Feb 12 22:02:39.470593 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 22:02:39.470662 kernel: GPT:9289727 != 16777215 Feb 12 22:02:39.470682 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 22:02:39.470699 kernel: GPT:9289727 != 16777215 Feb 12 22:02:39.470715 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 22:02:39.470729 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 22:02:39.483624 kernel: ena 0000:00:05.0: ENA device version: 0.10 Feb 12 22:02:39.483995 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Feb 12 22:02:39.485597 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Feb 12 22:02:39.489799 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:8f:11:33:fb:4f Feb 12 22:02:39.492453 (udev-worker)[438]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:02:39.697451 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 22:02:39.697495 kernel: AES CTR mode by8 optimization enabled Feb 12 22:02:39.697514 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (434) Feb 12 22:02:39.680337 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 22:02:39.705911 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 22:02:39.719723 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 22:02:39.728017 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 22:02:39.728149 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 22:02:39.733479 systemd[1]: Starting disk-uuid.service... Feb 12 22:02:39.739544 disk-uuid[594]: Primary Header is updated. Feb 12 22:02:39.739544 disk-uuid[594]: Secondary Entries is updated. Feb 12 22:02:39.739544 disk-uuid[594]: Secondary Header is updated. Feb 12 22:02:39.747591 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 22:02:39.751815 kernel: GPT:disk_guids don't match. Feb 12 22:02:39.751872 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 22:02:39.751890 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 22:02:39.759581 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 22:02:40.758623 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 22:02:40.759349 disk-uuid[595]: The operation has completed successfully. Feb 12 22:02:40.927530 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 22:02:40.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:40.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:40.927753 systemd[1]: Finished disk-uuid.service. Feb 12 22:02:40.936186 systemd[1]: Starting verity-setup.service... Feb 12 22:02:40.964613 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 12 22:02:41.059479 systemd[1]: Found device dev-mapper-usr.device. Feb 12 22:02:41.063521 systemd[1]: Mounting sysusr-usr.mount... Feb 12 22:02:41.068429 systemd[1]: Finished verity-setup.service. Feb 12 22:02:41.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:41.193044 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 22:02:41.193643 systemd[1]: Mounted sysusr-usr.mount. Feb 12 22:02:41.194028 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 22:02:41.195424 systemd[1]: Starting ignition-setup.service... Feb 12 22:02:41.209215 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 22:02:41.250574 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 12 22:02:41.250754 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 12 22:02:41.250870 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 12 22:02:41.266956 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 12 22:02:41.286382 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 22:02:41.308738 systemd[1]: Finished ignition-setup.service. Feb 12 22:02:41.312163 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 22:02:41.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:41.331503 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 22:02:41.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:41.334000 audit: BPF prog-id=9 op=LOAD Feb 12 22:02:41.335607 systemd[1]: Starting systemd-networkd.service... Feb 12 22:02:41.364960 systemd-networkd[1106]: lo: Link UP Feb 12 22:02:41.364973 systemd-networkd[1106]: lo: Gained carrier Feb 12 22:02:41.367686 systemd-networkd[1106]: Enumeration completed Feb 12 22:02:41.367813 systemd[1]: Started systemd-networkd.service. Feb 12 22:02:41.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:41.370985 systemd-networkd[1106]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 22:02:41.371218 systemd[1]: Reached target network.target. Feb 12 22:02:41.377713 systemd[1]: Starting iscsiuio.service... Feb 12 22:02:41.382461 systemd-networkd[1106]: eth0: Link UP Feb 12 22:02:41.383673 systemd-networkd[1106]: eth0: Gained carrier Feb 12 22:02:41.387993 systemd[1]: Started iscsiuio.service. Feb 12 22:02:41.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:41.391153 systemd[1]: Starting iscsid.service... Feb 12 22:02:41.396478 iscsid[1111]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 22:02:41.396478 iscsid[1111]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 22:02:41.396478 iscsid[1111]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 22:02:41.396478 iscsid[1111]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 22:02:41.409477 iscsid[1111]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 22:02:41.409477 iscsid[1111]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 22:02:41.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:41.406688 systemd[1]: Started iscsid.service. Feb 12 22:02:41.412110 systemd[1]: Starting dracut-initqueue.service... Feb 12 22:02:41.413942 systemd-networkd[1106]: eth0: DHCPv4 address 172.31.25.29/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 12 22:02:41.439721 systemd[1]: Finished dracut-initqueue.service. Feb 12 22:02:41.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:41.443252 systemd[1]: Reached target remote-fs-pre.target. Feb 12 22:02:41.445409 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 22:02:41.447771 systemd[1]: Reached target remote-fs.target. Feb 12 22:02:41.450539 systemd[1]: Starting dracut-pre-mount.service... Feb 12 22:02:41.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:41.475881 systemd[1]: Finished dracut-pre-mount.service. Feb 12 22:02:41.725865 ignition[1092]: Ignition 2.14.0 Feb 12 22:02:41.725882 ignition[1092]: Stage: fetch-offline Feb 12 22:02:41.726065 ignition[1092]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:02:41.726110 ignition[1092]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:02:41.746758 ignition[1092]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:02:41.748613 ignition[1092]: Ignition finished successfully Feb 12 22:02:41.751641 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 22:02:41.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:41.754943 systemd[1]: Starting ignition-fetch.service... Feb 12 22:02:41.766130 ignition[1130]: Ignition 2.14.0 Feb 12 22:02:41.766143 ignition[1130]: Stage: fetch Feb 12 22:02:41.766292 ignition[1130]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:02:41.766460 ignition[1130]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:02:41.774972 ignition[1130]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:02:41.778837 ignition[1130]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:02:41.788846 ignition[1130]: INFO : PUT result: OK Feb 12 22:02:41.792440 ignition[1130]: DEBUG : parsed url from cmdline: "" Feb 12 22:02:41.792440 ignition[1130]: INFO : no config URL provided Feb 12 22:02:41.792440 ignition[1130]: INFO : reading system config file "/usr/lib/ignition/user.ign" Feb 12 22:02:41.792440 ignition[1130]: INFO : no config at "/usr/lib/ignition/user.ign" Feb 12 22:02:41.798096 ignition[1130]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:02:41.798096 ignition[1130]: INFO : PUT result: OK Feb 12 22:02:41.798096 ignition[1130]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Feb 12 22:02:41.802154 ignition[1130]: INFO : GET result: OK Feb 12 22:02:41.802154 ignition[1130]: DEBUG : parsing config with SHA512: 587d54b9850f11830039a081f49a878292e52ebf9b61871935b63c363d1ee97d8680d80521e8eed305841ad732966c044040d1417fb000ae8320c432b2bb7b7e Feb 12 22:02:41.851066 unknown[1130]: fetched base config from "system" Feb 12 22:02:41.851250 unknown[1130]: fetched base config from "system" Feb 12 22:02:41.851257 unknown[1130]: fetched user config from "aws" Feb 12 22:02:41.853747 ignition[1130]: fetch: fetch complete Feb 12 22:02:41.853764 ignition[1130]: fetch: fetch passed Feb 12 22:02:41.853897 ignition[1130]: Ignition finished successfully Feb 12 22:02:41.861560 systemd[1]: Finished ignition-fetch.service. Feb 12 22:02:41.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:41.864086 systemd[1]: Starting ignition-kargs.service... Feb 12 22:02:41.880040 ignition[1136]: Ignition 2.14.0 Feb 12 22:02:41.880057 ignition[1136]: Stage: kargs Feb 12 22:02:41.880497 ignition[1136]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:02:41.880531 ignition[1136]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:02:41.889354 ignition[1136]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:02:41.891269 ignition[1136]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:02:41.894315 ignition[1136]: INFO : PUT result: OK Feb 12 22:02:41.898305 ignition[1136]: kargs: kargs passed Feb 12 22:02:41.898501 ignition[1136]: Ignition finished successfully Feb 12 22:02:41.901412 systemd[1]: Finished ignition-kargs.service. Feb 12 22:02:41.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:41.903493 systemd[1]: Starting ignition-disks.service... Feb 12 22:02:41.913744 ignition[1142]: Ignition 2.14.0 Feb 12 22:02:41.913754 ignition[1142]: Stage: disks Feb 12 22:02:41.913903 ignition[1142]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:02:41.913926 ignition[1142]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:02:41.921718 ignition[1142]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:02:41.923335 ignition[1142]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:02:41.925485 ignition[1142]: INFO : PUT result: OK Feb 12 22:02:41.929246 ignition[1142]: disks: disks passed Feb 12 22:02:41.929324 ignition[1142]: Ignition finished successfully Feb 12 22:02:41.932079 systemd[1]: Finished ignition-disks.service. Feb 12 22:02:41.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:41.933285 systemd[1]: Reached target initrd-root-device.target. Feb 12 22:02:41.934798 systemd[1]: Reached target local-fs-pre.target. Feb 12 22:02:41.937238 systemd[1]: Reached target local-fs.target. Feb 12 22:02:41.938022 systemd[1]: Reached target sysinit.target. Feb 12 22:02:41.938318 systemd[1]: Reached target basic.target. Feb 12 22:02:41.940281 systemd[1]: Starting systemd-fsck-root.service... Feb 12 22:02:41.971500 systemd-fsck[1150]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 12 22:02:41.989442 systemd[1]: Finished systemd-fsck-root.service. Feb 12 22:02:41.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:41.992764 systemd[1]: Mounting sysroot.mount... Feb 12 22:02:42.015639 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 22:02:42.020560 systemd[1]: Mounted sysroot.mount. Feb 12 22:02:42.020795 systemd[1]: Reached target initrd-root-fs.target. Feb 12 22:02:42.029809 systemd[1]: Mounting sysroot-usr.mount... Feb 12 22:02:42.032669 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 22:02:42.032746 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 22:02:42.032787 systemd[1]: Reached target ignition-diskful.target. Feb 12 22:02:42.043458 systemd[1]: Mounted sysroot-usr.mount. Feb 12 22:02:42.051203 systemd[1]: Starting initrd-setup-root.service... Feb 12 22:02:42.058358 initrd-setup-root[1171]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 22:02:42.096874 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 22:02:42.101151 initrd-setup-root[1179]: cut: /sysroot/etc/group: No such file or directory Feb 12 22:02:42.115077 initrd-setup-root[1188]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 22:02:42.126682 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1182) Feb 12 22:02:42.133839 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 12 22:02:42.133904 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 12 22:02:42.133922 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 12 22:02:42.133940 initrd-setup-root[1196]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 22:02:42.142587 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 12 22:02:42.146431 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 22:02:42.308223 systemd[1]: Finished initrd-setup-root.service. Feb 12 22:02:42.324893 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 12 22:02:42.324961 kernel: audit: type=1130 audit(1707775362.309:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:42.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:42.315571 systemd[1]: Starting ignition-mount.service... Feb 12 22:02:42.327916 systemd[1]: Starting sysroot-boot.service... Feb 12 22:02:42.334255 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 22:02:42.334501 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 22:02:42.364932 ignition[1232]: INFO : Ignition 2.14.0 Feb 12 22:02:42.364932 ignition[1232]: INFO : Stage: mount Feb 12 22:02:42.367123 ignition[1232]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:02:42.367123 ignition[1232]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:02:42.381054 ignition[1232]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:02:42.382667 ignition[1232]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:02:42.385620 ignition[1232]: INFO : PUT result: OK Feb 12 22:02:42.385974 systemd[1]: Finished sysroot-boot.service. Feb 12 22:02:42.392425 kernel: audit: type=1130 audit(1707775362.387:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:42.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:42.394416 ignition[1232]: INFO : mount: mount passed Feb 12 22:02:42.395336 ignition[1232]: INFO : Ignition finished successfully Feb 12 22:02:42.397300 systemd[1]: Finished ignition-mount.service. Feb 12 22:02:42.399804 systemd[1]: Starting ignition-files.service... Feb 12 22:02:42.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:42.408591 kernel: audit: type=1130 audit(1707775362.397:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:42.412107 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 22:02:42.425585 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1242) Feb 12 22:02:42.430804 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 12 22:02:42.430865 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 12 22:02:42.430885 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 12 22:02:42.439591 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 12 22:02:42.443536 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 22:02:42.460869 ignition[1261]: INFO : Ignition 2.14.0 Feb 12 22:02:42.460869 ignition[1261]: INFO : Stage: files Feb 12 22:02:42.463448 ignition[1261]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:02:42.463448 ignition[1261]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:02:42.480464 ignition[1261]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:02:42.483121 ignition[1261]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:02:42.485045 ignition[1261]: INFO : PUT result: OK Feb 12 22:02:42.493227 ignition[1261]: DEBUG : files: compiled without relabeling support, skipping Feb 12 22:02:42.497350 ignition[1261]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 22:02:42.499034 ignition[1261]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 22:02:42.503141 ignition[1261]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 22:02:42.504952 ignition[1261]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 22:02:42.504952 ignition[1261]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 22:02:42.504283 unknown[1261]: wrote ssh authorized keys file for user: core Feb 12 22:02:42.510903 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 22:02:42.510903 ignition[1261]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 12 22:02:42.983234 ignition[1261]: INFO : GET result: OK Feb 12 22:02:43.235415 ignition[1261]: DEBUG : file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 12 22:02:43.239419 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 22:02:43.239419 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 22:02:43.239419 ignition[1261]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 12 22:02:43.280152 ignition[1261]: INFO : GET result: OK Feb 12 22:02:43.296716 systemd-networkd[1106]: eth0: Gained IPv6LL Feb 12 22:02:43.418539 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 22:02:43.420764 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 22:02:43.420764 ignition[1261]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 12 22:02:43.809439 ignition[1261]: INFO : GET result: OK Feb 12 22:02:43.948501 ignition[1261]: DEBUG : file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 12 22:02:43.952339 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 22:02:43.952339 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 22:02:43.968135 ignition[1261]: INFO : GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1 Feb 12 22:02:44.069473 ignition[1261]: INFO : GET result: OK Feb 12 22:02:44.350449 ignition[1261]: DEBUG : file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628 Feb 12 22:02:44.353871 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 22:02:44.353871 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 12 22:02:44.353871 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 22:02:44.369660 ignition[1261]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem431100977" Feb 12 22:02:44.382012 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1264) Feb 12 22:02:44.382056 ignition[1261]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem431100977": device or resource busy Feb 12 22:02:44.382056 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem431100977", trying btrfs: device or resource busy Feb 12 22:02:44.382056 ignition[1261]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem431100977" Feb 12 22:02:44.382056 ignition[1261]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem431100977" Feb 12 22:02:44.393035 ignition[1261]: INFO : op(3): [started] unmounting "/mnt/oem431100977" Feb 12 22:02:44.397042 systemd[1]: mnt-oem431100977.mount: Deactivated successfully. Feb 12 22:02:44.399641 ignition[1261]: INFO : op(3): [finished] unmounting "/mnt/oem431100977" Feb 12 22:02:44.401511 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 12 22:02:44.404978 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 22:02:44.408570 ignition[1261]: INFO : GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 12 22:02:44.474674 ignition[1261]: INFO : GET result: OK Feb 12 22:02:44.765394 ignition[1261]: DEBUG : file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 12 22:02:44.769037 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 22:02:44.769037 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 22:02:44.769037 ignition[1261]: INFO : GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 12 22:02:44.841865 ignition[1261]: INFO : GET result: OK Feb 12 22:02:45.585490 ignition[1261]: DEBUG : file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 12 22:02:45.588552 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 22:02:45.588552 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 22:02:45.592814 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 22:02:45.592814 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Feb 12 22:02:45.597453 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 22:02:45.597453 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 22:02:45.601821 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 22:02:45.601821 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 22:02:45.606361 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 22:02:45.606361 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 22:02:45.606361 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 22:02:45.614520 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 22:02:45.614520 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 22:02:45.614520 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 22:02:45.614520 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 22:02:45.628129 ignition[1261]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2470067515" Feb 12 22:02:45.631648 ignition[1261]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2470067515": device or resource busy Feb 12 22:02:45.631648 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2470067515", trying btrfs: device or resource busy Feb 12 22:02:45.631648 ignition[1261]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2470067515" Feb 12 22:02:45.631648 ignition[1261]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2470067515" Feb 12 22:02:45.631648 ignition[1261]: INFO : op(6): [started] unmounting "/mnt/oem2470067515" Feb 12 22:02:45.631648 ignition[1261]: INFO : op(6): [finished] unmounting "/mnt/oem2470067515" Feb 12 22:02:45.631648 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 22:02:45.631648 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 12 22:02:45.631648 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 22:02:45.635400 systemd[1]: mnt-oem2470067515.mount: Deactivated successfully. Feb 12 22:02:45.667345 ignition[1261]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3516658386" Feb 12 22:02:45.669789 ignition[1261]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3516658386": device or resource busy Feb 12 22:02:45.669789 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3516658386", trying btrfs: device or resource busy Feb 12 22:02:45.669789 ignition[1261]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3516658386" Feb 12 22:02:45.676205 ignition[1261]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3516658386" Feb 12 22:02:45.676205 ignition[1261]: INFO : op(9): [started] unmounting "/mnt/oem3516658386" Feb 12 22:02:45.675964 systemd[1]: mnt-oem3516658386.mount: Deactivated successfully. Feb 12 22:02:45.680981 ignition[1261]: INFO : op(9): [finished] unmounting "/mnt/oem3516658386" Feb 12 22:02:45.680981 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 12 22:02:45.688975 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 12 22:02:45.691467 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 22:02:45.699747 ignition[1261]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3934025235" Feb 12 22:02:45.701610 ignition[1261]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3934025235": device or resource busy Feb 12 22:02:45.701610 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3934025235", trying btrfs: device or resource busy Feb 12 22:02:45.701610 ignition[1261]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3934025235" Feb 12 22:02:45.701610 ignition[1261]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3934025235" Feb 12 22:02:45.701610 ignition[1261]: INFO : op(c): [started] unmounting "/mnt/oem3934025235" Feb 12 22:02:45.712070 ignition[1261]: INFO : op(c): [finished] unmounting "/mnt/oem3934025235" Feb 12 22:02:45.712070 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 12 22:02:45.712070 ignition[1261]: INFO : files: op(13): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 12 22:02:45.712070 ignition[1261]: INFO : files: op(13): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 12 22:02:45.712070 ignition[1261]: INFO : files: op(14): [started] processing unit "amazon-ssm-agent.service" Feb 12 22:02:45.712070 ignition[1261]: INFO : files: op(14): op(15): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 12 22:02:45.712070 ignition[1261]: INFO : files: op(14): op(15): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 12 22:02:45.712070 ignition[1261]: INFO : files: op(14): [finished] processing unit "amazon-ssm-agent.service" Feb 12 22:02:45.712070 ignition[1261]: INFO : files: op(16): [started] processing unit "nvidia.service" Feb 12 22:02:45.712070 ignition[1261]: INFO : files: op(16): [finished] processing unit "nvidia.service" Feb 12 22:02:45.712070 ignition[1261]: INFO : files: op(17): [started] processing unit "prepare-cni-plugins.service" Feb 12 22:02:45.712070 ignition[1261]: INFO : files: op(17): op(18): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 22:02:45.712070 ignition[1261]: INFO : files: op(17): op(18): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 22:02:45.712070 ignition[1261]: INFO : files: op(17): [finished] processing unit "prepare-cni-plugins.service" Feb 12 22:02:45.712070 ignition[1261]: INFO : files: op(19): [started] processing unit "prepare-critools.service" Feb 12 22:02:45.712070 ignition[1261]: INFO : files: op(19): op(1a): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 22:02:45.712070 ignition[1261]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 22:02:45.712070 ignition[1261]: INFO : files: op(19): [finished] processing unit "prepare-critools.service" Feb 12 22:02:45.712070 ignition[1261]: INFO : files: op(1b): [started] processing unit "prepare-helm.service" Feb 12 22:02:45.772046 kernel: audit: type=1130 audit(1707775365.739:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:45.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:45.734921 systemd[1]: Finished ignition-files.service. Feb 12 22:02:45.773605 ignition[1261]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 22:02:45.773605 ignition[1261]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 22:02:45.773605 ignition[1261]: INFO : files: op(1b): [finished] processing unit "prepare-helm.service" Feb 12 22:02:45.773605 ignition[1261]: INFO : files: op(1d): [started] setting preset to enabled for "nvidia.service" Feb 12 22:02:45.773605 ignition[1261]: INFO : files: op(1d): [finished] setting preset to enabled for "nvidia.service" Feb 12 22:02:45.773605 ignition[1261]: INFO : files: op(1e): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 22:02:45.773605 ignition[1261]: INFO : files: op(1e): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 22:02:45.773605 ignition[1261]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-critools.service" Feb 12 22:02:45.773605 ignition[1261]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 22:02:45.773605 ignition[1261]: INFO : files: op(20): [started] setting preset to enabled for "prepare-helm.service" Feb 12 22:02:45.773605 ignition[1261]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 22:02:45.773605 ignition[1261]: INFO : files: op(21): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 22:02:45.773605 ignition[1261]: INFO : files: op(21): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 22:02:45.773605 ignition[1261]: INFO : files: op(22): [started] setting preset to enabled for "amazon-ssm-agent.service" Feb 12 22:02:45.773605 ignition[1261]: INFO : files: op(22): [finished] setting preset to enabled for "amazon-ssm-agent.service" Feb 12 22:02:45.773605 ignition[1261]: INFO : files: createResultFile: createFiles: op(23): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 22:02:45.773605 ignition[1261]: INFO : files: createResultFile: createFiles: op(23): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 22:02:45.773605 ignition[1261]: INFO : files: files passed Feb 12 22:02:45.773605 ignition[1261]: INFO : Ignition finished successfully Feb 12 22:02:45.848467 kernel: audit: type=1130 audit(1707775365.817:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:45.848498 kernel: audit: type=1130 audit(1707775365.825:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:45.848517 kernel: audit: type=1131 audit(1707775365.825:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:45.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:45.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:45.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:45.761608 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 22:02:45.800935 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 22:02:45.852888 initrd-setup-root-after-ignition[1284]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 22:02:45.802231 systemd[1]: Starting ignition-quench.service... Feb 12 22:02:45.813172 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 22:02:45.823920 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 22:02:45.824063 systemd[1]: Finished ignition-quench.service. Feb 12 22:02:45.825529 systemd[1]: Reached target ignition-complete.target. Feb 12 22:02:45.847262 systemd[1]: Starting initrd-parse-etc.service... Feb 12 22:02:45.895916 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 22:02:45.896104 systemd[1]: Finished initrd-parse-etc.service. Feb 12 22:02:45.915623 kernel: audit: type=1130 audit(1707775365.898:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:45.915674 kernel: audit: type=1131 audit(1707775365.898:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:45.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:45.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:45.899556 systemd[1]: Reached target initrd-fs.target. Feb 12 22:02:45.915719 systemd[1]: Reached target initrd.target. Feb 12 22:02:45.916939 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 22:02:45.918234 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 22:02:45.936631 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 22:02:45.947036 kernel: audit: type=1130 audit(1707775365.936:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:45.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:45.938107 systemd[1]: Starting initrd-cleanup.service... Feb 12 22:02:45.958827 systemd[1]: Stopped target nss-lookup.target. Feb 12 22:02:45.959395 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 22:02:45.964760 systemd[1]: Stopped target timers.target. Feb 12 22:02:45.967324 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 22:02:45.968735 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 22:02:45.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:45.970811 systemd[1]: Stopped target initrd.target. Feb 12 22:02:45.972728 systemd[1]: Stopped target basic.target. Feb 12 22:02:45.974635 systemd[1]: Stopped target ignition-complete.target. Feb 12 22:02:45.974810 systemd[1]: Stopped target ignition-diskful.target. Feb 12 22:02:45.979938 systemd[1]: Stopped target initrd-root-device.target. Feb 12 22:02:45.982017 systemd[1]: Stopped target remote-fs.target. Feb 12 22:02:45.983931 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 22:02:45.985843 systemd[1]: Stopped target sysinit.target. Feb 12 22:02:45.988061 systemd[1]: Stopped target local-fs.target. Feb 12 22:02:45.989974 systemd[1]: Stopped target local-fs-pre.target. Feb 12 22:02:45.991838 systemd[1]: Stopped target swap.target. Feb 12 22:02:45.993620 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 22:02:45.995035 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 22:02:45.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:45.997304 systemd[1]: Stopped target cryptsetup.target. Feb 12 22:02:45.999203 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 22:02:46.000472 systemd[1]: Stopped dracut-initqueue.service. Feb 12 22:02:46.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.001964 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 22:02:46.002125 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 22:02:46.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.007290 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 22:02:46.008540 systemd[1]: Stopped ignition-files.service. Feb 12 22:02:46.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.011432 systemd[1]: Stopping ignition-mount.service... Feb 12 22:02:46.013064 systemd[1]: Stopping sysroot-boot.service... Feb 12 22:02:46.026272 ignition[1299]: INFO : Ignition 2.14.0 Feb 12 22:02:46.026272 ignition[1299]: INFO : Stage: umount Feb 12 22:02:46.026272 ignition[1299]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:02:46.026272 ignition[1299]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:02:46.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.013958 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 22:02:46.014092 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 22:02:46.015401 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 22:02:46.015489 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 22:02:46.019825 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 22:02:46.020721 systemd[1]: Finished initrd-cleanup.service. Feb 12 22:02:46.048046 ignition[1299]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:02:46.051287 ignition[1299]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:02:46.055192 ignition[1299]: INFO : PUT result: OK Feb 12 22:02:46.062020 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 22:02:46.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.062244 systemd[1]: Stopped sysroot-boot.service. Feb 12 22:02:46.066926 ignition[1299]: INFO : umount: umount passed Feb 12 22:02:46.066926 ignition[1299]: INFO : Ignition finished successfully Feb 12 22:02:46.070623 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 22:02:46.070714 systemd[1]: Stopped ignition-mount.service. Feb 12 22:02:46.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.073883 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 22:02:46.075462 systemd[1]: Stopped ignition-disks.service. Feb 12 22:02:46.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.079028 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 22:02:46.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.079085 systemd[1]: Stopped ignition-kargs.service. Feb 12 22:02:46.080226 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 22:02:46.080268 systemd[1]: Stopped ignition-fetch.service. Feb 12 22:02:46.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.082436 systemd[1]: Stopped target network.target. Feb 12 22:02:46.084395 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 22:02:46.084474 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 22:02:46.087676 systemd[1]: Stopped target paths.target. Feb 12 22:02:46.088735 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 22:02:46.092615 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 22:02:46.094715 systemd[1]: Stopped target slices.target. Feb 12 22:02:46.097215 systemd[1]: Stopped target sockets.target. Feb 12 22:02:46.099891 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 22:02:46.099934 systemd[1]: Closed iscsid.socket. Feb 12 22:02:46.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.101948 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 22:02:46.102050 systemd[1]: Closed iscsiuio.socket. Feb 12 22:02:46.103674 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 22:02:46.103738 systemd[1]: Stopped ignition-setup.service. Feb 12 22:02:46.105494 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 22:02:46.105639 systemd[1]: Stopped initrd-setup-root.service. Feb 12 22:02:46.107477 systemd[1]: Stopping systemd-networkd.service... Feb 12 22:02:46.115254 systemd[1]: Stopping systemd-resolved.service... Feb 12 22:02:46.117615 systemd-networkd[1106]: eth0: DHCPv6 lease lost Feb 12 22:02:46.119514 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 22:02:46.119653 systemd[1]: Stopped systemd-networkd.service. Feb 12 22:02:46.122000 audit: BPF prog-id=9 op=UNLOAD Feb 12 22:02:46.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.124783 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 22:02:46.126132 systemd[1]: Stopped systemd-resolved.service. Feb 12 22:02:46.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.128500 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 22:02:46.128541 systemd[1]: Closed systemd-networkd.socket. Feb 12 22:02:46.130000 audit: BPF prog-id=6 op=UNLOAD Feb 12 22:02:46.136843 systemd[1]: Stopping network-cleanup.service... Feb 12 22:02:46.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.137903 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 22:02:46.137961 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 22:02:46.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.140193 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 22:02:46.140247 systemd[1]: Stopped systemd-sysctl.service. Feb 12 22:02:46.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.146364 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 22:02:46.146440 systemd[1]: Stopped systemd-modules-load.service. Feb 12 22:02:46.149676 systemd[1]: Stopping systemd-udevd.service... Feb 12 22:02:46.163165 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 22:02:46.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.163355 systemd[1]: Stopped systemd-udevd.service. Feb 12 22:02:46.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.166407 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 22:02:46.166610 systemd[1]: Stopped network-cleanup.service. Feb 12 22:02:46.168253 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 22:02:46.168318 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 22:02:46.174111 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 22:02:46.174170 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 22:02:46.180312 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 22:02:46.181386 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 22:02:46.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.185184 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 22:02:46.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.185265 systemd[1]: Stopped dracut-cmdline.service. Feb 12 22:02:46.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.187910 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 22:02:46.187966 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 22:02:46.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.192981 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 22:02:46.194522 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 22:02:46.194619 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 22:02:46.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:46.196345 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 22:02:46.196399 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 22:02:46.197669 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 22:02:46.197722 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 22:02:46.203323 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 22:02:46.203435 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 22:02:46.203687 systemd[1]: Reached target initrd-switch-root.target. Feb 12 22:02:46.207459 systemd[1]: Starting initrd-switch-root.service... Feb 12 22:02:46.225944 systemd[1]: Switching root. Feb 12 22:02:46.251345 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Feb 12 22:02:46.251457 iscsid[1111]: iscsid shutting down. Feb 12 22:02:46.252875 systemd-journald[185]: Journal stopped Feb 12 22:02:50.957190 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 22:02:50.957265 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 22:02:50.957291 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 22:02:50.957315 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 22:02:50.957336 kernel: SELinux: policy capability open_perms=1 Feb 12 22:02:50.957353 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 22:02:50.957371 kernel: SELinux: policy capability always_check_network=0 Feb 12 22:02:50.957394 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 22:02:50.957417 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 22:02:50.957439 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 22:02:50.957457 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 22:02:50.957481 systemd[1]: Successfully loaded SELinux policy in 98.911ms. Feb 12 22:02:50.957508 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 21.661ms. Feb 12 22:02:50.957546 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 22:02:50.957617 systemd[1]: Detected virtualization amazon. Feb 12 22:02:50.957637 systemd[1]: Detected architecture x86-64. Feb 12 22:02:50.957654 systemd[1]: Detected first boot. Feb 12 22:02:50.957673 systemd[1]: Initializing machine ID from VM UUID. Feb 12 22:02:50.957691 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 22:02:50.957708 systemd[1]: Populated /etc with preset unit settings. Feb 12 22:02:50.957726 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:02:50.957747 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:02:50.957770 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:02:50.957789 kernel: kauditd_printk_skb: 50 callbacks suppressed Feb 12 22:02:50.957806 kernel: audit: type=1334 audit(1707775370.561:87): prog-id=12 op=LOAD Feb 12 22:02:50.957831 kernel: audit: type=1334 audit(1707775370.561:88): prog-id=3 op=UNLOAD Feb 12 22:02:50.957847 kernel: audit: type=1334 audit(1707775370.562:89): prog-id=13 op=LOAD Feb 12 22:02:50.957867 kernel: audit: type=1334 audit(1707775370.564:90): prog-id=14 op=LOAD Feb 12 22:02:50.957884 kernel: audit: type=1334 audit(1707775370.564:91): prog-id=4 op=UNLOAD Feb 12 22:02:50.957901 kernel: audit: type=1334 audit(1707775370.564:92): prog-id=5 op=UNLOAD Feb 12 22:02:50.957919 kernel: audit: type=1131 audit(1707775370.567:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.957936 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 22:02:50.957953 systemd[1]: Stopped iscsiuio.service. Feb 12 22:02:50.957971 kernel: audit: type=1334 audit(1707775370.583:94): prog-id=12 op=UNLOAD Feb 12 22:02:50.957988 kernel: audit: type=1131 audit(1707775370.586:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.958008 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 22:02:50.958026 systemd[1]: Stopped iscsid.service. Feb 12 22:02:50.958044 kernel: audit: type=1131 audit(1707775370.607:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.958061 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 22:02:50.958080 systemd[1]: Stopped initrd-switch-root.service. Feb 12 22:02:50.958099 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 22:02:50.958118 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 22:02:50.958140 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 22:02:50.958165 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 12 22:02:50.958184 systemd[1]: Created slice system-getty.slice. Feb 12 22:02:50.958199 systemd[1]: Created slice system-modprobe.slice. Feb 12 22:02:50.958216 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 22:02:50.958234 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 22:02:50.958272 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 22:02:50.958289 systemd[1]: Created slice user.slice. Feb 12 22:02:50.958308 systemd[1]: Started systemd-ask-password-console.path. Feb 12 22:02:50.958330 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 22:02:50.958347 systemd[1]: Set up automount boot.automount. Feb 12 22:02:50.958368 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 22:02:50.958390 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 22:02:50.958408 systemd[1]: Stopped target initrd-fs.target. Feb 12 22:02:50.958428 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 22:02:50.958459 systemd[1]: Reached target integritysetup.target. Feb 12 22:02:50.958483 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 22:02:50.958505 systemd[1]: Reached target remote-fs.target. Feb 12 22:02:50.958526 systemd[1]: Reached target slices.target. Feb 12 22:02:50.958548 systemd[1]: Reached target swap.target. Feb 12 22:02:50.958591 systemd[1]: Reached target torcx.target. Feb 12 22:02:50.958613 systemd[1]: Reached target veritysetup.target. Feb 12 22:02:50.958635 systemd[1]: Listening on systemd-coredump.socket. Feb 12 22:02:50.958661 systemd[1]: Listening on systemd-initctl.socket. Feb 12 22:02:50.958684 systemd[1]: Listening on systemd-networkd.socket. Feb 12 22:02:50.958702 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 22:02:50.958720 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 22:02:50.958739 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 22:02:50.958758 systemd[1]: Mounting dev-hugepages.mount... Feb 12 22:02:50.958776 systemd[1]: Mounting dev-mqueue.mount... Feb 12 22:02:50.958795 systemd[1]: Mounting media.mount... Feb 12 22:02:50.958815 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 22:02:50.958836 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 22:02:50.958857 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 22:02:50.958876 systemd[1]: Mounting tmp.mount... Feb 12 22:02:50.958895 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 22:02:50.958914 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 22:02:50.958934 systemd[1]: Starting kmod-static-nodes.service... Feb 12 22:02:50.958953 systemd[1]: Starting modprobe@configfs.service... Feb 12 22:02:50.958972 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 22:02:50.958991 systemd[1]: Starting modprobe@drm.service... Feb 12 22:02:50.959010 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 22:02:50.959031 systemd[1]: Starting modprobe@fuse.service... Feb 12 22:02:50.959050 systemd[1]: Starting modprobe@loop.service... Feb 12 22:02:50.959069 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 22:02:50.959088 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 22:02:50.959106 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 22:02:50.959126 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 22:02:50.959145 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 22:02:50.959166 systemd[1]: Stopped systemd-journald.service. Feb 12 22:02:50.959184 systemd[1]: Starting systemd-journald.service... Feb 12 22:02:50.959205 systemd[1]: Starting systemd-modules-load.service... Feb 12 22:02:50.959225 systemd[1]: Starting systemd-network-generator.service... Feb 12 22:02:50.959243 systemd[1]: Starting systemd-remount-fs.service... Feb 12 22:02:50.959262 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 22:02:50.959281 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 22:02:50.959301 systemd[1]: Stopped verity-setup.service. Feb 12 22:02:50.959319 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 22:02:50.959338 systemd[1]: Mounted dev-hugepages.mount. Feb 12 22:02:50.959357 systemd[1]: Mounted dev-mqueue.mount. Feb 12 22:02:50.959379 systemd[1]: Mounted media.mount. Feb 12 22:02:50.959397 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 22:02:50.959416 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 22:02:50.959434 systemd[1]: Mounted tmp.mount. Feb 12 22:02:50.959453 systemd[1]: Finished kmod-static-nodes.service. Feb 12 22:02:50.959472 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 22:02:50.959490 systemd[1]: Finished modprobe@configfs.service. Feb 12 22:02:50.959510 kernel: fuse: init (API version 7.34) Feb 12 22:02:50.959528 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 22:02:50.959551 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 22:02:50.959583 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 22:02:50.959602 systemd[1]: Finished modprobe@drm.service. Feb 12 22:02:50.959620 kernel: loop: module loaded Feb 12 22:02:50.959638 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 22:02:50.959660 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 22:02:50.959679 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 22:02:50.959699 systemd[1]: Finished modprobe@fuse.service. Feb 12 22:02:50.959718 systemd[1]: Finished systemd-network-generator.service. Feb 12 22:02:50.959736 systemd[1]: Finished systemd-remount-fs.service. Feb 12 22:02:50.959759 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 22:02:50.959777 systemd[1]: Finished modprobe@loop.service. Feb 12 22:02:50.959796 systemd[1]: Reached target network-pre.target. Feb 12 22:02:50.959819 systemd-journald[1407]: Journal started Feb 12 22:02:50.959886 systemd-journald[1407]: Runtime Journal (/run/log/journal/ec2b1f2c1eee6fa4d39132887d699305) is 4.8M, max 38.7M, 33.9M free. Feb 12 22:02:46.684000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 22:02:46.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 22:02:46.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 22:02:46.817000 audit: BPF prog-id=10 op=LOAD Feb 12 22:02:46.817000 audit: BPF prog-id=10 op=UNLOAD Feb 12 22:02:46.817000 audit: BPF prog-id=11 op=LOAD Feb 12 22:02:46.817000 audit: BPF prog-id=11 op=UNLOAD Feb 12 22:02:47.012000 audit[1332]: AVC avc: denied { associate } for pid=1332 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 22:02:47.012000 audit[1332]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8ac a1=c0000cede0 a2=c0000d7ac0 a3=32 items=0 ppid=1315 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:02:47.012000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 22:02:47.015000 audit[1332]: AVC avc: denied { associate } for pid=1332 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 22:02:47.015000 audit[1332]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d985 a2=1ed a3=0 items=2 ppid=1315 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:02:47.015000 audit: CWD cwd="/" Feb 12 22:02:47.015000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:47.015000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:47.015000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 22:02:50.561000 audit: BPF prog-id=12 op=LOAD Feb 12 22:02:50.561000 audit: BPF prog-id=3 op=UNLOAD Feb 12 22:02:50.562000 audit: BPF prog-id=13 op=LOAD Feb 12 22:02:50.564000 audit: BPF prog-id=14 op=LOAD Feb 12 22:02:50.564000 audit: BPF prog-id=4 op=UNLOAD Feb 12 22:02:50.564000 audit: BPF prog-id=5 op=UNLOAD Feb 12 22:02:50.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.583000 audit: BPF prog-id=12 op=UNLOAD Feb 12 22:02:50.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.843000 audit: BPF prog-id=15 op=LOAD Feb 12 22:02:50.843000 audit: BPF prog-id=16 op=LOAD Feb 12 22:02:50.843000 audit: BPF prog-id=17 op=LOAD Feb 12 22:02:50.843000 audit: BPF prog-id=13 op=UNLOAD Feb 12 22:02:50.844000 audit: BPF prog-id=14 op=UNLOAD Feb 12 22:02:50.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.952000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 22:02:50.952000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd547b5d40 a2=4000 a3=7ffd547b5ddc items=0 ppid=1 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:02:50.952000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 22:02:50.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:50.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:47.010115 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:02:50.559860 systemd[1]: Queued start job for default target multi-user.target. Feb 12 22:02:50.967599 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 22:02:47.010703 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:47Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 22:02:50.567691 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 22:02:47.010722 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:47Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 22:02:47.010753 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:47Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 22:02:47.010763 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:47Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 22:02:47.010793 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:47Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 22:02:47.010806 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:47Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 22:02:47.010989 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:47Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 22:02:47.011027 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:47Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 22:02:47.011039 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:47Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 22:02:47.011820 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:47Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 22:02:47.011855 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:47Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 22:02:47.011873 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:47Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 22:02:47.011888 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:47Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 22:02:47.011906 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:47Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 22:02:47.011920 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:47Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 22:02:49.908717 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:49Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:02:49.909051 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:49Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:02:49.909161 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:49Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:02:49.909342 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:49Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:02:50.970984 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 22:02:49.909388 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:49Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 22:02:49.909445 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-12T22:02:49Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 22:02:50.985616 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 22:02:50.993600 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 22:02:50.999589 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 22:02:51.004374 systemd[1]: Starting systemd-random-seed.service... Feb 12 22:02:51.009613 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 22:02:51.012739 systemd[1]: Started systemd-journald.service. Feb 12 22:02:51.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.014232 systemd[1]: Finished systemd-modules-load.service. Feb 12 22:02:51.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.015595 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 22:02:51.017053 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 22:02:51.020021 systemd[1]: Starting systemd-journal-flush.service... Feb 12 22:02:51.023069 systemd[1]: Starting systemd-sysctl.service... Feb 12 22:02:51.024660 systemd[1]: Finished systemd-random-seed.service. Feb 12 22:02:51.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.027701 systemd[1]: Reached target first-boot-complete.target. Feb 12 22:02:51.050790 systemd-journald[1407]: Time spent on flushing to /var/log/journal/ec2b1f2c1eee6fa4d39132887d699305 is 139.557ms for 1221 entries. Feb 12 22:02:51.050790 systemd-journald[1407]: System Journal (/var/log/journal/ec2b1f2c1eee6fa4d39132887d699305) is 8.0M, max 195.6M, 187.6M free. Feb 12 22:02:51.217545 systemd-journald[1407]: Received client request to flush runtime journal. Feb 12 22:02:51.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.086230 systemd[1]: Finished systemd-sysctl.service. Feb 12 22:02:51.218789 udevadm[1441]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 12 22:02:51.102966 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 22:02:51.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.108349 systemd[1]: Starting systemd-udev-settle.service... Feb 12 22:02:51.143595 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 22:02:51.147672 systemd[1]: Starting systemd-sysusers.service... Feb 12 22:02:51.219187 systemd[1]: Finished systemd-journal-flush.service. Feb 12 22:02:51.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.263485 systemd[1]: Finished systemd-sysusers.service. Feb 12 22:02:51.266637 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 22:02:51.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.334466 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 22:02:51.971744 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 22:02:51.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:51.974000 audit: BPF prog-id=18 op=LOAD Feb 12 22:02:51.974000 audit: BPF prog-id=19 op=LOAD Feb 12 22:02:51.974000 audit: BPF prog-id=7 op=UNLOAD Feb 12 22:02:51.974000 audit: BPF prog-id=8 op=UNLOAD Feb 12 22:02:51.977009 systemd[1]: Starting systemd-udevd.service... Feb 12 22:02:52.005128 systemd-udevd[1451]: Using default interface naming scheme 'v252'. Feb 12 22:02:52.208099 systemd[1]: Started systemd-udevd.service. Feb 12 22:02:52.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:52.211000 audit: BPF prog-id=20 op=LOAD Feb 12 22:02:52.213659 systemd[1]: Starting systemd-networkd.service... Feb 12 22:02:52.262848 systemd[1]: Starting systemd-userdbd.service... Feb 12 22:02:52.260000 audit: BPF prog-id=21 op=LOAD Feb 12 22:02:52.261000 audit: BPF prog-id=22 op=LOAD Feb 12 22:02:52.261000 audit: BPF prog-id=23 op=LOAD Feb 12 22:02:52.286298 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 22:02:52.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:52.318178 systemd[1]: Started systemd-userdbd.service. Feb 12 22:02:52.319429 (udev-worker)[1462]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:02:52.412692 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 12 22:02:52.421853 kernel: ACPI: button: Power Button [PWRF] Feb 12 22:02:52.421958 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Feb 12 22:02:52.423903 kernel: ACPI: button: Sleep Button [SLPF] Feb 12 22:02:52.441406 systemd-networkd[1459]: lo: Link UP Feb 12 22:02:52.441418 systemd-networkd[1459]: lo: Gained carrier Feb 12 22:02:52.452551 systemd-networkd[1459]: Enumeration completed Feb 12 22:02:52.453987 systemd[1]: Started systemd-networkd.service. Feb 12 22:02:52.454023 systemd-networkd[1459]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 22:02:52.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:52.470597 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:02:52.470857 systemd-networkd[1459]: eth0: Link UP Feb 12 22:02:52.471264 systemd-networkd[1459]: eth0: Gained carrier Feb 12 22:02:52.478223 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 22:02:52.483743 systemd-networkd[1459]: eth0: DHCPv4 address 172.31.25.29/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 12 22:02:52.498000 audit[1467]: AVC avc: denied { confidentiality } for pid=1467 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 22:02:52.498000 audit[1467]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5612b6a332b0 a1=32194 a2=7fa9f4ffcbc5 a3=5 items=108 ppid=1451 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:02:52.498000 audit: CWD cwd="/" Feb 12 22:02:52.498000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=1 name=(null) inode=14767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=2 name=(null) inode=14767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=3 name=(null) inode=14768 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=4 name=(null) inode=14767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=5 name=(null) inode=14769 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=6 name=(null) inode=14767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=7 name=(null) inode=14770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=8 name=(null) inode=14770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=9 name=(null) inode=14771 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=10 name=(null) inode=14770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=11 name=(null) inode=14772 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=12 name=(null) inode=14770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=13 name=(null) inode=14773 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=14 name=(null) inode=14770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=15 name=(null) inode=14774 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=16 name=(null) inode=14770 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=17 name=(null) inode=14775 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=18 name=(null) inode=14767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=19 name=(null) inode=14776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=20 name=(null) inode=14776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=21 name=(null) inode=14777 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=22 name=(null) inode=14776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=23 name=(null) inode=14778 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=24 name=(null) inode=14776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=25 name=(null) inode=14779 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=26 name=(null) inode=14776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=27 name=(null) inode=14780 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=28 name=(null) inode=14776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=29 name=(null) inode=14781 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=30 name=(null) inode=14767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=31 name=(null) inode=14782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=32 name=(null) inode=14782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=33 name=(null) inode=14783 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=34 name=(null) inode=14782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=35 name=(null) inode=14784 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=36 name=(null) inode=14782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=37 name=(null) inode=14785 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=38 name=(null) inode=14782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.528596 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1458) Feb 12 22:02:52.498000 audit: PATH item=39 name=(null) inode=14786 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=40 name=(null) inode=14782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=41 name=(null) inode=14787 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=42 name=(null) inode=14767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=43 name=(null) inode=14788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=44 name=(null) inode=14788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=45 name=(null) inode=14789 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=46 name=(null) inode=14788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=47 name=(null) inode=14790 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=48 name=(null) inode=14788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=49 name=(null) inode=14791 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=50 name=(null) inode=14788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=51 name=(null) inode=14792 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=52 name=(null) inode=14788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=53 name=(null) inode=14793 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=55 name=(null) inode=14794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=56 name=(null) inode=14794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=57 name=(null) inode=14795 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=58 name=(null) inode=14794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=59 name=(null) inode=14796 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=60 name=(null) inode=14794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=61 name=(null) inode=14797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=62 name=(null) inode=14797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=63 name=(null) inode=14798 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=64 name=(null) inode=14797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=65 name=(null) inode=14799 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=66 name=(null) inode=14797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=67 name=(null) inode=14800 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=68 name=(null) inode=14797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=69 name=(null) inode=14801 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=70 name=(null) inode=14797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=71 name=(null) inode=14802 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=72 name=(null) inode=14794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=73 name=(null) inode=14803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=74 name=(null) inode=14803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=75 name=(null) inode=14804 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=76 name=(null) inode=14803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=77 name=(null) inode=14805 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=78 name=(null) inode=14803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=79 name=(null) inode=14806 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=80 name=(null) inode=14803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=81 name=(null) inode=14807 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=82 name=(null) inode=14803 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=83 name=(null) inode=14808 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=84 name=(null) inode=14794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=85 name=(null) inode=14809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=86 name=(null) inode=14809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=87 name=(null) inode=14810 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=88 name=(null) inode=14809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=89 name=(null) inode=14811 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=90 name=(null) inode=14809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=91 name=(null) inode=14812 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=92 name=(null) inode=14809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=93 name=(null) inode=14813 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=94 name=(null) inode=14809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=95 name=(null) inode=14814 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=96 name=(null) inode=14794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=97 name=(null) inode=14815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=98 name=(null) inode=14815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=99 name=(null) inode=14816 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=100 name=(null) inode=14815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=101 name=(null) inode=14817 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=102 name=(null) inode=14815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=103 name=(null) inode=14818 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=104 name=(null) inode=14815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=105 name=(null) inode=14819 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=106 name=(null) inode=14815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PATH item=107 name=(null) inode=14820 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:02:52.498000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 22:02:52.595724 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Feb 12 22:02:52.638588 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 Feb 12 22:02:52.646584 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 22:02:52.687251 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 22:02:52.816216 systemd[1]: Finished systemd-udev-settle.service. Feb 12 22:02:52.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:52.818627 systemd[1]: Starting lvm2-activation-early.service... Feb 12 22:02:52.868998 lvm[1565]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 22:02:52.898167 systemd[1]: Finished lvm2-activation-early.service. Feb 12 22:02:52.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:52.899862 systemd[1]: Reached target cryptsetup.target. Feb 12 22:02:52.903355 systemd[1]: Starting lvm2-activation.service... Feb 12 22:02:52.911706 lvm[1566]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 22:02:52.950066 systemd[1]: Finished lvm2-activation.service. Feb 12 22:02:52.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:52.952066 systemd[1]: Reached target local-fs-pre.target. Feb 12 22:02:52.953294 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 22:02:52.953327 systemd[1]: Reached target local-fs.target. Feb 12 22:02:52.954433 systemd[1]: Reached target machines.target. Feb 12 22:02:52.957164 systemd[1]: Starting ldconfig.service... Feb 12 22:02:52.961209 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 22:02:52.961295 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 22:02:52.963140 systemd[1]: Starting systemd-boot-update.service... Feb 12 22:02:52.971536 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 22:02:52.981349 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 22:02:52.983085 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 22:02:52.983188 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 22:02:52.985625 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 22:02:53.004016 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1568 (bootctl) Feb 12 22:02:53.006314 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 22:02:53.029170 systemd-tmpfiles[1571]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 22:02:53.035121 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 22:02:53.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:53.041178 systemd-tmpfiles[1571]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 22:02:53.044244 systemd-tmpfiles[1571]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 22:02:53.201663 systemd-fsck[1576]: fsck.fat 4.2 (2021-01-31) Feb 12 22:02:53.201663 systemd-fsck[1576]: /dev/nvme0n1p1: 789 files, 115339/258078 clusters Feb 12 22:02:53.203477 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 22:02:53.207018 systemd[1]: Mounting boot.mount... Feb 12 22:02:53.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:53.234441 systemd[1]: Mounted boot.mount. Feb 12 22:02:53.280246 systemd[1]: Finished systemd-boot-update.service. Feb 12 22:02:53.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:53.396213 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 22:02:53.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:53.398688 systemd[1]: Starting audit-rules.service... Feb 12 22:02:53.401637 systemd[1]: Starting clean-ca-certificates.service... Feb 12 22:02:53.407662 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 22:02:53.410000 audit: BPF prog-id=24 op=LOAD Feb 12 22:02:53.412029 systemd[1]: Starting systemd-resolved.service... Feb 12 22:02:53.413000 audit: BPF prog-id=25 op=LOAD Feb 12 22:02:53.416780 systemd[1]: Starting systemd-timesyncd.service... Feb 12 22:02:53.422210 systemd[1]: Starting systemd-update-utmp.service... Feb 12 22:02:53.435024 systemd[1]: Finished clean-ca-certificates.service. Feb 12 22:02:53.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:53.437372 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 22:02:53.447000 audit[1595]: SYSTEM_BOOT pid=1595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 22:02:53.453093 systemd[1]: Finished systemd-update-utmp.service. Feb 12 22:02:53.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:02:53.542000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 22:02:53.542000 audit[1610]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffbf4825d0 a2=420 a3=0 items=0 ppid=1590 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:02:53.542000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 22:02:53.544406 augenrules[1610]: No rules Feb 12 22:02:53.544649 systemd[1]: Finished audit-rules.service. Feb 12 22:02:53.561056 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 22:02:53.571897 systemd-resolved[1593]: Positive Trust Anchors: Feb 12 22:02:53.572269 systemd-resolved[1593]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 22:02:53.573201 systemd-resolved[1593]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 22:02:53.602085 systemd[1]: Started systemd-timesyncd.service. Feb 12 22:02:53.603640 systemd[1]: Reached target time-set.target. Feb 12 22:02:53.614896 systemd-resolved[1593]: Defaulting to hostname 'linux'. Feb 12 22:02:53.617922 systemd[1]: Started systemd-resolved.service. Feb 12 22:02:53.619377 systemd[1]: Reached target network.target. Feb 12 22:02:53.620931 systemd[1]: Reached target nss-lookup.target. Feb 12 22:02:53.647550 systemd-timesyncd[1594]: Contacted time server 44.190.40.123:123 (0.flatcar.pool.ntp.org). Feb 12 22:02:53.647744 systemd-timesyncd[1594]: Initial clock synchronization to Mon 2024-02-12 22:02:54.009801 UTC. Feb 12 22:02:53.780026 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 22:02:53.780625 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 22:02:53.824822 ldconfig[1567]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 22:02:53.834549 systemd[1]: Finished ldconfig.service. Feb 12 22:02:53.837202 systemd[1]: Starting systemd-update-done.service... Feb 12 22:02:53.847009 systemd[1]: Finished systemd-update-done.service. Feb 12 22:02:53.848533 systemd[1]: Reached target sysinit.target. Feb 12 22:02:53.850095 systemd[1]: Started motdgen.path. Feb 12 22:02:53.851190 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 22:02:53.852821 systemd[1]: Started logrotate.timer. Feb 12 22:02:53.853834 systemd[1]: Started mdadm.timer. Feb 12 22:02:53.854704 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 22:02:53.855807 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 22:02:53.855843 systemd[1]: Reached target paths.target. Feb 12 22:02:53.856727 systemd[1]: Reached target timers.target. Feb 12 22:02:53.858031 systemd[1]: Listening on dbus.socket. Feb 12 22:02:53.860308 systemd[1]: Starting docker.socket... Feb 12 22:02:53.865163 systemd[1]: Listening on sshd.socket. Feb 12 22:02:53.866327 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 22:02:53.866896 systemd[1]: Listening on docker.socket. Feb 12 22:02:53.868264 systemd[1]: Reached target sockets.target. Feb 12 22:02:53.869344 systemd[1]: Reached target basic.target. Feb 12 22:02:53.871644 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 22:02:53.872068 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 22:02:53.875803 systemd[1]: Starting containerd.service... Feb 12 22:02:53.883435 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 12 22:02:53.894433 systemd[1]: Starting dbus.service... Feb 12 22:02:53.897249 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 22:02:53.903177 systemd[1]: Starting extend-filesystems.service... Feb 12 22:02:53.904701 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 22:02:53.906713 systemd[1]: Starting motdgen.service... Feb 12 22:02:53.909687 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 22:02:53.915431 systemd[1]: Starting prepare-critools.service... Feb 12 22:02:53.918554 systemd[1]: Starting prepare-helm.service... Feb 12 22:02:53.921799 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 22:02:53.925018 systemd[1]: Starting sshd-keygen.service... Feb 12 22:02:53.936450 systemd[1]: Starting systemd-logind.service... Feb 12 22:02:53.937922 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 22:02:53.937992 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 22:02:53.939062 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 22:02:53.940377 systemd[1]: Starting update-engine.service... Feb 12 22:02:53.944156 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 22:02:53.990590 jq[1624]: false Feb 12 22:02:53.998102 tar[1638]: ./ Feb 12 22:02:54.002256 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 22:02:54.002620 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 22:02:54.012640 tar[1636]: crictl Feb 12 22:02:54.009142 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 22:02:54.013207 jq[1634]: true Feb 12 22:02:54.009440 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 22:02:54.017226 tar[1638]: ./macvlan Feb 12 22:02:54.025990 tar[1639]: linux-amd64/helm Feb 12 22:02:54.053380 jq[1647]: true Feb 12 22:02:54.112391 dbus-daemon[1623]: [system] SELinux support is enabled Feb 12 22:02:54.112686 systemd[1]: Started dbus.service. Feb 12 22:02:54.120566 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 22:02:54.120602 systemd[1]: Reached target system-config.target. Feb 12 22:02:54.122215 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 22:02:54.122251 systemd[1]: Reached target user-config.target. Feb 12 22:02:54.132823 dbus-daemon[1623]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1459 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 12 22:02:54.139937 extend-filesystems[1625]: Found nvme0n1 Feb 12 22:02:54.141448 extend-filesystems[1625]: Found nvme0n1p1 Feb 12 22:02:54.141448 extend-filesystems[1625]: Found nvme0n1p2 Feb 12 22:02:54.141448 extend-filesystems[1625]: Found nvme0n1p3 Feb 12 22:02:54.141448 extend-filesystems[1625]: Found usr Feb 12 22:02:54.141448 extend-filesystems[1625]: Found nvme0n1p4 Feb 12 22:02:54.141448 extend-filesystems[1625]: Found nvme0n1p6 Feb 12 22:02:54.141448 extend-filesystems[1625]: Found nvme0n1p7 Feb 12 22:02:54.141448 extend-filesystems[1625]: Found nvme0n1p9 Feb 12 22:02:54.141448 extend-filesystems[1625]: Checking size of /dev/nvme0n1p9 Feb 12 22:02:54.152421 dbus-daemon[1623]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 12 22:02:54.160013 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 22:02:54.160274 systemd[1]: Finished motdgen.service. Feb 12 22:02:54.164907 systemd[1]: Starting systemd-hostnamed.service... Feb 12 22:02:54.218662 bash[1679]: Updated "/home/core/.ssh/authorized_keys" Feb 12 22:02:54.219077 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 22:02:54.226929 update_engine[1633]: I0212 22:02:54.226008 1633 main.cc:92] Flatcar Update Engine starting Feb 12 22:02:54.234422 systemd[1]: Started update-engine.service. Feb 12 22:02:54.236099 update_engine[1633]: I0212 22:02:54.234690 1633 update_check_scheduler.cc:74] Next update check in 4m51s Feb 12 22:02:54.238239 systemd[1]: Started locksmithd.service. Feb 12 22:02:54.245871 extend-filesystems[1625]: Resized partition /dev/nvme0n1p9 Feb 12 22:02:54.252721 extend-filesystems[1684]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 22:02:54.269661 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Feb 12 22:02:54.304846 systemd-networkd[1459]: eth0: Gained IPv6LL Feb 12 22:02:54.308892 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 22:02:54.310785 systemd[1]: Reached target network-online.target. Feb 12 22:02:54.313993 systemd[1]: Started amazon-ssm-agent.service. Feb 12 22:02:54.317126 systemd[1]: Started nvidia.service. Feb 12 22:02:54.389671 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Feb 12 22:02:54.446127 extend-filesystems[1684]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Feb 12 22:02:54.446127 extend-filesystems[1684]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 12 22:02:54.446127 extend-filesystems[1684]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Feb 12 22:02:54.445705 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 22:02:54.453636 env[1637]: time="2024-02-12T22:02:54.444914827Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 22:02:54.453921 extend-filesystems[1625]: Resized filesystem in /dev/nvme0n1p9 Feb 12 22:02:54.446018 systemd[1]: Finished extend-filesystems.service. Feb 12 22:02:54.469850 tar[1638]: ./static Feb 12 22:02:54.523124 systemd-logind[1632]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 22:02:54.523565 systemd-logind[1632]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 12 22:02:54.523684 systemd-logind[1632]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 22:02:54.523957 systemd-logind[1632]: New seat seat0. Feb 12 22:02:54.543346 systemd[1]: Started systemd-logind.service. Feb 12 22:02:54.602631 amazon-ssm-agent[1692]: 2024/02/12 22:02:54 Failed to load instance info from vault. RegistrationKey does not exist. Feb 12 22:02:54.605064 amazon-ssm-agent[1692]: Initializing new seelog logger Feb 12 22:02:54.605287 amazon-ssm-agent[1692]: New Seelog Logger Creation Complete Feb 12 22:02:54.605373 amazon-ssm-agent[1692]: 2024/02/12 22:02:54 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Feb 12 22:02:54.605373 amazon-ssm-agent[1692]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Feb 12 22:02:54.605740 amazon-ssm-agent[1692]: 2024/02/12 22:02:54 processing appconfig overrides Feb 12 22:02:54.710076 tar[1638]: ./vlan Feb 12 22:02:54.712065 env[1637]: time="2024-02-12T22:02:54.712002854Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 22:02:54.712245 env[1637]: time="2024-02-12T22:02:54.712206269Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:02:54.727413 env[1637]: time="2024-02-12T22:02:54.727351076Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 22:02:54.727413 env[1637]: time="2024-02-12T22:02:54.727408928Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:02:54.727816 env[1637]: time="2024-02-12T22:02:54.727766019Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 22:02:54.727905 env[1637]: time="2024-02-12T22:02:54.727813884Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 22:02:54.727905 env[1637]: time="2024-02-12T22:02:54.727835452Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 22:02:54.727905 env[1637]: time="2024-02-12T22:02:54.727850608Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 22:02:54.728084 env[1637]: time="2024-02-12T22:02:54.727967278Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:02:54.728294 env[1637]: time="2024-02-12T22:02:54.728264792Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:02:54.728680 env[1637]: time="2024-02-12T22:02:54.728598125Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 22:02:54.728839 env[1637]: time="2024-02-12T22:02:54.728680617Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 22:02:54.728839 env[1637]: time="2024-02-12T22:02:54.728789806Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 22:02:54.729028 env[1637]: time="2024-02-12T22:02:54.728840980Z" level=info msg="metadata content store policy set" policy=shared Feb 12 22:02:54.746965 env[1637]: time="2024-02-12T22:02:54.746914374Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 22:02:54.747217 env[1637]: time="2024-02-12T22:02:54.746972024Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 22:02:54.747217 env[1637]: time="2024-02-12T22:02:54.746995440Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 22:02:54.747217 env[1637]: time="2024-02-12T22:02:54.747048907Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 22:02:54.747217 env[1637]: time="2024-02-12T22:02:54.747070504Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 22:02:54.749794 env[1637]: time="2024-02-12T22:02:54.747088818Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 22:02:54.749794 env[1637]: time="2024-02-12T22:02:54.747283899Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 22:02:54.749794 env[1637]: time="2024-02-12T22:02:54.747308838Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 22:02:54.749794 env[1637]: time="2024-02-12T22:02:54.747329333Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 22:02:54.749794 env[1637]: time="2024-02-12T22:02:54.749652039Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 22:02:54.749794 env[1637]: time="2024-02-12T22:02:54.749690305Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 22:02:54.749794 env[1637]: time="2024-02-12T22:02:54.749714038Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 22:02:54.750136 env[1637]: time="2024-02-12T22:02:54.749918080Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 22:02:54.750136 env[1637]: time="2024-02-12T22:02:54.750078756Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 22:02:54.751038 env[1637]: time="2024-02-12T22:02:54.750987303Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 22:02:54.751038 env[1637]: time="2024-02-12T22:02:54.751033158Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.751152 env[1637]: time="2024-02-12T22:02:54.751056122Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 22:02:54.751152 env[1637]: time="2024-02-12T22:02:54.751129512Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.751238 env[1637]: time="2024-02-12T22:02:54.751151545Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.751281 env[1637]: time="2024-02-12T22:02:54.751237144Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.751281 env[1637]: time="2024-02-12T22:02:54.751259333Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.751363 env[1637]: time="2024-02-12T22:02:54.751279431Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.751363 env[1637]: time="2024-02-12T22:02:54.751299245Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.751363 env[1637]: time="2024-02-12T22:02:54.751318438Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.751363 env[1637]: time="2024-02-12T22:02:54.751338337Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.751514 env[1637]: time="2024-02-12T22:02:54.751361286Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 22:02:54.751568 env[1637]: time="2024-02-12T22:02:54.751531383Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.751568 env[1637]: time="2024-02-12T22:02:54.751554770Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.755952 env[1637]: time="2024-02-12T22:02:54.751574742Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.755952 env[1637]: time="2024-02-12T22:02:54.751608480Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 22:02:54.755952 env[1637]: time="2024-02-12T22:02:54.755933315Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 22:02:54.756117 env[1637]: time="2024-02-12T22:02:54.755967147Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 22:02:54.756117 env[1637]: time="2024-02-12T22:02:54.755995738Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 22:02:54.756117 env[1637]: time="2024-02-12T22:02:54.756044387Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 22:02:54.756406 env[1637]: time="2024-02-12T22:02:54.756336689Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 22:02:54.759354 env[1637]: time="2024-02-12T22:02:54.756424887Z" level=info msg="Connect containerd service" Feb 12 22:02:54.759354 env[1637]: time="2024-02-12T22:02:54.756472717Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 22:02:54.760527 env[1637]: time="2024-02-12T22:02:54.760487989Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 22:02:54.760919 env[1637]: time="2024-02-12T22:02:54.760823082Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 22:02:54.760919 env[1637]: time="2024-02-12T22:02:54.760882884Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 22:02:54.761133 systemd[1]: Started containerd.service. Feb 12 22:02:54.763352 env[1637]: time="2024-02-12T22:02:54.763285182Z" level=info msg="Start subscribing containerd event" Feb 12 22:02:54.763522 env[1637]: time="2024-02-12T22:02:54.763373815Z" level=info msg="Start recovering state" Feb 12 22:02:54.763599 env[1637]: time="2024-02-12T22:02:54.763567567Z" level=info msg="Start event monitor" Feb 12 22:02:54.763666 env[1637]: time="2024-02-12T22:02:54.763611272Z" level=info msg="Start snapshots syncer" Feb 12 22:02:54.763666 env[1637]: time="2024-02-12T22:02:54.763626857Z" level=info msg="Start cni network conf syncer for default" Feb 12 22:02:54.763666 env[1637]: time="2024-02-12T22:02:54.763638986Z" level=info msg="Start streaming server" Feb 12 22:02:54.815526 dbus-daemon[1623]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 12 22:02:54.816372 systemd[1]: Started systemd-hostnamed.service. Feb 12 22:02:54.821580 dbus-daemon[1623]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1674 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 12 22:02:54.825654 systemd[1]: Starting polkit.service... Feb 12 22:02:54.831328 env[1637]: time="2024-02-12T22:02:54.831282961Z" level=info msg="containerd successfully booted in 0.511720s" Feb 12 22:02:54.896408 polkitd[1728]: Started polkitd version 121 Feb 12 22:02:54.935158 systemd[1]: nvidia.service: Deactivated successfully. Feb 12 22:02:54.936072 polkitd[1728]: Loading rules from directory /etc/polkit-1/rules.d Feb 12 22:02:54.936144 polkitd[1728]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 12 22:02:54.945708 polkitd[1728]: Finished loading, compiling and executing 2 rules Feb 12 22:02:54.946831 dbus-daemon[1623]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 12 22:02:54.947152 systemd[1]: Started polkit.service. Feb 12 22:02:54.949863 polkitd[1728]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 12 22:02:54.987854 systemd-hostnamed[1674]: Hostname set to (transient) Feb 12 22:02:54.987984 systemd-resolved[1593]: System hostname changed to 'ip-172-31-25-29'. Feb 12 22:02:55.025865 tar[1638]: ./portmap Feb 12 22:02:55.209499 tar[1638]: ./host-local Feb 12 22:02:55.270776 coreos-metadata[1622]: Feb 12 22:02:55.268 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Feb 12 22:02:55.276918 coreos-metadata[1622]: Feb 12 22:02:55.276 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Feb 12 22:02:55.279372 coreos-metadata[1622]: Feb 12 22:02:55.279 INFO Fetch successful Feb 12 22:02:55.279661 coreos-metadata[1622]: Feb 12 22:02:55.279 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 12 22:02:55.280487 coreos-metadata[1622]: Feb 12 22:02:55.280 INFO Fetch successful Feb 12 22:02:55.283562 unknown[1622]: wrote ssh authorized keys file for user: core Feb 12 22:02:55.312567 update-ssh-keys[1802]: Updated "/home/core/.ssh/authorized_keys" Feb 12 22:02:55.313720 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 12 22:02:55.390064 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO Create new startup processor Feb 12 22:02:55.405428 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [LongRunningPluginsManager] registered plugins: {} Feb 12 22:02:55.405630 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO Initializing bookkeeping folders Feb 12 22:02:55.406195 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO removing the completed state files Feb 12 22:02:55.407737 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO Initializing bookkeeping folders for long running plugins Feb 12 22:02:55.407886 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Feb 12 22:02:55.407998 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO Initializing healthcheck folders for long running plugins Feb 12 22:02:55.408086 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO Initializing locations for inventory plugin Feb 12 22:02:55.408175 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO Initializing default location for custom inventory Feb 12 22:02:55.408253 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO Initializing default location for file inventory Feb 12 22:02:55.408343 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO Initializing default location for role inventory Feb 12 22:02:55.408432 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO Init the cloudwatchlogs publisher Feb 12 22:02:55.408513 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [instanceID=i-0d780f9f354c34c21] Successfully loaded platform independent plugin aws:updateSsmAgent Feb 12 22:02:55.408603 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [instanceID=i-0d780f9f354c34c21] Successfully loaded platform independent plugin aws:configureDocker Feb 12 22:02:55.408688 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [instanceID=i-0d780f9f354c34c21] Successfully loaded platform independent plugin aws:refreshAssociation Feb 12 22:02:55.408773 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [instanceID=i-0d780f9f354c34c21] Successfully loaded platform independent plugin aws:configurePackage Feb 12 22:02:55.408861 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [instanceID=i-0d780f9f354c34c21] Successfully loaded platform independent plugin aws:runDocument Feb 12 22:02:55.408956 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [instanceID=i-0d780f9f354c34c21] Successfully loaded platform independent plugin aws:softwareInventory Feb 12 22:02:55.409045 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [instanceID=i-0d780f9f354c34c21] Successfully loaded platform independent plugin aws:runDockerAction Feb 12 22:02:55.409122 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [instanceID=i-0d780f9f354c34c21] Successfully loaded platform independent plugin aws:downloadContent Feb 12 22:02:55.409208 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [instanceID=i-0d780f9f354c34c21] Successfully loaded platform independent plugin aws:runPowerShellScript Feb 12 22:02:55.409299 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [instanceID=i-0d780f9f354c34c21] Successfully loaded platform dependent plugin aws:runShellScript Feb 12 22:02:55.409390 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Feb 12 22:02:55.409474 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO OS: linux, Arch: amd64 Feb 12 22:02:55.410758 amazon-ssm-agent[1692]: datastore file /var/lib/amazon/ssm/i-0d780f9f354c34c21/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Feb 12 22:02:55.416617 tar[1638]: ./vrf Feb 12 22:02:55.418631 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [MessagingDeliveryService] Starting document processing engine... Feb 12 22:02:55.514550 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [MessagingDeliveryService] [EngineProcessor] Starting Feb 12 22:02:55.609578 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Feb 12 22:02:55.618540 tar[1638]: ./bridge Feb 12 22:02:55.704103 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [MessagingDeliveryService] Starting message polling Feb 12 22:02:55.768947 tar[1638]: ./tuning Feb 12 22:02:55.798797 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [MessagingDeliveryService] Starting send replies to MDS Feb 12 22:02:55.860016 tar[1638]: ./firewall Feb 12 22:02:55.893813 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [instanceID=i-0d780f9f354c34c21] Starting association polling Feb 12 22:02:55.989290 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Feb 12 22:02:55.991892 tar[1638]: ./host-device Feb 12 22:02:56.084618 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [MessagingDeliveryService] [Association] Launching response handler Feb 12 22:02:56.105014 tar[1638]: ./sbr Feb 12 22:02:56.180337 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Feb 12 22:02:56.207301 systemd[1]: Finished prepare-critools.service. Feb 12 22:02:56.210934 tar[1638]: ./loopback Feb 12 22:02:56.261258 tar[1638]: ./dhcp Feb 12 22:02:56.276143 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Feb 12 22:02:56.372065 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Feb 12 22:02:56.457542 tar[1638]: ./ptp Feb 12 22:02:56.467255 tar[1639]: linux-amd64/LICENSE Feb 12 22:02:56.467255 tar[1639]: linux-amd64/README.md Feb 12 22:02:56.469673 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [MessageGatewayService] Starting session document processing engine... Feb 12 22:02:56.480642 systemd[1]: Finished prepare-helm.service. Feb 12 22:02:56.515384 tar[1638]: ./ipvlan Feb 12 22:02:56.565238 tar[1638]: ./bandwidth Feb 12 22:02:56.565491 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [MessageGatewayService] [EngineProcessor] Starting Feb 12 22:02:56.649206 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 22:02:56.662222 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Feb 12 22:02:56.696517 sshd_keygen[1659]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 22:02:56.727332 systemd[1]: Finished sshd-keygen.service. Feb 12 22:02:56.730911 systemd[1]: Starting issuegen.service... Feb 12 22:02:56.740485 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 22:02:56.740694 systemd[1]: Finished issuegen.service. Feb 12 22:02:56.743608 systemd[1]: Starting systemd-user-sessions.service... Feb 12 22:02:56.757111 systemd[1]: Finished systemd-user-sessions.service. Feb 12 22:02:56.761241 systemd[1]: Started getty@tty1.service. Feb 12 22:02:56.761686 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0d780f9f354c34c21, requestId: aeddd446-af72-438a-b224-737528fa6519 Feb 12 22:02:56.765560 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 22:02:56.767569 systemd[1]: Reached target getty.target. Feb 12 22:02:56.768840 systemd[1]: Reached target multi-user.target. Feb 12 22:02:56.773262 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 22:02:56.790371 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 22:02:56.791084 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 22:02:56.793114 systemd[1]: Startup finished in 845ms (kernel) + 8.700s (initrd) + 10.229s (userspace) = 19.775s. Feb 12 22:02:56.816520 locksmithd[1682]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 22:02:56.858727 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [OfflineService] Starting document processing engine... Feb 12 22:02:56.955946 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [OfflineService] [EngineProcessor] Starting Feb 12 22:02:57.053011 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [OfflineService] [EngineProcessor] Initial processing Feb 12 22:02:57.153782 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [OfflineService] Starting message polling Feb 12 22:02:57.254328 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [OfflineService] Starting send replies to MDS Feb 12 22:02:57.353334 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [LongRunningPluginsManager] starting long running plugin manager Feb 12 22:02:57.453967 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Feb 12 22:02:57.552614 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [HealthCheck] HealthCheck reporting agent health. Feb 12 22:02:57.653671 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Feb 12 22:02:57.753593 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [MessageGatewayService] listening reply. Feb 12 22:02:57.852515 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [StartupProcessor] Executing startup processor tasks Feb 12 22:02:57.951660 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Feb 12 22:02:58.050897 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Feb 12 22:02:58.150638 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.2 Feb 12 22:02:58.251369 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0d780f9f354c34c21?role=subscribe&stream=input Feb 12 22:02:58.351577 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0d780f9f354c34c21?role=subscribe&stream=input Feb 12 22:02:58.452045 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [MessageGatewayService] Starting receiving message from control channel Feb 12 22:02:58.552819 amazon-ssm-agent[1692]: 2024-02-12 22:02:55 INFO [MessageGatewayService] [EngineProcessor] Initial processing Feb 12 22:03:03.670879 systemd[1]: Created slice system-sshd.slice. Feb 12 22:03:03.673548 systemd[1]: Started sshd@0-172.31.25.29:22-139.178.89.65:54210.service. Feb 12 22:03:03.871582 sshd[1841]: Accepted publickey for core from 139.178.89.65 port 54210 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 22:03:03.874924 sshd[1841]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:03:03.888156 systemd[1]: Created slice user-500.slice. Feb 12 22:03:03.890132 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 22:03:03.893445 systemd-logind[1632]: New session 1 of user core. Feb 12 22:03:03.904406 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 22:03:03.906839 systemd[1]: Starting user@500.service... Feb 12 22:03:03.911148 (systemd)[1844]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:03:04.019804 systemd[1844]: Queued start job for default target default.target. Feb 12 22:03:04.020501 systemd[1844]: Reached target paths.target. Feb 12 22:03:04.020531 systemd[1844]: Reached target sockets.target. Feb 12 22:03:04.020549 systemd[1844]: Reached target timers.target. Feb 12 22:03:04.020565 systemd[1844]: Reached target basic.target. Feb 12 22:03:04.020635 systemd[1844]: Reached target default.target. Feb 12 22:03:04.020677 systemd[1844]: Startup finished in 101ms. Feb 12 22:03:04.023282 systemd[1]: Started user@500.service. Feb 12 22:03:04.025287 systemd[1]: Started session-1.scope. Feb 12 22:03:04.181744 systemd[1]: Started sshd@1-172.31.25.29:22-139.178.89.65:54226.service. Feb 12 22:03:04.352811 sshd[1853]: Accepted publickey for core from 139.178.89.65 port 54226 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 22:03:04.354289 sshd[1853]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:03:04.363129 systemd[1]: Started session-2.scope. Feb 12 22:03:04.363814 systemd-logind[1632]: New session 2 of user core. Feb 12 22:03:04.504821 sshd[1853]: pam_unix(sshd:session): session closed for user core Feb 12 22:03:04.508449 systemd[1]: sshd@1-172.31.25.29:22-139.178.89.65:54226.service: Deactivated successfully. Feb 12 22:03:04.509405 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 22:03:04.510451 systemd-logind[1632]: Session 2 logged out. Waiting for processes to exit. Feb 12 22:03:04.511823 systemd-logind[1632]: Removed session 2. Feb 12 22:03:04.532102 systemd[1]: Started sshd@2-172.31.25.29:22-139.178.89.65:54230.service. Feb 12 22:03:04.702208 sshd[1859]: Accepted publickey for core from 139.178.89.65 port 54230 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 22:03:04.704393 sshd[1859]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:03:04.713740 systemd-logind[1632]: New session 3 of user core. Feb 12 22:03:04.714546 systemd[1]: Started session-3.scope. Feb 12 22:03:04.842870 sshd[1859]: pam_unix(sshd:session): session closed for user core Feb 12 22:03:04.847193 systemd[1]: sshd@2-172.31.25.29:22-139.178.89.65:54230.service: Deactivated successfully. Feb 12 22:03:04.850341 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 22:03:04.851894 systemd-logind[1632]: Session 3 logged out. Waiting for processes to exit. Feb 12 22:03:04.854411 systemd-logind[1632]: Removed session 3. Feb 12 22:03:04.868987 systemd[1]: Started sshd@3-172.31.25.29:22-139.178.89.65:54244.service. Feb 12 22:03:05.047303 sshd[1865]: Accepted publickey for core from 139.178.89.65 port 54244 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 22:03:05.050089 sshd[1865]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:03:05.067773 systemd[1]: Started session-4.scope. Feb 12 22:03:05.068440 systemd-logind[1632]: New session 4 of user core. Feb 12 22:03:05.206919 sshd[1865]: pam_unix(sshd:session): session closed for user core Feb 12 22:03:05.211256 systemd[1]: sshd@3-172.31.25.29:22-139.178.89.65:54244.service: Deactivated successfully. Feb 12 22:03:05.212498 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 22:03:05.213635 systemd-logind[1632]: Session 4 logged out. Waiting for processes to exit. Feb 12 22:03:05.215090 systemd-logind[1632]: Removed session 4. Feb 12 22:03:05.235825 systemd[1]: Started sshd@4-172.31.25.29:22-139.178.89.65:54250.service. Feb 12 22:03:05.408925 sshd[1871]: Accepted publickey for core from 139.178.89.65 port 54250 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 22:03:05.412367 sshd[1871]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:03:05.419282 systemd[1]: Started session-5.scope. Feb 12 22:03:05.419856 systemd-logind[1632]: New session 5 of user core. Feb 12 22:03:05.562661 sudo[1874]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 22:03:05.562966 sudo[1874]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:03:05.572920 dbus-daemon[1623]: \xd0=\xe0$: received setenforce notice (enforcing=-1618346368) Feb 12 22:03:05.579809 sudo[1874]: pam_unix(sudo:session): session closed for user root Feb 12 22:03:05.605458 sshd[1871]: pam_unix(sshd:session): session closed for user core Feb 12 22:03:05.610037 systemd[1]: sshd@4-172.31.25.29:22-139.178.89.65:54250.service: Deactivated successfully. Feb 12 22:03:05.614009 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 22:03:05.615512 systemd-logind[1632]: Session 5 logged out. Waiting for processes to exit. Feb 12 22:03:05.618230 systemd-logind[1632]: Removed session 5. Feb 12 22:03:05.634679 systemd[1]: Started sshd@5-172.31.25.29:22-139.178.89.65:54256.service. Feb 12 22:03:05.823275 sshd[1878]: Accepted publickey for core from 139.178.89.65 port 54256 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 22:03:05.825047 sshd[1878]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:03:05.830929 systemd-logind[1632]: New session 6 of user core. Feb 12 22:03:05.831504 systemd[1]: Started session-6.scope. Feb 12 22:03:05.939949 sudo[1882]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 22:03:05.940318 sudo[1882]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:03:05.944823 sudo[1882]: pam_unix(sudo:session): session closed for user root Feb 12 22:03:05.953510 sudo[1881]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 22:03:05.954036 sudo[1881]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:03:05.969859 systemd[1]: Stopping audit-rules.service... Feb 12 22:03:05.971000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 22:03:05.972471 auditctl[1885]: No rules Feb 12 22:03:05.973276 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 22:03:05.973811 systemd[1]: Stopped audit-rules.service. Feb 12 22:03:05.973967 kernel: kauditd_printk_skb: 178 callbacks suppressed Feb 12 22:03:05.974007 kernel: audit: type=1305 audit(1707775385.971:160): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 22:03:05.980268 systemd[1]: Starting audit-rules.service... Feb 12 22:03:05.994629 kernel: audit: type=1300 audit(1707775385.971:160): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffddb7f920 a2=420 a3=0 items=0 ppid=1 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:05.971000 audit[1885]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffddb7f920 a2=420 a3=0 items=0 ppid=1 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:05.971000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 22:03:05.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:06.004888 kernel: audit: type=1327 audit(1707775385.971:160): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 22:03:06.004957 kernel: audit: type=1131 audit(1707775385.973:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:06.019105 augenrules[1902]: No rules Feb 12 22:03:06.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:06.019673 systemd[1]: Finished audit-rules.service. Feb 12 22:03:06.022751 sudo[1881]: pam_unix(sudo:session): session closed for user root Feb 12 22:03:06.018000 audit[1881]: USER_END pid=1881 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:03:06.043988 kernel: audit: type=1130 audit(1707775386.018:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:06.044089 kernel: audit: type=1106 audit(1707775386.018:163): pid=1881 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:03:06.044134 kernel: audit: type=1104 audit(1707775386.018:164): pid=1881 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:03:06.018000 audit[1881]: CRED_DISP pid=1881 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:03:06.054982 sshd[1878]: pam_unix(sshd:session): session closed for user core Feb 12 22:03:06.055000 audit[1878]: USER_END pid=1878 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:03:06.059204 systemd[1]: sshd@5-172.31.25.29:22-139.178.89.65:54256.service: Deactivated successfully. Feb 12 22:03:06.060218 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 22:03:06.067114 systemd-logind[1632]: Session 6 logged out. Waiting for processes to exit. Feb 12 22:03:06.055000 audit[1878]: CRED_DISP pid=1878 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:03:06.069501 systemd-logind[1632]: Removed session 6. Feb 12 22:03:06.078706 kernel: audit: type=1106 audit(1707775386.055:165): pid=1878 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:03:06.078884 kernel: audit: type=1104 audit(1707775386.055:166): pid=1878 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:03:06.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.25.29:22-139.178.89.65:54256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:06.087030 kernel: audit: type=1131 audit(1707775386.058:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.25.29:22-139.178.89.65:54256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:06.091548 systemd[1]: Started sshd@6-172.31.25.29:22-139.178.89.65:54264.service. Feb 12 22:03:06.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.25.29:22-139.178.89.65:54264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:06.272000 audit[1908]: USER_ACCT pid=1908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:03:06.273743 sshd[1908]: Accepted publickey for core from 139.178.89.65 port 54264 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 22:03:06.274000 audit[1908]: CRED_ACQ pid=1908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:03:06.274000 audit[1908]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6b51aa80 a2=3 a3=0 items=0 ppid=1 pid=1908 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:06.274000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:03:06.275776 sshd[1908]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:03:06.282643 systemd-logind[1632]: New session 7 of user core. Feb 12 22:03:06.282963 systemd[1]: Started session-7.scope. Feb 12 22:03:06.290000 audit[1908]: USER_START pid=1908 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:03:06.291000 audit[1910]: CRED_ACQ pid=1910 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:03:06.388000 audit[1911]: USER_ACCT pid=1911 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:03:06.389191 sudo[1911]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 22:03:06.388000 audit[1911]: CRED_REFR pid=1911 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:03:06.390190 sudo[1911]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:03:06.395000 audit[1911]: USER_START pid=1911 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:03:07.123021 systemd[1]: Starting docker.service... Feb 12 22:03:07.185676 env[1926]: time="2024-02-12T22:03:07.185624362Z" level=info msg="Starting up" Feb 12 22:03:07.188171 env[1926]: time="2024-02-12T22:03:07.188141879Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 22:03:07.188325 env[1926]: time="2024-02-12T22:03:07.188311532Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 22:03:07.188388 env[1926]: time="2024-02-12T22:03:07.188377344Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 22:03:07.188436 env[1926]: time="2024-02-12T22:03:07.188428014Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 22:03:07.194472 env[1926]: time="2024-02-12T22:03:07.194443913Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 22:03:07.194622 env[1926]: time="2024-02-12T22:03:07.194609321Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 22:03:07.194685 env[1926]: time="2024-02-12T22:03:07.194674437Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 22:03:07.194727 env[1926]: time="2024-02-12T22:03:07.194719135Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 22:03:07.260521 env[1926]: time="2024-02-12T22:03:07.260483134Z" level=info msg="Loading containers: start." Feb 12 22:03:07.352000 audit[1957]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1957 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.352000 audit[1957]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe1c28b6d0 a2=0 a3=7ffe1c28b6bc items=0 ppid=1926 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.352000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 22:03:07.356000 audit[1959]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.356000 audit[1959]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd11b9f070 a2=0 a3=7ffd11b9f05c items=0 ppid=1926 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.356000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 22:03:07.359000 audit[1961]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1961 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.359000 audit[1961]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff20bb0c20 a2=0 a3=7fff20bb0c0c items=0 ppid=1926 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.359000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 22:03:07.362000 audit[1963]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1963 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.362000 audit[1963]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff975c31a0 a2=0 a3=7fff975c318c items=0 ppid=1926 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.362000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 22:03:07.367000 audit[1965]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1965 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.367000 audit[1965]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd89e7b400 a2=0 a3=7ffd89e7b3ec items=0 ppid=1926 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.367000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 22:03:07.389000 audit[1970]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1970 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.389000 audit[1970]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcf52834a0 a2=0 a3=7ffcf528348c items=0 ppid=1926 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.389000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 22:03:07.403000 audit[1972]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1972 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.403000 audit[1972]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd36aa0d50 a2=0 a3=7ffd36aa0d3c items=0 ppid=1926 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.403000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 22:03:07.406000 audit[1974]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1974 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.406000 audit[1974]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd3b1f2dc0 a2=0 a3=7ffd3b1f2dac items=0 ppid=1926 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.406000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 22:03:07.410000 audit[1976]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1976 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.410000 audit[1976]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc8df2be60 a2=0 a3=7ffc8df2be4c items=0 ppid=1926 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.410000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:03:07.424000 audit[1980]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.424000 audit[1980]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe0904e420 a2=0 a3=7ffe0904e40c items=0 ppid=1926 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.424000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:03:07.426000 audit[1981]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1981 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.426000 audit[1981]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcb6fe4d90 a2=0 a3=7ffcb6fe4d7c items=0 ppid=1926 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.426000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:03:07.443918 kernel: Initializing XFRM netlink socket Feb 12 22:03:07.545617 env[1926]: time="2024-02-12T22:03:07.545555981Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 22:03:07.546916 (udev-worker)[1937]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:03:07.610000 audit[1989]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1989 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.610000 audit[1989]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc59757340 a2=0 a3=7ffc5975732c items=0 ppid=1926 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.610000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 22:03:07.690000 audit[1992]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.690000 audit[1992]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffdfd0c5230 a2=0 a3=7ffdfd0c521c items=0 ppid=1926 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.690000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 22:03:07.695000 audit[1995]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1995 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.695000 audit[1995]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdf45f4890 a2=0 a3=7ffdf45f487c items=0 ppid=1926 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.695000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 22:03:07.698000 audit[1997]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1997 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.698000 audit[1997]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff143a66a0 a2=0 a3=7fff143a668c items=0 ppid=1926 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.698000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 22:03:07.701000 audit[1999]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1999 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.701000 audit[1999]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffdee2c7850 a2=0 a3=7ffdee2c783c items=0 ppid=1926 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.701000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 22:03:07.703000 audit[2001]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2001 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.703000 audit[2001]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd7d31d0c0 a2=0 a3=7ffd7d31d0ac items=0 ppid=1926 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.703000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 22:03:07.706000 audit[2003]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2003 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.706000 audit[2003]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd5bc78240 a2=0 a3=7ffd5bc7822c items=0 ppid=1926 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.706000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 22:03:07.722000 audit[2006]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2006 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.722000 audit[2006]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff83b16b40 a2=0 a3=7fff83b16b2c items=0 ppid=1926 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.722000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 22:03:07.727000 audit[2008]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2008 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.727000 audit[2008]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc2d732d00 a2=0 a3=7ffc2d732cec items=0 ppid=1926 pid=2008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.727000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 22:03:07.729000 audit[2010]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2010 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.729000 audit[2010]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fffd8779bc0 a2=0 a3=7fffd8779bac items=0 ppid=1926 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.729000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 22:03:07.733000 audit[2012]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2012 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.733000 audit[2012]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcd4961710 a2=0 a3=7ffcd49616fc items=0 ppid=1926 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.733000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 22:03:07.735685 systemd-networkd[1459]: docker0: Link UP Feb 12 22:03:07.750000 audit[2016]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2016 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.750000 audit[2016]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc8f4969a0 a2=0 a3=7ffc8f49698c items=0 ppid=1926 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.750000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:03:07.753000 audit[2017]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2017 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:07.753000 audit[2017]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe81842ab0 a2=0 a3=7ffe81842a9c items=0 ppid=1926 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:07.753000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:03:07.755499 env[1926]: time="2024-02-12T22:03:07.755459664Z" level=info msg="Loading containers: done." Feb 12 22:03:07.776770 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3126752765-merged.mount: Deactivated successfully. Feb 12 22:03:07.796350 env[1926]: time="2024-02-12T22:03:07.796299079Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 22:03:07.796590 env[1926]: time="2024-02-12T22:03:07.796536096Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 22:03:07.796819 env[1926]: time="2024-02-12T22:03:07.796792760Z" level=info msg="Daemon has completed initialization" Feb 12 22:03:07.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:07.828121 systemd[1]: Started docker.service. Feb 12 22:03:07.862309 env[1926]: time="2024-02-12T22:03:07.862037008Z" level=info msg="API listen on /run/docker.sock" Feb 12 22:03:07.890655 systemd[1]: Reloading. Feb 12 22:03:08.035999 /usr/lib/systemd/system-generators/torcx-generator[2064]: time="2024-02-12T22:03:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:03:08.040615 /usr/lib/systemd/system-generators/torcx-generator[2064]: time="2024-02-12T22:03:08Z" level=info msg="torcx already run" Feb 12 22:03:08.165523 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:03:08.165549 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:03:08.189873 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:03:08.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.280000 audit: BPF prog-id=34 op=LOAD Feb 12 22:03:08.280000 audit: BPF prog-id=24 op=UNLOAD Feb 12 22:03:08.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.280000 audit: BPF prog-id=35 op=LOAD Feb 12 22:03:08.280000 audit: BPF prog-id=25 op=UNLOAD Feb 12 22:03:08.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit: BPF prog-id=36 op=LOAD Feb 12 22:03:08.282000 audit: BPF prog-id=26 op=UNLOAD Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit: BPF prog-id=37 op=LOAD Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.282000 audit: BPF prog-id=38 op=LOAD Feb 12 22:03:08.282000 audit: BPF prog-id=27 op=UNLOAD Feb 12 22:03:08.282000 audit: BPF prog-id=28 op=UNLOAD Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit: BPF prog-id=39 op=LOAD Feb 12 22:03:08.283000 audit: BPF prog-id=29 op=UNLOAD Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit: BPF prog-id=40 op=LOAD Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.283000 audit: BPF prog-id=41 op=LOAD Feb 12 22:03:08.283000 audit: BPF prog-id=30 op=UNLOAD Feb 12 22:03:08.283000 audit: BPF prog-id=31 op=UNLOAD Feb 12 22:03:08.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.285000 audit: BPF prog-id=42 op=LOAD Feb 12 22:03:08.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.285000 audit: BPF prog-id=43 op=LOAD Feb 12 22:03:08.285000 audit: BPF prog-id=18 op=UNLOAD Feb 12 22:03:08.285000 audit: BPF prog-id=19 op=UNLOAD Feb 12 22:03:08.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.287000 audit: BPF prog-id=44 op=LOAD Feb 12 22:03:08.287000 audit: BPF prog-id=21 op=UNLOAD Feb 12 22:03:08.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.288000 audit: BPF prog-id=45 op=LOAD Feb 12 22:03:08.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.288000 audit: BPF prog-id=46 op=LOAD Feb 12 22:03:08.288000 audit: BPF prog-id=22 op=UNLOAD Feb 12 22:03:08.288000 audit: BPF prog-id=23 op=UNLOAD Feb 12 22:03:08.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit: BPF prog-id=47 op=LOAD Feb 12 22:03:08.292000 audit: BPF prog-id=15 op=UNLOAD Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit: BPF prog-id=48 op=LOAD Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.292000 audit: BPF prog-id=49 op=LOAD Feb 12 22:03:08.292000 audit: BPF prog-id=16 op=UNLOAD Feb 12 22:03:08.292000 audit: BPF prog-id=17 op=UNLOAD Feb 12 22:03:08.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.296000 audit: BPF prog-id=50 op=LOAD Feb 12 22:03:08.296000 audit: BPF prog-id=32 op=UNLOAD Feb 12 22:03:08.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:08.297000 audit: BPF prog-id=51 op=LOAD Feb 12 22:03:08.297000 audit: BPF prog-id=20 op=UNLOAD Feb 12 22:03:08.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:08.312204 systemd[1]: Started kubelet.service. Feb 12 22:03:08.416348 kubelet[2115]: E0212 22:03:08.416200 2115 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 22:03:08.418721 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 22:03:08.418888 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 22:03:08.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:03:09.091502 env[1637]: time="2024-02-12T22:03:09.091449375Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 12 22:03:09.764355 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1729790321.mount: Deactivated successfully. Feb 12 22:03:12.769363 env[1637]: time="2024-02-12T22:03:12.769282264Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:12.797023 env[1637]: time="2024-02-12T22:03:12.796975000Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:12.808167 env[1637]: time="2024-02-12T22:03:12.808115862Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:12.823632 env[1637]: time="2024-02-12T22:03:12.823583950Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:12.824763 env[1637]: time="2024-02-12T22:03:12.824720644Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f\"" Feb 12 22:03:12.840559 env[1637]: time="2024-02-12T22:03:12.840135930Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 12 22:03:15.933399 env[1637]: time="2024-02-12T22:03:15.933338477Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:15.938204 env[1637]: time="2024-02-12T22:03:15.938160203Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:15.941747 env[1637]: time="2024-02-12T22:03:15.941697400Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:15.944463 env[1637]: time="2024-02-12T22:03:15.944407815Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:15.945166 env[1637]: time="2024-02-12T22:03:15.945132701Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486\"" Feb 12 22:03:15.960034 env[1637]: time="2024-02-12T22:03:15.959994992Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 12 22:03:16.386385 amazon-ssm-agent[1692]: 2024-02-12 22:03:16 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Feb 12 22:03:17.894626 env[1637]: time="2024-02-12T22:03:17.894557206Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:17.899996 env[1637]: time="2024-02-12T22:03:17.899945047Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:17.902942 env[1637]: time="2024-02-12T22:03:17.902889480Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:17.905867 env[1637]: time="2024-02-12T22:03:17.905826084Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:17.907016 env[1637]: time="2024-02-12T22:03:17.906975960Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e\"" Feb 12 22:03:17.930115 env[1637]: time="2024-02-12T22:03:17.930073208Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 12 22:03:18.542546 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 22:03:18.554215 kernel: kauditd_printk_skb: 292 callbacks suppressed Feb 12 22:03:18.554306 kernel: audit: type=1130 audit(1707775398.541:410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:18.554346 kernel: audit: type=1131 audit(1707775398.541:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:18.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:18.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:18.542832 systemd[1]: Stopped kubelet.service. Feb 12 22:03:18.544669 systemd[1]: Started kubelet.service. Feb 12 22:03:18.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:18.561577 kernel: audit: type=1130 audit(1707775398.543:412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:18.650453 kubelet[2149]: E0212 22:03:18.650389 2149 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 22:03:18.655068 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 22:03:18.655239 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 22:03:18.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:03:18.661691 kernel: audit: type=1131 audit(1707775398.654:413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:03:19.481689 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2618960043.mount: Deactivated successfully. Feb 12 22:03:20.344194 env[1637]: time="2024-02-12T22:03:20.344134634Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:20.347355 env[1637]: time="2024-02-12T22:03:20.347312158Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:20.349633 env[1637]: time="2024-02-12T22:03:20.349598969Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:20.352622 env[1637]: time="2024-02-12T22:03:20.352535921Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:20.354279 env[1637]: time="2024-02-12T22:03:20.354238499Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 12 22:03:20.369016 env[1637]: time="2024-02-12T22:03:20.368976461Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 22:03:20.863505 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3158409506.mount: Deactivated successfully. Feb 12 22:03:20.874271 env[1637]: time="2024-02-12T22:03:20.874214436Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:20.877315 env[1637]: time="2024-02-12T22:03:20.877262451Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:20.879786 env[1637]: time="2024-02-12T22:03:20.879744179Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:20.882904 env[1637]: time="2024-02-12T22:03:20.882861072Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:20.883703 env[1637]: time="2024-02-12T22:03:20.883667580Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 12 22:03:20.897764 env[1637]: time="2024-02-12T22:03:20.897727047Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 12 22:03:21.996029 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount841137731.mount: Deactivated successfully. Feb 12 22:03:24.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:24.997233 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 12 22:03:25.004733 kernel: audit: type=1131 audit(1707775404.995:414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:25.024066 kernel: audit: type=1334 audit(1707775405.019:415): prog-id=41 op=UNLOAD Feb 12 22:03:25.024199 kernel: audit: type=1334 audit(1707775405.019:416): prog-id=40 op=UNLOAD Feb 12 22:03:25.019000 audit: BPF prog-id=41 op=UNLOAD Feb 12 22:03:25.019000 audit: BPF prog-id=40 op=UNLOAD Feb 12 22:03:25.026007 kernel: audit: type=1334 audit(1707775405.019:417): prog-id=39 op=UNLOAD Feb 12 22:03:25.019000 audit: BPF prog-id=39 op=UNLOAD Feb 12 22:03:27.239260 env[1637]: time="2024-02-12T22:03:27.239202509Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:27.242888 env[1637]: time="2024-02-12T22:03:27.242839957Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:27.246457 env[1637]: time="2024-02-12T22:03:27.246398950Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:27.248855 env[1637]: time="2024-02-12T22:03:27.248801318Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:27.249659 env[1637]: time="2024-02-12T22:03:27.249624612Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Feb 12 22:03:27.268037 env[1637]: time="2024-02-12T22:03:27.267996814Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 12 22:03:27.947508 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3337929870.mount: Deactivated successfully. Feb 12 22:03:28.767651 env[1637]: time="2024-02-12T22:03:28.767601559Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:28.772268 env[1637]: time="2024-02-12T22:03:28.772175596Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:28.775906 env[1637]: time="2024-02-12T22:03:28.775862517Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:28.782942 env[1637]: time="2024-02-12T22:03:28.782780432Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:28.792399 env[1637]: time="2024-02-12T22:03:28.792351014Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Feb 12 22:03:28.792552 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 12 22:03:28.792847 systemd[1]: Stopped kubelet.service. Feb 12 22:03:28.814424 kernel: audit: type=1130 audit(1707775408.791:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:28.814511 kernel: audit: type=1131 audit(1707775408.791:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:28.814541 kernel: audit: type=1130 audit(1707775408.791:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:28.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:28.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:28.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:28.798790 systemd[1]: Started kubelet.service. Feb 12 22:03:28.919773 kubelet[2172]: E0212 22:03:28.919707 2172 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 22:03:28.923510 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 22:03:28.923712 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 22:03:28.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:03:28.930613 kernel: audit: type=1131 audit(1707775408.923:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:03:32.399373 systemd[1]: Stopped kubelet.service. Feb 12 22:03:32.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:32.410432 kernel: audit: type=1130 audit(1707775412.398:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:32.410519 kernel: audit: type=1131 audit(1707775412.398:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:32.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:32.429127 systemd[1]: Reloading. Feb 12 22:03:32.556415 /usr/lib/systemd/system-generators/torcx-generator[2257]: time="2024-02-12T22:03:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:03:32.556500 /usr/lib/systemd/system-generators/torcx-generator[2257]: time="2024-02-12T22:03:32Z" level=info msg="torcx already run" Feb 12 22:03:32.717639 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:03:32.717661 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:03:32.751766 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:03:32.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.869380 kernel: audit: type=1400 audit(1707775412.857:424): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.869523 kernel: audit: type=1400 audit(1707775412.857:425): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.876616 kernel: audit: type=1400 audit(1707775412.857:426): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.889949 kernel: audit: type=1400 audit(1707775412.857:427): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.890132 kernel: audit: type=1400 audit(1707775412.857:428): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.890227 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 22:03:32.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.896365 kernel: audit: type=1400 audit(1707775412.857:429): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.896518 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 22:03:32.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.863000 audit: BPF prog-id=52 op=LOAD Feb 12 22:03:32.863000 audit: BPF prog-id=34 op=UNLOAD Feb 12 22:03:32.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.868000 audit: BPF prog-id=53 op=LOAD Feb 12 22:03:32.868000 audit: BPF prog-id=35 op=UNLOAD Feb 12 22:03:32.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.875000 audit: BPF prog-id=54 op=LOAD Feb 12 22:03:32.875000 audit: BPF prog-id=36 op=UNLOAD Feb 12 22:03:32.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.875000 audit: BPF prog-id=55 op=LOAD Feb 12 22:03:32.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.882000 audit: BPF prog-id=56 op=LOAD Feb 12 22:03:32.882000 audit: BPF prog-id=37 op=UNLOAD Feb 12 22:03:32.882000 audit: BPF prog-id=38 op=UNLOAD Feb 12 22:03:32.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.888000 audit: BPF prog-id=57 op=LOAD Feb 12 22:03:32.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.896000 audit: BPF prog-id=58 op=LOAD Feb 12 22:03:32.896000 audit: BPF prog-id=42 op=UNLOAD Feb 12 22:03:32.896000 audit: BPF prog-id=43 op=UNLOAD Feb 12 22:03:32.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.899000 audit: BPF prog-id=59 op=LOAD Feb 12 22:03:32.899000 audit: BPF prog-id=44 op=UNLOAD Feb 12 22:03:32.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.899000 audit: BPF prog-id=60 op=LOAD Feb 12 22:03:32.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.899000 audit: BPF prog-id=61 op=LOAD Feb 12 22:03:32.899000 audit: BPF prog-id=45 op=UNLOAD Feb 12 22:03:32.899000 audit: BPF prog-id=46 op=UNLOAD Feb 12 22:03:32.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.904000 audit: BPF prog-id=62 op=LOAD Feb 12 22:03:32.904000 audit: BPF prog-id=47 op=UNLOAD Feb 12 22:03:32.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.904000 audit: BPF prog-id=63 op=LOAD Feb 12 22:03:32.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.904000 audit: BPF prog-id=64 op=LOAD Feb 12 22:03:32.904000 audit: BPF prog-id=48 op=UNLOAD Feb 12 22:03:32.904000 audit: BPF prog-id=49 op=UNLOAD Feb 12 22:03:32.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.907000 audit: BPF prog-id=65 op=LOAD Feb 12 22:03:32.907000 audit: BPF prog-id=50 op=UNLOAD Feb 12 22:03:32.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:32.908000 audit: BPF prog-id=66 op=LOAD Feb 12 22:03:32.908000 audit: BPF prog-id=51 op=UNLOAD Feb 12 22:03:32.929879 systemd[1]: Started kubelet.service. Feb 12 22:03:32.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:33.013229 kubelet[2309]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 22:03:33.013229 kubelet[2309]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:03:33.013229 kubelet[2309]: I0212 22:03:33.007996 2309 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 22:03:33.018099 kubelet[2309]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 22:03:33.018099 kubelet[2309]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:03:34.042198 kubelet[2309]: I0212 22:03:34.041410 2309 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 22:03:34.042198 kubelet[2309]: I0212 22:03:34.041439 2309 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 22:03:34.042198 kubelet[2309]: I0212 22:03:34.041701 2309 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 22:03:34.047340 kubelet[2309]: E0212 22:03:34.047314 2309 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.25.29:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:34.047581 kubelet[2309]: I0212 22:03:34.047551 2309 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 22:03:34.050796 kubelet[2309]: I0212 22:03:34.050756 2309 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 22:03:34.051029 kubelet[2309]: I0212 22:03:34.051007 2309 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 22:03:34.051120 kubelet[2309]: I0212 22:03:34.051101 2309 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 22:03:34.051254 kubelet[2309]: I0212 22:03:34.051132 2309 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 22:03:34.051254 kubelet[2309]: I0212 22:03:34.051149 2309 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 22:03:34.051350 kubelet[2309]: I0212 22:03:34.051283 2309 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:03:34.063267 kubelet[2309]: I0212 22:03:34.063239 2309 kubelet.go:398] "Attempting to sync node with API server" Feb 12 22:03:34.063267 kubelet[2309]: I0212 22:03:34.063269 2309 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 22:03:34.063512 kubelet[2309]: I0212 22:03:34.063295 2309 kubelet.go:297] "Adding apiserver pod source" Feb 12 22:03:34.063512 kubelet[2309]: I0212 22:03:34.063313 2309 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 22:03:34.070940 kubelet[2309]: W0212 22:03:34.070584 2309 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.25.29:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:34.070940 kubelet[2309]: E0212 22:03:34.070735 2309 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.25.29:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:34.070940 kubelet[2309]: W0212 22:03:34.070822 2309 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.25.29:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-29&limit=500&resourceVersion=0": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:34.070940 kubelet[2309]: E0212 22:03:34.070949 2309 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.25.29:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-29&limit=500&resourceVersion=0": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:34.071327 kubelet[2309]: I0212 22:03:34.071158 2309 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 22:03:34.071556 kubelet[2309]: W0212 22:03:34.071529 2309 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 22:03:34.072251 kubelet[2309]: I0212 22:03:34.072126 2309 server.go:1186] "Started kubelet" Feb 12 22:03:34.072732 kubelet[2309]: I0212 22:03:34.072709 2309 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 22:03:34.074117 kubelet[2309]: E0212 22:03:34.073842 2309 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-29.17b33cb0dfe90168", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-29", UID:"ip-172-31-25-29", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-29"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 34, 72050024, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 34, 72050024, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://172.31.25.29:6443/api/v1/namespaces/default/events": dial tcp 172.31.25.29:6443: connect: connection refused'(may retry after sleeping) Feb 12 22:03:34.076112 kubelet[2309]: I0212 22:03:34.076090 2309 server.go:451] "Adding debug handlers to kubelet server" Feb 12 22:03:34.075000 audit[2309]: AVC avc: denied { mac_admin } for pid=2309 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.075000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:03:34.075000 audit[2309]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b6fa10 a1=c000b18150 a2=c000b6f9e0 a3=25 items=0 ppid=1 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.075000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:03:34.075000 audit[2309]: AVC avc: denied { mac_admin } for pid=2309 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.075000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:03:34.075000 audit[2309]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006c7000 a1=c000b18168 a2=c000b6faa0 a3=25 items=0 ppid=1 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.075000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:03:34.077734 kubelet[2309]: I0212 22:03:34.076970 2309 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 22:03:34.077734 kubelet[2309]: I0212 22:03:34.077015 2309 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 22:03:34.077734 kubelet[2309]: I0212 22:03:34.077132 2309 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 22:03:34.078683 kubelet[2309]: E0212 22:03:34.078669 2309 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 22:03:34.078777 kubelet[2309]: E0212 22:03:34.078769 2309 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 22:03:34.081000 audit[2319]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:34.081000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff6bf4bf50 a2=0 a3=7fff6bf4bf3c items=0 ppid=2309 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.081000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 22:03:34.083728 kubelet[2309]: I0212 22:03:34.083036 2309 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 22:03:34.084270 kubelet[2309]: E0212 22:03:34.084241 2309 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://172.31.25.29:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-29?timeout=10s": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:34.083000 audit[2320]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:34.083000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe36e37cd0 a2=0 a3=7ffe36e37cbc items=0 ppid=2309 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.083000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 22:03:34.085649 kubelet[2309]: I0212 22:03:34.085486 2309 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 22:03:34.088000 audit[2322]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:34.088000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd39aad440 a2=0 a3=7ffd39aad42c items=0 ppid=2309 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.088000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 22:03:34.092000 audit[2324]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:34.092000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe8ce9b1f0 a2=0 a3=7ffe8ce9b1dc items=0 ppid=2309 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.092000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 22:03:34.104861 kubelet[2309]: W0212 22:03:34.104769 2309 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.25.29:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:34.105358 kubelet[2309]: E0212 22:03:34.105342 2309 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.25.29:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:34.139000 audit[2330]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:34.139000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd1ab53810 a2=0 a3=7ffd1ab537fc items=0 ppid=2309 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.139000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 22:03:34.145000 audit[2332]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:34.145000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdb393cf50 a2=0 a3=7ffdb393cf3c items=0 ppid=2309 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.145000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 22:03:34.150044 kubelet[2309]: I0212 22:03:34.150021 2309 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 22:03:34.150809 kubelet[2309]: I0212 22:03:34.150790 2309 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 22:03:34.151014 kubelet[2309]: I0212 22:03:34.151000 2309 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:03:34.158160 kubelet[2309]: I0212 22:03:34.158123 2309 policy_none.go:49] "None policy: Start" Feb 12 22:03:34.161071 kubelet[2309]: I0212 22:03:34.161050 2309 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 22:03:34.161822 kubelet[2309]: I0212 22:03:34.161795 2309 state_mem.go:35] "Initializing new in-memory state store" Feb 12 22:03:34.162000 audit[2335]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:34.162000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd77dfa370 a2=0 a3=7ffd77dfa35c items=0 ppid=2309 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.162000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 22:03:34.169000 audit[2338]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:34.169000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffe23b038a0 a2=0 a3=7ffe23b0388c items=0 ppid=2309 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.169000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 22:03:34.171000 audit[2339]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:34.171000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd177b4aa0 a2=0 a3=7ffd177b4a8c items=0 ppid=2309 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.171000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 22:03:34.174000 audit[2340]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:34.174000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed299f4d0 a2=0 a3=7ffed299f4bc items=0 ppid=2309 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.174000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 22:03:34.177000 audit[2342]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:34.177000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff82c00810 a2=0 a3=7fff82c007fc items=0 ppid=2309 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.177000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 22:03:34.180765 systemd[1]: Created slice kubepods.slice. Feb 12 22:03:34.182000 audit[2344]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:34.182000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd3d5eeec0 a2=0 a3=7ffd3d5eeeac items=0 ppid=2309 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.182000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 22:03:34.187809 kubelet[2309]: I0212 22:03:34.187784 2309 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-25-29" Feb 12 22:03:34.186000 audit[2346]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:34.186000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffd01760fb0 a2=0 a3=7ffd01760f9c items=0 ppid=2309 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.186000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 22:03:34.192000 audit[2348]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:34.192000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffc7073a4d0 a2=0 a3=7ffc7073a4bc items=0 ppid=2309 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.192000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 22:03:34.193989 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 22:03:34.197817 kubelet[2309]: E0212 22:03:34.197743 2309 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.25.29:6443/api/v1/nodes\": dial tcp 172.31.25.29:6443: connect: connection refused" node="ip-172-31-25-29" Feb 12 22:03:34.197000 audit[2350]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:34.197000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffec60b0930 a2=0 a3=7ffec60b091c items=0 ppid=2309 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.197000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 22:03:34.200343 kubelet[2309]: I0212 22:03:34.200319 2309 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 22:03:34.200000 audit[2351]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:34.200000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd3e2535a0 a2=0 a3=7ffd3e25358c items=0 ppid=2309 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.200000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 22:03:34.202000 audit[2352]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:34.202000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc77b221b0 a2=0 a3=7ffc77b2219c items=0 ppid=2309 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.202000 audit[2353]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:34.202000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffdd8f18c40 a2=0 a3=7ffdd8f18c2c items=0 ppid=2309 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.202000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 22:03:34.202000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 22:03:34.206000 audit[2355]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:34.206000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2ac3f9a0 a2=0 a3=7ffc2ac3f98c items=0 ppid=2309 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 22:03:34.209015 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 22:03:34.209000 audit[2356]: NETFILTER_CFG table=nat:45 family=10 entries=1 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:34.209000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffedcfce0e0 a2=0 a3=7ffedcfce0cc items=0 ppid=2309 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.209000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 22:03:34.210000 audit[2357]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:03:34.210000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca0413440 a2=0 a3=7ffca041342c items=0 ppid=2309 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.210000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 22:03:34.212000 audit[2358]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:34.212000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fffef072450 a2=0 a3=7fffef07243c items=0 ppid=2309 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.212000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 22:03:34.215000 audit[2360]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2360 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:34.215000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7fffc840a760 a2=0 a3=7fffc840a74c items=0 ppid=2309 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.215000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 22:03:34.217000 audit[2361]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:34.217000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd6e717c80 a2=0 a3=7ffd6e717c6c items=0 ppid=2309 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 22:03:34.218000 audit[2362]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:34.218000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6e0280f0 a2=0 a3=7ffe6e0280dc items=0 ppid=2309 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.218000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 22:03:34.221000 audit[2364]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:34.221000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd4cbd9c90 a2=0 a3=7ffd4cbd9c7c items=0 ppid=2309 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.221000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 22:03:34.224000 audit[2366]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:34.224000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe080416e0 a2=0 a3=7ffe080416cc items=0 ppid=2309 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.224000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 22:03:34.228428 kubelet[2309]: I0212 22:03:34.228392 2309 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 22:03:34.226000 audit[2309]: AVC avc: denied { mac_admin } for pid=2309 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:34.226000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:03:34.226000 audit[2309]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001107ce0 a1=c001143260 a2=c001107cb0 a3=25 items=0 ppid=1 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.226000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:03:34.228867 kubelet[2309]: I0212 22:03:34.228463 2309 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 22:03:34.229506 kubelet[2309]: I0212 22:03:34.229245 2309 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 22:03:34.231397 kubelet[2309]: E0212 22:03:34.231369 2309 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-25-29\" not found" Feb 12 22:03:34.233000 audit[2368]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:34.233000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffe6d8f52b0 a2=0 a3=7ffe6d8f529c items=0 ppid=2309 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.233000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 22:03:34.251000 audit[2370]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:34.251000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffef47a1ff0 a2=0 a3=7ffef47a1fdc items=0 ppid=2309 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.251000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 22:03:34.269000 audit[2372]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:34.269000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7fff0bb009b0 a2=0 a3=7fff0bb0099c items=0 ppid=2309 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.269000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 22:03:34.271637 kubelet[2309]: I0212 22:03:34.271605 2309 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 22:03:34.271760 kubelet[2309]: I0212 22:03:34.271646 2309 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 22:03:34.271760 kubelet[2309]: I0212 22:03:34.271700 2309 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 22:03:34.271760 kubelet[2309]: E0212 22:03:34.271755 2309 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 22:03:34.272000 audit[2373]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:34.272000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc8ee4d30 a2=0 a3=7ffdc8ee4d1c items=0 ppid=2309 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.274247 kubelet[2309]: W0212 22:03:34.274006 2309 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.25.29:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:34.274247 kubelet[2309]: E0212 22:03:34.274049 2309 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.25.29:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:34.272000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 22:03:34.275000 audit[2374]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:34.275000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdfa1407c0 a2=0 a3=7ffdfa1407ac items=0 ppid=2309 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 22:03:34.280000 audit[2375]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:03:34.280000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff2f74360 a2=0 a3=7ffff2f7434c items=0 ppid=2309 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:34.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 22:03:34.284917 kubelet[2309]: E0212 22:03:34.284876 2309 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://172.31.25.29:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-29?timeout=10s": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:34.374163 kubelet[2309]: I0212 22:03:34.372289 2309 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:03:34.375445 kubelet[2309]: I0212 22:03:34.375423 2309 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:03:34.381431 kubelet[2309]: I0212 22:03:34.381139 2309 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:03:34.383425 kubelet[2309]: I0212 22:03:34.383397 2309 status_manager.go:698] "Failed to get status for pod" podUID=41c180d2597d958d52e5590fcf0b61b0 pod="kube-system/kube-controller-manager-ip-172-31-25-29" err="Get \"https://172.31.25.29:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ip-172-31-25-29\": dial tcp 172.31.25.29:6443: connect: connection refused" Feb 12 22:03:34.389095 kubelet[2309]: I0212 22:03:34.388337 2309 status_manager.go:698] "Failed to get status for pod" podUID=8d87dc6f284e049944525b1143f97827 pod="kube-system/kube-apiserver-ip-172-31-25-29" err="Get \"https://172.31.25.29:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ip-172-31-25-29\": dial tcp 172.31.25.29:6443: connect: connection refused" Feb 12 22:03:34.390041 systemd[1]: Created slice kubepods-burstable-pod41c180d2597d958d52e5590fcf0b61b0.slice. Feb 12 22:03:34.392644 kubelet[2309]: I0212 22:03:34.392310 2309 status_manager.go:698] "Failed to get status for pod" podUID=68edb26487453368394ef37a004621d2 pod="kube-system/kube-scheduler-ip-172-31-25-29" err="Get \"https://172.31.25.29:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ip-172-31-25-29\": dial tcp 172.31.25.29:6443: connect: connection refused" Feb 12 22:03:34.402417 kubelet[2309]: I0212 22:03:34.401878 2309 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-25-29" Feb 12 22:03:34.402417 kubelet[2309]: E0212 22:03:34.402243 2309 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.25.29:6443/api/v1/nodes\": dial tcp 172.31.25.29:6443: connect: connection refused" node="ip-172-31-25-29" Feb 12 22:03:34.403807 systemd[1]: Created slice kubepods-burstable-pod8d87dc6f284e049944525b1143f97827.slice. Feb 12 22:03:34.410526 systemd[1]: Created slice kubepods-burstable-pod68edb26487453368394ef37a004621d2.slice. Feb 12 22:03:34.486450 kubelet[2309]: I0212 22:03:34.486409 2309 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8d87dc6f284e049944525b1143f97827-ca-certs\") pod \"kube-apiserver-ip-172-31-25-29\" (UID: \"8d87dc6f284e049944525b1143f97827\") " pod="kube-system/kube-apiserver-ip-172-31-25-29" Feb 12 22:03:34.486889 kubelet[2309]: I0212 22:03:34.486478 2309 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8d87dc6f284e049944525b1143f97827-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-25-29\" (UID: \"8d87dc6f284e049944525b1143f97827\") " pod="kube-system/kube-apiserver-ip-172-31-25-29" Feb 12 22:03:34.486889 kubelet[2309]: I0212 22:03:34.486513 2309 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/41c180d2597d958d52e5590fcf0b61b0-ca-certs\") pod \"kube-controller-manager-ip-172-31-25-29\" (UID: \"41c180d2597d958d52e5590fcf0b61b0\") " pod="kube-system/kube-controller-manager-ip-172-31-25-29" Feb 12 22:03:34.486889 kubelet[2309]: I0212 22:03:34.486540 2309 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/41c180d2597d958d52e5590fcf0b61b0-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-25-29\" (UID: \"41c180d2597d958d52e5590fcf0b61b0\") " pod="kube-system/kube-controller-manager-ip-172-31-25-29" Feb 12 22:03:34.486889 kubelet[2309]: I0212 22:03:34.486832 2309 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/41c180d2597d958d52e5590fcf0b61b0-kubeconfig\") pod \"kube-controller-manager-ip-172-31-25-29\" (UID: \"41c180d2597d958d52e5590fcf0b61b0\") " pod="kube-system/kube-controller-manager-ip-172-31-25-29" Feb 12 22:03:34.486889 kubelet[2309]: I0212 22:03:34.486875 2309 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8d87dc6f284e049944525b1143f97827-k8s-certs\") pod \"kube-apiserver-ip-172-31-25-29\" (UID: \"8d87dc6f284e049944525b1143f97827\") " pod="kube-system/kube-apiserver-ip-172-31-25-29" Feb 12 22:03:34.487122 kubelet[2309]: I0212 22:03:34.486903 2309 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/41c180d2597d958d52e5590fcf0b61b0-k8s-certs\") pod \"kube-controller-manager-ip-172-31-25-29\" (UID: \"41c180d2597d958d52e5590fcf0b61b0\") " pod="kube-system/kube-controller-manager-ip-172-31-25-29" Feb 12 22:03:34.487122 kubelet[2309]: I0212 22:03:34.486935 2309 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/41c180d2597d958d52e5590fcf0b61b0-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-25-29\" (UID: \"41c180d2597d958d52e5590fcf0b61b0\") " pod="kube-system/kube-controller-manager-ip-172-31-25-29" Feb 12 22:03:34.487122 kubelet[2309]: I0212 22:03:34.486972 2309 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/68edb26487453368394ef37a004621d2-kubeconfig\") pod \"kube-scheduler-ip-172-31-25-29\" (UID: \"68edb26487453368394ef37a004621d2\") " pod="kube-system/kube-scheduler-ip-172-31-25-29" Feb 12 22:03:34.686291 kubelet[2309]: E0212 22:03:34.686183 2309 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://172.31.25.29:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-29?timeout=10s": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:34.704768 env[1637]: time="2024-02-12T22:03:34.704718371Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-25-29,Uid:41c180d2597d958d52e5590fcf0b61b0,Namespace:kube-system,Attempt:0,}" Feb 12 22:03:34.709371 env[1637]: time="2024-02-12T22:03:34.709332795Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-25-29,Uid:8d87dc6f284e049944525b1143f97827,Namespace:kube-system,Attempt:0,}" Feb 12 22:03:34.717380 env[1637]: time="2024-02-12T22:03:34.716975977Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-25-29,Uid:68edb26487453368394ef37a004621d2,Namespace:kube-system,Attempt:0,}" Feb 12 22:03:34.809760 kubelet[2309]: I0212 22:03:34.809732 2309 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-25-29" Feb 12 22:03:34.814607 kubelet[2309]: E0212 22:03:34.810990 2309 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.25.29:6443/api/v1/nodes\": dial tcp 172.31.25.29:6443: connect: connection refused" node="ip-172-31-25-29" Feb 12 22:03:34.902040 kubelet[2309]: W0212 22:03:34.901975 2309 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.25.29:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-29&limit=500&resourceVersion=0": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:34.902311 kubelet[2309]: E0212 22:03:34.902289 2309 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.25.29:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-29&limit=500&resourceVersion=0": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:35.237431 kubelet[2309]: W0212 22:03:35.237375 2309 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.25.29:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:35.237431 kubelet[2309]: E0212 22:03:35.237434 2309 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.25.29:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:35.270835 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3907697938.mount: Deactivated successfully. Feb 12 22:03:35.283334 env[1637]: time="2024-02-12T22:03:35.283282453Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:35.285877 env[1637]: time="2024-02-12T22:03:35.285833535Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:35.287742 env[1637]: time="2024-02-12T22:03:35.287700535Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:35.289888 env[1637]: time="2024-02-12T22:03:35.289852678Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:35.294296 env[1637]: time="2024-02-12T22:03:35.294252288Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:35.295463 env[1637]: time="2024-02-12T22:03:35.295426461Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:35.297290 env[1637]: time="2024-02-12T22:03:35.297238393Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:35.298846 env[1637]: time="2024-02-12T22:03:35.298806835Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:35.299995 env[1637]: time="2024-02-12T22:03:35.299959913Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:35.301300 env[1637]: time="2024-02-12T22:03:35.301272160Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:35.304514 env[1637]: time="2024-02-12T22:03:35.304471380Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:35.305876 env[1637]: time="2024-02-12T22:03:35.305841402Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:03:35.349802 env[1637]: time="2024-02-12T22:03:35.349437400Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:03:35.349802 env[1637]: time="2024-02-12T22:03:35.349514796Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:03:35.349802 env[1637]: time="2024-02-12T22:03:35.349531518Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:03:35.350103 env[1637]: time="2024-02-12T22:03:35.349885144Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3cf6bd91895a57fb8b39233a4c1a7446fcf39ba320784c78187f325c32185d54 pid=2383 runtime=io.containerd.runc.v2 Feb 12 22:03:35.392181 env[1637]: time="2024-02-12T22:03:35.392084961Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:03:35.392351 env[1637]: time="2024-02-12T22:03:35.392219001Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:03:35.392351 env[1637]: time="2024-02-12T22:03:35.392255112Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:03:35.392750 env[1637]: time="2024-02-12T22:03:35.392687956Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1501337152ac05edd33c02ee9e9cbaff0b72906fe591f748a51547f193da233c pid=2405 runtime=io.containerd.runc.v2 Feb 12 22:03:35.400464 systemd[1]: Started cri-containerd-3cf6bd91895a57fb8b39233a4c1a7446fcf39ba320784c78187f325c32185d54.scope. Feb 12 22:03:35.416707 kubelet[2309]: W0212 22:03:35.416526 2309 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.25.29:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:35.416707 kubelet[2309]: E0212 22:03:35.416651 2309 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.25.29:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:35.432933 env[1637]: time="2024-02-12T22:03:35.432817719Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:03:35.433243 env[1637]: time="2024-02-12T22:03:35.433177295Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:03:35.433425 env[1637]: time="2024-02-12T22:03:35.433388527Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:03:35.437483 env[1637]: time="2024-02-12T22:03:35.437317893Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e6c4a6d8c5be4e573ebc9ac072bfc2ca2189928cb3309db20c4fe277f9245d6a pid=2424 runtime=io.containerd.runc.v2 Feb 12 22:03:35.449514 kubelet[2309]: W0212 22:03:35.449296 2309 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.25.29:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:35.449514 kubelet[2309]: E0212 22:03:35.449490 2309 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.25.29:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:35.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.462000 audit: BPF prog-id=67 op=LOAD Feb 12 22:03:35.463000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.463000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2383 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363663662643931383935613537666238623339323333613463316137 Feb 12 22:03:35.469600 systemd[1]: Started cri-containerd-1501337152ac05edd33c02ee9e9cbaff0b72906fe591f748a51547f193da233c.scope. Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2383 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363663662643931383935613537666238623339323333613463316137 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit: BPF prog-id=68 op=LOAD Feb 12 22:03:35.472000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000218f20 items=0 ppid=2383 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363663662643931383935613537666238623339323333613463316137 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit: BPF prog-id=69 op=LOAD Feb 12 22:03:35.472000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000218f68 items=0 ppid=2383 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363663662643931383935613537666238623339323333613463316137 Feb 12 22:03:35.472000 audit: BPF prog-id=69 op=UNLOAD Feb 12 22:03:35.472000 audit: BPF prog-id=68 op=UNLOAD Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.472000 audit: BPF prog-id=70 op=LOAD Feb 12 22:03:35.472000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000219378 items=0 ppid=2383 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363663662643931383935613537666238623339323333613463316137 Feb 12 22:03:35.489899 kubelet[2309]: E0212 22:03:35.489636 2309 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://172.31.25.29:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-29?timeout=10s": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:35.498189 systemd[1]: Started cri-containerd-e6c4a6d8c5be4e573ebc9ac072bfc2ca2189928cb3309db20c4fe277f9245d6a.scope. Feb 12 22:03:35.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.503000 audit: BPF prog-id=71 op=LOAD Feb 12 22:03:35.504000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.504000 audit[2427]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2405 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135303133333731353261633035656464333363303265653965396362 Feb 12 22:03:35.505000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.505000 audit[2427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2405 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135303133333731353261633035656464333363303265653965396362 Feb 12 22:03:35.505000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.505000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.505000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.505000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.505000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.505000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.505000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.505000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.505000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.505000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.505000 audit: BPF prog-id=72 op=LOAD Feb 12 22:03:35.505000 audit[2427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003134e0 items=0 ppid=2405 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135303133333731353261633035656464333363303265653965396362 Feb 12 22:03:35.511000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.511000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.511000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.511000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.511000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.511000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.511000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.511000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.511000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.511000 audit: BPF prog-id=73 op=LOAD Feb 12 22:03:35.511000 audit[2427]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000313528 items=0 ppid=2405 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135303133333731353261633035656464333363303265653965396362 Feb 12 22:03:35.514000 audit: BPF prog-id=73 op=UNLOAD Feb 12 22:03:35.514000 audit: BPF prog-id=72 op=UNLOAD Feb 12 22:03:35.515000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.515000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.515000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.515000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.515000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.515000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.515000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.515000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.515000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.515000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.515000 audit: BPF prog-id=74 op=LOAD Feb 12 22:03:35.515000 audit[2427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000313938 items=0 ppid=2405 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135303133333731353261633035656464333363303265653965396362 Feb 12 22:03:35.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.564000 audit: BPF prog-id=75 op=LOAD Feb 12 22:03:35.567000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.567000 audit[2447]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2424 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536633461366438633562653465353733656263396163303732626663 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2424 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536633461366438633562653465353733656263396163303732626663 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit: BPF prog-id=76 op=LOAD Feb 12 22:03:35.569000 audit[2447]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001394b0 items=0 ppid=2424 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536633461366438633562653465353733656263396163303732626663 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit: BPF prog-id=77 op=LOAD Feb 12 22:03:35.569000 audit[2447]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001394f8 items=0 ppid=2424 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536633461366438633562653465353733656263396163303732626663 Feb 12 22:03:35.569000 audit: BPF prog-id=77 op=UNLOAD Feb 12 22:03:35.569000 audit: BPF prog-id=76 op=UNLOAD Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.569000 audit: BPF prog-id=78 op=LOAD Feb 12 22:03:35.569000 audit[2447]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000139908 items=0 ppid=2424 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536633461366438633562653465353733656263396163303732626663 Feb 12 22:03:35.619072 kubelet[2309]: I0212 22:03:35.619039 2309 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-25-29" Feb 12 22:03:35.619800 kubelet[2309]: E0212 22:03:35.619764 2309 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.25.29:6443/api/v1/nodes\": dial tcp 172.31.25.29:6443: connect: connection refused" node="ip-172-31-25-29" Feb 12 22:03:35.625765 env[1637]: time="2024-02-12T22:03:35.625714332Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-25-29,Uid:8d87dc6f284e049944525b1143f97827,Namespace:kube-system,Attempt:0,} returns sandbox id \"3cf6bd91895a57fb8b39233a4c1a7446fcf39ba320784c78187f325c32185d54\"" Feb 12 22:03:35.635042 env[1637]: time="2024-02-12T22:03:35.634995706Z" level=info msg="CreateContainer within sandbox \"3cf6bd91895a57fb8b39233a4c1a7446fcf39ba320784c78187f325c32185d54\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 22:03:35.666037 env[1637]: time="2024-02-12T22:03:35.665987155Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-25-29,Uid:41c180d2597d958d52e5590fcf0b61b0,Namespace:kube-system,Attempt:0,} returns sandbox id \"e6c4a6d8c5be4e573ebc9ac072bfc2ca2189928cb3309db20c4fe277f9245d6a\"" Feb 12 22:03:35.671778 env[1637]: time="2024-02-12T22:03:35.670842998Z" level=info msg="CreateContainer within sandbox \"3cf6bd91895a57fb8b39233a4c1a7446fcf39ba320784c78187f325c32185d54\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"55cd7837ff0b7b9d3c069e59703b03f90d10f8217d38f46a23388727234ba4ff\"" Feb 12 22:03:35.672213 env[1637]: time="2024-02-12T22:03:35.671678064Z" level=info msg="CreateContainer within sandbox \"e6c4a6d8c5be4e573ebc9ac072bfc2ca2189928cb3309db20c4fe277f9245d6a\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 22:03:35.673376 env[1637]: time="2024-02-12T22:03:35.673059680Z" level=info msg="StartContainer for \"55cd7837ff0b7b9d3c069e59703b03f90d10f8217d38f46a23388727234ba4ff\"" Feb 12 22:03:35.679554 env[1637]: time="2024-02-12T22:03:35.679504609Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-25-29,Uid:68edb26487453368394ef37a004621d2,Namespace:kube-system,Attempt:0,} returns sandbox id \"1501337152ac05edd33c02ee9e9cbaff0b72906fe591f748a51547f193da233c\"" Feb 12 22:03:35.685029 env[1637]: time="2024-02-12T22:03:35.684989171Z" level=info msg="CreateContainer within sandbox \"1501337152ac05edd33c02ee9e9cbaff0b72906fe591f748a51547f193da233c\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 22:03:35.704107 env[1637]: time="2024-02-12T22:03:35.704043113Z" level=info msg="CreateContainer within sandbox \"e6c4a6d8c5be4e573ebc9ac072bfc2ca2189928cb3309db20c4fe277f9245d6a\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"01974ccb162101c72413af0ac7e65059e4fc8d88fb4de233ffc33d51ea3f462d\"" Feb 12 22:03:35.705598 env[1637]: time="2024-02-12T22:03:35.705516251Z" level=info msg="StartContainer for \"01974ccb162101c72413af0ac7e65059e4fc8d88fb4de233ffc33d51ea3f462d\"" Feb 12 22:03:35.726257 systemd[1]: Started cri-containerd-55cd7837ff0b7b9d3c069e59703b03f90d10f8217d38f46a23388727234ba4ff.scope. Feb 12 22:03:35.730265 env[1637]: time="2024-02-12T22:03:35.729419965Z" level=info msg="CreateContainer within sandbox \"1501337152ac05edd33c02ee9e9cbaff0b72906fe591f748a51547f193da233c\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"cf868d92bb8a053c5d4fe1fd67f5fa06a3b31baba2d4aef1bd1b6e3419ef5124\"" Feb 12 22:03:35.732925 env[1637]: time="2024-02-12T22:03:35.732882508Z" level=info msg="StartContainer for \"cf868d92bb8a053c5d4fe1fd67f5fa06a3b31baba2d4aef1bd1b6e3419ef5124\"" Feb 12 22:03:35.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.762000 audit: BPF prog-id=79 op=LOAD Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2383 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535636437383337666630623762396433633036396535393730336230 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2383 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535636437383337666630623762396433633036396535393730336230 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit: BPF prog-id=80 op=LOAD Feb 12 22:03:35.763000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00027bda0 items=0 ppid=2383 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535636437383337666630623762396433633036396535393730336230 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit: BPF prog-id=81 op=LOAD Feb 12 22:03:35.763000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00027bde8 items=0 ppid=2383 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535636437383337666630623762396433633036396535393730336230 Feb 12 22:03:35.763000 audit: BPF prog-id=81 op=UNLOAD Feb 12 22:03:35.763000 audit: BPF prog-id=80 op=UNLOAD Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.763000 audit: BPF prog-id=82 op=LOAD Feb 12 22:03:35.763000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f81f8 items=0 ppid=2383 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535636437383337666630623762396433633036396535393730336230 Feb 12 22:03:35.770430 systemd[1]: Started cri-containerd-01974ccb162101c72413af0ac7e65059e4fc8d88fb4de233ffc33d51ea3f462d.scope. Feb 12 22:03:35.796930 systemd[1]: Started cri-containerd-cf868d92bb8a053c5d4fe1fd67f5fa06a3b31baba2d4aef1bd1b6e3419ef5124.scope. Feb 12 22:03:35.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit: BPF prog-id=83 op=LOAD Feb 12 22:03:35.826000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2405 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366383638643932626238613035336335643466653166643637663566 Feb 12 22:03:35.826000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2405 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366383638643932626238613035336335643466653166643637663566 Feb 12 22:03:35.826000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit: BPF prog-id=84 op=LOAD Feb 12 22:03:35.826000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a3160 items=0 ppid=2405 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366383638643932626238613035336335643466653166643637663566 Feb 12 22:03:35.826000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.826000 audit: BPF prog-id=85 op=LOAD Feb 12 22:03:35.826000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a31a8 items=0 ppid=2405 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366383638643932626238613035336335643466653166643637663566 Feb 12 22:03:35.826000 audit: BPF prog-id=85 op=UNLOAD Feb 12 22:03:35.827000 audit: BPF prog-id=84 op=UNLOAD Feb 12 22:03:35.827000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.827000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.827000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.827000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.827000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.827000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.827000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.827000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.827000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.827000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.827000 audit: BPF prog-id=86 op=LOAD Feb 12 22:03:35.827000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a35b8 items=0 ppid=2405 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366383638643932626238613035336335643466653166643637663566 Feb 12 22:03:35.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.842000 audit: BPF prog-id=87 op=LOAD Feb 12 22:03:35.842000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.842000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2424 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031393734636362313632313031633732343133616630616337653635 Feb 12 22:03:35.842000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.842000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2424 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031393734636362313632313031633732343133616630616337653635 Feb 12 22:03:35.845000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.845000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.845000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.845000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.845000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.845000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.845000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.845000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.845000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.845000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.845000 audit: BPF prog-id=88 op=LOAD Feb 12 22:03:35.845000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c4c10 items=0 ppid=2424 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031393734636362313632313031633732343133616630616337653635 Feb 12 22:03:35.845000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.845000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.845000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.845000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.845000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.845000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.845000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.845000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.845000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.845000 audit: BPF prog-id=89 op=LOAD Feb 12 22:03:35.845000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003c4c58 items=0 ppid=2424 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031393734636362313632313031633732343133616630616337653635 Feb 12 22:03:35.845000 audit: BPF prog-id=89 op=UNLOAD Feb 12 22:03:35.846000 audit: BPF prog-id=88 op=UNLOAD Feb 12 22:03:35.846000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.846000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.846000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.846000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.846000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.846000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.846000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.846000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.846000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.846000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:35.846000 audit: BPF prog-id=90 op=LOAD Feb 12 22:03:35.846000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c5068 items=0 ppid=2424 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:35.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031393734636362313632313031633732343133616630616337653635 Feb 12 22:03:35.870264 env[1637]: time="2024-02-12T22:03:35.870211610Z" level=info msg="StartContainer for \"55cd7837ff0b7b9d3c069e59703b03f90d10f8217d38f46a23388727234ba4ff\" returns successfully" Feb 12 22:03:35.885269 env[1637]: time="2024-02-12T22:03:35.885095110Z" level=info msg="StartContainer for \"cf868d92bb8a053c5d4fe1fd67f5fa06a3b31baba2d4aef1bd1b6e3419ef5124\" returns successfully" Feb 12 22:03:35.925393 env[1637]: time="2024-02-12T22:03:35.925345629Z" level=info msg="StartContainer for \"01974ccb162101c72413af0ac7e65059e4fc8d88fb4de233ffc33d51ea3f462d\" returns successfully" Feb 12 22:03:36.179828 kubelet[2309]: E0212 22:03:36.179798 2309 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.25.29:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:36.281050 kubelet[2309]: I0212 22:03:36.281023 2309 status_manager.go:698] "Failed to get status for pod" podUID=41c180d2597d958d52e5590fcf0b61b0 pod="kube-system/kube-controller-manager-ip-172-31-25-29" err="Get \"https://172.31.25.29:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ip-172-31-25-29\": dial tcp 172.31.25.29:6443: connect: connection refused" Feb 12 22:03:36.289519 kubelet[2309]: I0212 22:03:36.289495 2309 status_manager.go:698] "Failed to get status for pod" podUID=8d87dc6f284e049944525b1143f97827 pod="kube-system/kube-apiserver-ip-172-31-25-29" err="Get \"https://172.31.25.29:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ip-172-31-25-29\": dial tcp 172.31.25.29:6443: connect: connection refused" Feb 12 22:03:36.296948 kubelet[2309]: I0212 22:03:36.296926 2309 status_manager.go:698] "Failed to get status for pod" podUID=68edb26487453368394ef37a004621d2 pod="kube-system/kube-scheduler-ip-172-31-25-29" err="Get \"https://172.31.25.29:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ip-172-31-25-29\": dial tcp 172.31.25.29:6443: connect: connection refused" Feb 12 22:03:37.091225 kubelet[2309]: E0212 22:03:37.091161 2309 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: Get "https://172.31.25.29:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-29?timeout=10s": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:37.156818 kubelet[2309]: W0212 22:03:37.156780 2309 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.25.29:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:37.157025 kubelet[2309]: E0212 22:03:37.157011 2309 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.25.29:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:37.222447 kubelet[2309]: I0212 22:03:37.222424 2309 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-25-29" Feb 12 22:03:37.223243 kubelet[2309]: E0212 22:03:37.223229 2309 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.25.29:6443/api/v1/nodes\": dial tcp 172.31.25.29:6443: connect: connection refused" node="ip-172-31-25-29" Feb 12 22:03:37.361421 kubelet[2309]: W0212 22:03:37.361317 2309 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.25.29:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-29&limit=500&resourceVersion=0": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:37.361977 kubelet[2309]: E0212 22:03:37.361959 2309 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.25.29:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-29&limit=500&resourceVersion=0": dial tcp 172.31.25.29:6443: connect: connection refused Feb 12 22:03:38.324474 kernel: kauditd_printk_skb: 620 callbacks suppressed Feb 12 22:03:38.324711 kernel: audit: type=1400 audit(1707775418.313:740): avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c678 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:03:38.313000 audit[2559]: AVC avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c678 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:03:38.313000 audit[2559]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001234000 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c678 key=(null) Feb 12 22:03:38.349790 kernel: audit: type=1300 audit(1707775418.313:740): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001234000 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c678 key=(null) Feb 12 22:03:38.349939 kernel: audit: type=1327 audit(1707775418.313:740): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:03:38.313000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:03:38.373470 kernel: audit: type=1400 audit(1707775418.313:741): avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c678 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:03:38.313000 audit[2559]: AVC avc: denied { watch } for pid=2559 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c678 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:03:38.313000 audit[2559]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00122a040 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c678 key=(null) Feb 12 22:03:38.313000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:03:38.389681 kernel: audit: type=1300 audit(1707775418.313:741): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00122a040 a2=fc6 a3=0 items=0 ppid=2424 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c678 key=(null) Feb 12 22:03:38.389821 kernel: audit: type=1327 audit(1707775418.313:741): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:03:39.021633 update_engine[1633]: I0212 22:03:39.020908 1633 update_attempter.cc:509] Updating boot flags... Feb 12 22:03:40.060000 audit[2532]: AVC avc: denied { watch } for pid=2532 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c657,c774 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:03:40.060000 audit[2532]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c000f801e0 a2=fc6 a3=0 items=0 ppid=2383 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c657,c774 key=(null) Feb 12 22:03:40.075006 kernel: audit: type=1400 audit(1707775420.060:742): avc: denied { watch } for pid=2532 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c657,c774 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:03:40.075151 kernel: audit: type=1300 audit(1707775420.060:742): arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c000f801e0 a2=fc6 a3=0 items=0 ppid=2383 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c657,c774 key=(null) Feb 12 22:03:40.075245 kernel: audit: type=1327 audit(1707775420.060:742): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:03:40.060000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:03:40.060000 audit[2532]: AVC avc: denied { watch } for pid=2532 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c657,c774 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:03:40.060000 audit[2532]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c0002bb0c0 a2=fc6 a3=0 items=0 ppid=2383 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c657,c774 key=(null) Feb 12 22:03:40.060000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:03:40.080000 audit[2532]: AVC avc: denied { watch } for pid=2532 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c657,c774 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:03:40.080000 audit[2532]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c000f808a0 a2=fc6 a3=0 items=0 ppid=2383 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c657,c774 key=(null) Feb 12 22:03:40.080000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:03:40.088000 audit[2532]: AVC avc: denied { watch } for pid=2532 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c657,c774 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:03:40.090648 kernel: audit: type=1400 audit(1707775420.060:743): avc: denied { watch } for pid=2532 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c657,c774 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:03:40.088000 audit[2532]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c0010c4ed0 a2=fc6 a3=0 items=0 ppid=2383 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c657,c774 key=(null) Feb 12 22:03:40.088000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:03:40.117000 audit[2532]: AVC avc: denied { watch } for pid=2532 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c657,c774 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:03:40.117000 audit[2532]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c002b5c5c0 a2=fc6 a3=0 items=0 ppid=2383 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c657,c774 key=(null) Feb 12 22:03:40.117000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:03:40.117000 audit[2532]: AVC avc: denied { watch } for pid=2532 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c657,c774 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:03:40.117000 audit[2532]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c0023ae420 a2=fc6 a3=0 items=0 ppid=2383 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c657,c774 key=(null) Feb 12 22:03:40.117000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 22:03:40.311679 kubelet[2309]: E0212 22:03:40.311582 2309 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-25-29\" not found" node="ip-172-31-25-29" Feb 12 22:03:40.431851 kubelet[2309]: I0212 22:03:40.431740 2309 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-25-29" Feb 12 22:03:40.447358 kubelet[2309]: I0212 22:03:40.447322 2309 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-25-29" Feb 12 22:03:40.460167 kubelet[2309]: E0212 22:03:40.460127 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:40.561083 kubelet[2309]: E0212 22:03:40.561049 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:40.661243 kubelet[2309]: E0212 22:03:40.661207 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:40.762905 kubelet[2309]: E0212 22:03:40.762725 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:40.864781 kubelet[2309]: E0212 22:03:40.864748 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:40.965370 kubelet[2309]: E0212 22:03:40.965326 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:41.038530 kubelet[2309]: E0212 22:03:41.038373 2309 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-29.17b33cb0dfe90168", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-29", UID:"ip-172-31-25-29", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-29"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 34, 72050024, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 34, 72050024, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:03:41.066182 kubelet[2309]: E0212 22:03:41.066133 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:41.093890 kubelet[2309]: E0212 22:03:41.093390 2309 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-29.17b33cb0e04f5a01", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-29", UID:"ip-172-31-25-29", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-29"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 34, 78757377, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 34, 78757377, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:03:41.150847 kubelet[2309]: E0212 22:03:41.150740 2309 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-29.17b33cb0e4499ca0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-29", UID:"ip-172-31-25-29", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ip-172-31-25-29 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-29"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 34, 145490080, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 34, 145490080, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:03:41.166888 kubelet[2309]: E0212 22:03:41.166851 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:41.205129 kubelet[2309]: E0212 22:03:41.205013 2309 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-29.17b33cb0e449b24e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-29", UID:"ip-172-31-25-29", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ip-172-31-25-29 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-29"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 34, 145495630, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 34, 145495630, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:03:41.259475 kubelet[2309]: E0212 22:03:41.259368 2309 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-29.17b33cb0e449be26", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-29", UID:"ip-172-31-25-29", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ip-172-31-25-29 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-29"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 34, 145498662, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 34, 145498662, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:03:41.267968 kubelet[2309]: E0212 22:03:41.267928 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:41.321926 kubelet[2309]: E0212 22:03:41.321808 2309 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-29.17b33cb0e4499ca0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-29", UID:"ip-172-31-25-29", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ip-172-31-25-29 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-29"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 34, 145490080, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 34, 187734687, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:03:41.369641 kubelet[2309]: E0212 22:03:41.368781 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:41.380220 kubelet[2309]: E0212 22:03:41.380098 2309 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-29.17b33cb0e449b24e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-29", UID:"ip-172-31-25-29", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ip-172-31-25-29 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-29"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 34, 145495630, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 34, 187743839, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:03:41.439875 kubelet[2309]: E0212 22:03:41.439765 2309 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-29.17b33cb0e449be26", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-29", UID:"ip-172-31-25-29", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ip-172-31-25-29 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-29"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 34, 145498662, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 34, 187748028, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:03:41.470804 kubelet[2309]: E0212 22:03:41.470723 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:41.495822 kubelet[2309]: E0212 22:03:41.495596 2309 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-29.17b33cb0e994979e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-29", UID:"ip-172-31-25-29", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-29"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 3, 34, 234290078, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 3, 34, 234290078, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:03:41.572824 kubelet[2309]: E0212 22:03:41.572638 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:41.674073 kubelet[2309]: E0212 22:03:41.674031 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:41.774657 kubelet[2309]: E0212 22:03:41.774611 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:41.875674 kubelet[2309]: E0212 22:03:41.875512 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:41.976095 kubelet[2309]: E0212 22:03:41.976060 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:42.077112 kubelet[2309]: E0212 22:03:42.077004 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:42.177980 kubelet[2309]: E0212 22:03:42.177827 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:42.278200 kubelet[2309]: E0212 22:03:42.278157 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:42.378687 kubelet[2309]: E0212 22:03:42.378640 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:42.479858 kubelet[2309]: E0212 22:03:42.479735 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:42.580368 kubelet[2309]: E0212 22:03:42.580328 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:42.681409 kubelet[2309]: E0212 22:03:42.681354 2309 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-29\" not found" Feb 12 22:03:43.076637 kubelet[2309]: I0212 22:03:43.076606 2309 apiserver.go:52] "Watching apiserver" Feb 12 22:03:43.086024 kubelet[2309]: I0212 22:03:43.085986 2309 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 22:03:43.095149 systemd[1]: Reloading. Feb 12 22:03:43.153530 kubelet[2309]: I0212 22:03:43.153194 2309 reconciler.go:41] "Reconciler: start to sync state" Feb 12 22:03:43.210453 /usr/lib/systemd/system-generators/torcx-generator[2731]: time="2024-02-12T22:03:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:03:43.213663 /usr/lib/systemd/system-generators/torcx-generator[2731]: time="2024-02-12T22:03:43Z" level=info msg="torcx already run" Feb 12 22:03:43.360362 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:03:43.360386 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:03:43.389998 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:03:43.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.491392 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 12 22:03:43.491485 kernel: audit: type=1400 audit(1707775423.489:748): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.501497 kernel: audit: type=1400 audit(1707775423.489:749): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.513785 kernel: audit: type=1400 audit(1707775423.490:750): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.513911 kernel: audit: type=1400 audit(1707775423.490:751): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.523851 kernel: audit: type=1400 audit(1707775423.490:752): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.523992 kernel: audit: type=1400 audit(1707775423.490:753): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.528526 kernel: audit: type=1400 audit(1707775423.490:754): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.538870 kernel: audit: type=1400 audit(1707775423.490:755): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.539271 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 22:03:43.539400 kernel: audit: type=1400 audit(1707775423.490:756): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.501000 audit: BPF prog-id=91 op=LOAD Feb 12 22:03:43.501000 audit: BPF prog-id=87 op=UNLOAD Feb 12 22:03:43.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.513000 audit: BPF prog-id=92 op=LOAD Feb 12 22:03:43.513000 audit: BPF prog-id=52 op=UNLOAD Feb 12 22:03:43.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.518000 audit: BPF prog-id=93 op=LOAD Feb 12 22:03:43.518000 audit: BPF prog-id=53 op=UNLOAD Feb 12 22:03:43.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.523000 audit: BPF prog-id=94 op=LOAD Feb 12 22:03:43.523000 audit: BPF prog-id=54 op=UNLOAD Feb 12 22:03:43.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.528000 audit: BPF prog-id=95 op=LOAD Feb 12 22:03:43.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.528000 audit: BPF prog-id=96 op=LOAD Feb 12 22:03:43.528000 audit: BPF prog-id=55 op=UNLOAD Feb 12 22:03:43.528000 audit: BPF prog-id=56 op=UNLOAD Feb 12 22:03:43.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.539000 audit: BPF prog-id=75 op=UNLOAD Feb 12 22:03:43.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.541000 audit: BPF prog-id=98 op=LOAD Feb 12 22:03:43.541000 audit: BPF prog-id=83 op=UNLOAD Feb 12 22:03:43.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.543000 audit: BPF prog-id=99 op=LOAD Feb 12 22:03:43.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.543000 audit: BPF prog-id=100 op=LOAD Feb 12 22:03:43.543000 audit: BPF prog-id=57 op=UNLOAD Feb 12 22:03:43.543000 audit: BPF prog-id=58 op=UNLOAD Feb 12 22:03:43.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.546000 audit: BPF prog-id=101 op=LOAD Feb 12 22:03:43.546000 audit: BPF prog-id=59 op=UNLOAD Feb 12 22:03:43.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.546000 audit: BPF prog-id=102 op=LOAD Feb 12 22:03:43.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.546000 audit: BPF prog-id=103 op=LOAD Feb 12 22:03:43.546000 audit: BPF prog-id=60 op=UNLOAD Feb 12 22:03:43.546000 audit: BPF prog-id=61 op=UNLOAD Feb 12 22:03:43.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.550000 audit: BPF prog-id=104 op=LOAD Feb 12 22:03:43.550000 audit: BPF prog-id=71 op=UNLOAD Feb 12 22:03:43.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.551000 audit: BPF prog-id=105 op=LOAD Feb 12 22:03:43.551000 audit: BPF prog-id=79 op=UNLOAD Feb 12 22:03:43.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.554000 audit: BPF prog-id=106 op=LOAD Feb 12 22:03:43.554000 audit: BPF prog-id=62 op=UNLOAD Feb 12 22:03:43.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.554000 audit: BPF prog-id=107 op=LOAD Feb 12 22:03:43.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.554000 audit: BPF prog-id=108 op=LOAD Feb 12 22:03:43.554000 audit: BPF prog-id=63 op=UNLOAD Feb 12 22:03:43.554000 audit: BPF prog-id=64 op=UNLOAD Feb 12 22:03:43.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.558000 audit: BPF prog-id=109 op=LOAD Feb 12 22:03:43.558000 audit: BPF prog-id=67 op=UNLOAD Feb 12 22:03:43.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.559000 audit: BPF prog-id=110 op=LOAD Feb 12 22:03:43.559000 audit: BPF prog-id=65 op=UNLOAD Feb 12 22:03:43.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.561000 audit: BPF prog-id=111 op=LOAD Feb 12 22:03:43.561000 audit: BPF prog-id=66 op=UNLOAD Feb 12 22:03:43.586168 systemd[1]: Stopping kubelet.service... Feb 12 22:03:43.610017 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 22:03:43.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:43.610373 systemd[1]: Stopped kubelet.service. Feb 12 22:03:43.610438 systemd[1]: kubelet.service: Consumed 1.093s CPU time. Feb 12 22:03:43.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:43.616082 systemd[1]: Started kubelet.service. Feb 12 22:03:43.755162 kubelet[2783]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 22:03:43.755162 kubelet[2783]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:03:43.756383 kubelet[2783]: I0212 22:03:43.755282 2783 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 22:03:43.757246 kubelet[2783]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 22:03:43.757246 kubelet[2783]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:03:43.762087 kubelet[2783]: I0212 22:03:43.762054 2783 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 22:03:43.762087 kubelet[2783]: I0212 22:03:43.762080 2783 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 22:03:43.762511 kubelet[2783]: I0212 22:03:43.762490 2783 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 22:03:43.764209 kubelet[2783]: I0212 22:03:43.764123 2783 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 22:03:43.765172 kubelet[2783]: I0212 22:03:43.765154 2783 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 22:03:43.768474 kubelet[2783]: I0212 22:03:43.768447 2783 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 22:03:43.768744 kubelet[2783]: I0212 22:03:43.768726 2783 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 22:03:43.768836 kubelet[2783]: I0212 22:03:43.768819 2783 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 22:03:43.769029 kubelet[2783]: I0212 22:03:43.768854 2783 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 22:03:43.769029 kubelet[2783]: I0212 22:03:43.768871 2783 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 22:03:43.769029 kubelet[2783]: I0212 22:03:43.768917 2783 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:03:43.773918 kubelet[2783]: I0212 22:03:43.773855 2783 kubelet.go:398] "Attempting to sync node with API server" Feb 12 22:03:43.774147 kubelet[2783]: I0212 22:03:43.774125 2783 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 22:03:43.774270 kubelet[2783]: I0212 22:03:43.774259 2783 kubelet.go:297] "Adding apiserver pod source" Feb 12 22:03:43.774391 kubelet[2783]: I0212 22:03:43.774365 2783 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 22:03:43.792706 kubelet[2783]: I0212 22:03:43.792679 2783 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 22:03:43.804212 kubelet[2783]: I0212 22:03:43.804172 2783 server.go:1186] "Started kubelet" Feb 12 22:03:43.805189 kubelet[2783]: I0212 22:03:43.805155 2783 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 22:03:43.808705 kubelet[2783]: I0212 22:03:43.807514 2783 server.go:451] "Adding debug handlers to kubelet server" Feb 12 22:03:43.813000 audit[2783]: AVC avc: denied { mac_admin } for pid=2783 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.813000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:03:43.813000 audit[2783]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b7ee10 a1=c000f3c8a0 a2=c000b7ede0 a3=25 items=0 ppid=1 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:43.814686 kubelet[2783]: E0212 22:03:43.814390 2783 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 22:03:43.814686 kubelet[2783]: E0212 22:03:43.814417 2783 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 22:03:43.813000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:03:43.814934 kubelet[2783]: I0212 22:03:43.814919 2783 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 22:03:43.815666 kubelet[2783]: I0212 22:03:43.815105 2783 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 22:03:43.815858 kubelet[2783]: I0212 22:03:43.815846 2783 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 22:03:43.814000 audit[2783]: AVC avc: denied { mac_admin } for pid=2783 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.814000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:03:43.814000 audit[2783]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e89aa0 a1=c000f3c8b8 a2=c000b7eea0 a3=25 items=0 ppid=1 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:43.814000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:03:43.824977 kubelet[2783]: I0212 22:03:43.824950 2783 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 22:03:43.830870 kubelet[2783]: I0212 22:03:43.830840 2783 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 22:03:43.869609 kubelet[2783]: I0212 22:03:43.869335 2783 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 22:03:43.923652 kubelet[2783]: I0212 22:03:43.923619 2783 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 22:03:43.923652 kubelet[2783]: I0212 22:03:43.923658 2783 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 22:03:43.923832 kubelet[2783]: I0212 22:03:43.923683 2783 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 22:03:43.923832 kubelet[2783]: E0212 22:03:43.923745 2783 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 22:03:43.936839 kubelet[2783]: I0212 22:03:43.936812 2783 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 22:03:43.939000 kubelet[2783]: I0212 22:03:43.938983 2783 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 22:03:43.939143 kubelet[2783]: I0212 22:03:43.939131 2783 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:03:43.939455 kubelet[2783]: I0212 22:03:43.939442 2783 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 22:03:43.939558 kubelet[2783]: I0212 22:03:43.939547 2783 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 12 22:03:43.939671 kubelet[2783]: I0212 22:03:43.939659 2783 policy_none.go:49] "None policy: Start" Feb 12 22:03:43.944908 kubelet[2783]: I0212 22:03:43.944890 2783 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-25-29" Feb 12 22:03:43.950991 kubelet[2783]: I0212 22:03:43.950604 2783 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 22:03:43.950991 kubelet[2783]: I0212 22:03:43.950634 2783 state_mem.go:35] "Initializing new in-memory state store" Feb 12 22:03:43.950991 kubelet[2783]: I0212 22:03:43.950865 2783 state_mem.go:75] "Updated machine memory state" Feb 12 22:03:43.958663 kubelet[2783]: I0212 22:03:43.957500 2783 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-25-29" Feb 12 22:03:43.958663 kubelet[2783]: I0212 22:03:43.957595 2783 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-25-29" Feb 12 22:03:43.972326 kubelet[2783]: I0212 22:03:43.962808 2783 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 22:03:43.972557 kubelet[2783]: I0212 22:03:43.972540 2783 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 22:03:43.972952 kubelet[2783]: I0212 22:03:43.972935 2783 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 22:03:43.970000 audit[2783]: AVC avc: denied { mac_admin } for pid=2783 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:03:43.970000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:03:43.970000 audit[2783]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f4fc50 a1=c000e616f8 a2=c000f4fc20 a3=25 items=0 ppid=1 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:03:43.970000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:03:44.024858 kubelet[2783]: I0212 22:03:44.024816 2783 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:03:44.025126 kubelet[2783]: I0212 22:03:44.025083 2783 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:03:44.025246 kubelet[2783]: I0212 22:03:44.025131 2783 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:03:44.039064 kubelet[2783]: I0212 22:03:44.039020 2783 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/41c180d2597d958d52e5590fcf0b61b0-kubeconfig\") pod \"kube-controller-manager-ip-172-31-25-29\" (UID: \"41c180d2597d958d52e5590fcf0b61b0\") " pod="kube-system/kube-controller-manager-ip-172-31-25-29" Feb 12 22:03:44.039253 kubelet[2783]: I0212 22:03:44.039074 2783 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/68edb26487453368394ef37a004621d2-kubeconfig\") pod \"kube-scheduler-ip-172-31-25-29\" (UID: \"68edb26487453368394ef37a004621d2\") " pod="kube-system/kube-scheduler-ip-172-31-25-29" Feb 12 22:03:44.039253 kubelet[2783]: I0212 22:03:44.039114 2783 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/41c180d2597d958d52e5590fcf0b61b0-ca-certs\") pod \"kube-controller-manager-ip-172-31-25-29\" (UID: \"41c180d2597d958d52e5590fcf0b61b0\") " pod="kube-system/kube-controller-manager-ip-172-31-25-29" Feb 12 22:03:44.039253 kubelet[2783]: I0212 22:03:44.039141 2783 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/41c180d2597d958d52e5590fcf0b61b0-k8s-certs\") pod \"kube-controller-manager-ip-172-31-25-29\" (UID: \"41c180d2597d958d52e5590fcf0b61b0\") " pod="kube-system/kube-controller-manager-ip-172-31-25-29" Feb 12 22:03:44.039253 kubelet[2783]: I0212 22:03:44.039173 2783 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8d87dc6f284e049944525b1143f97827-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-25-29\" (UID: \"8d87dc6f284e049944525b1143f97827\") " pod="kube-system/kube-apiserver-ip-172-31-25-29" Feb 12 22:03:44.039253 kubelet[2783]: I0212 22:03:44.039204 2783 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/41c180d2597d958d52e5590fcf0b61b0-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-25-29\" (UID: \"41c180d2597d958d52e5590fcf0b61b0\") " pod="kube-system/kube-controller-manager-ip-172-31-25-29" Feb 12 22:03:44.039463 kubelet[2783]: I0212 22:03:44.039235 2783 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/41c180d2597d958d52e5590fcf0b61b0-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-25-29\" (UID: \"41c180d2597d958d52e5590fcf0b61b0\") " pod="kube-system/kube-controller-manager-ip-172-31-25-29" Feb 12 22:03:44.039463 kubelet[2783]: I0212 22:03:44.039267 2783 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8d87dc6f284e049944525b1143f97827-ca-certs\") pod \"kube-apiserver-ip-172-31-25-29\" (UID: \"8d87dc6f284e049944525b1143f97827\") " pod="kube-system/kube-apiserver-ip-172-31-25-29" Feb 12 22:03:44.039463 kubelet[2783]: I0212 22:03:44.039299 2783 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8d87dc6f284e049944525b1143f97827-k8s-certs\") pod \"kube-apiserver-ip-172-31-25-29\" (UID: \"8d87dc6f284e049944525b1143f97827\") " pod="kube-system/kube-apiserver-ip-172-31-25-29" Feb 12 22:03:44.792741 kubelet[2783]: I0212 22:03:44.792700 2783 apiserver.go:52] "Watching apiserver" Feb 12 22:03:45.031940 kubelet[2783]: I0212 22:03:45.031889 2783 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 22:03:45.045137 kubelet[2783]: I0212 22:03:45.045018 2783 reconciler.go:41] "Reconciler: start to sync state" Feb 12 22:03:45.398976 kubelet[2783]: E0212 22:03:45.396623 2783 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ip-172-31-25-29\" already exists" pod="kube-system/kube-controller-manager-ip-172-31-25-29" Feb 12 22:03:45.681841 kubelet[2783]: E0212 22:03:45.681739 2783 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-25-29\" already exists" pod="kube-system/kube-apiserver-ip-172-31-25-29" Feb 12 22:03:45.835914 kubelet[2783]: E0212 22:03:45.835880 2783 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-25-29\" already exists" pod="kube-system/kube-scheduler-ip-172-31-25-29" Feb 12 22:03:46.382046 kubelet[2783]: I0212 22:03:46.382009 2783 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-25-29" podStartSLOduration=2.381069504 pod.CreationTimestamp="2024-02-12 22:03:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:03:45.996805309 +0000 UTC m=+2.373559818" watchObservedRunningTime="2024-02-12 22:03:46.381069504 +0000 UTC m=+2.757823989" Feb 12 22:03:46.382394 kubelet[2783]: I0212 22:03:46.382379 2783 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-25-29" podStartSLOduration=2.382337446 pod.CreationTimestamp="2024-02-12 22:03:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:03:46.38070742 +0000 UTC m=+2.757461912" watchObservedRunningTime="2024-02-12 22:03:46.382337446 +0000 UTC m=+2.759091937" Feb 12 22:03:46.408782 amazon-ssm-agent[1692]: 2024-02-12 22:03:46 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Feb 12 22:03:46.714357 sudo[1911]: pam_unix(sudo:session): session closed for user root Feb 12 22:03:46.713000 audit[1911]: USER_END pid=1911 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:03:46.714000 audit[1911]: CRED_DISP pid=1911 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:03:46.747920 sshd[1908]: pam_unix(sshd:session): session closed for user core Feb 12 22:03:46.752000 audit[1908]: USER_END pid=1908 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:03:46.752000 audit[1908]: CRED_DISP pid=1908 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:03:46.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.25.29:22-139.178.89.65:54264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:03:46.761905 systemd[1]: sshd@6-172.31.25.29:22-139.178.89.65:54264.service: Deactivated successfully. Feb 12 22:03:46.762981 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 22:03:46.763200 systemd[1]: session-7.scope: Consumed 3.817s CPU time. Feb 12 22:03:46.765724 systemd-logind[1632]: Session 7 logged out. Waiting for processes to exit. Feb 12 22:03:46.768421 systemd-logind[1632]: Removed session 7. Feb 12 22:03:46.800733 kubelet[2783]: I0212 22:03:46.800698 2783 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-25-29" podStartSLOduration=2.800504551 pod.CreationTimestamp="2024-02-12 22:03:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:03:46.799447555 +0000 UTC m=+3.176202045" watchObservedRunningTime="2024-02-12 22:03:46.800504551 +0000 UTC m=+3.177259042" Feb 12 22:04:02.410239 systemd[1]: cri-containerd-01974ccb162101c72413af0ac7e65059e4fc8d88fb4de233ffc33d51ea3f462d.scope: Deactivated successfully. Feb 12 22:04:02.414093 systemd[1]: cri-containerd-01974ccb162101c72413af0ac7e65059e4fc8d88fb4de233ffc33d51ea3f462d.scope: Consumed 1.600s CPU time. Feb 12 22:04:02.448465 kernel: kauditd_printk_skb: 265 callbacks suppressed Feb 12 22:04:02.448651 kernel: audit: type=1334 audit(1707775442.428:996): prog-id=90 op=UNLOAD Feb 12 22:04:02.448697 kernel: audit: type=1334 audit(1707775442.428:997): prog-id=91 op=UNLOAD Feb 12 22:04:02.428000 audit: BPF prog-id=90 op=UNLOAD Feb 12 22:04:02.428000 audit: BPF prog-id=91 op=UNLOAD Feb 12 22:04:02.520581 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-01974ccb162101c72413af0ac7e65059e4fc8d88fb4de233ffc33d51ea3f462d-rootfs.mount: Deactivated successfully. Feb 12 22:04:02.549094 env[1637]: time="2024-02-12T22:04:02.548972413Z" level=info msg="shim disconnected" id=01974ccb162101c72413af0ac7e65059e4fc8d88fb4de233ffc33d51ea3f462d Feb 12 22:04:02.549820 env[1637]: time="2024-02-12T22:04:02.549097858Z" level=warning msg="cleaning up after shim disconnected" id=01974ccb162101c72413af0ac7e65059e4fc8d88fb4de233ffc33d51ea3f462d namespace=k8s.io Feb 12 22:04:02.549820 env[1637]: time="2024-02-12T22:04:02.549114959Z" level=info msg="cleaning up dead shim" Feb 12 22:04:02.583723 env[1637]: time="2024-02-12T22:04:02.583658785Z" level=warning msg="cleanup warnings time=\"2024-02-12T22:04:02Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2863 runtime=io.containerd.runc.v2\n" Feb 12 22:04:03.036669 kubelet[2783]: I0212 22:04:03.036639 2783 scope.go:115] "RemoveContainer" containerID="01974ccb162101c72413af0ac7e65059e4fc8d88fb4de233ffc33d51ea3f462d" Feb 12 22:04:03.048022 env[1637]: time="2024-02-12T22:04:03.047768441Z" level=info msg="CreateContainer within sandbox \"e6c4a6d8c5be4e573ebc9ac072bfc2ca2189928cb3309db20c4fe277f9245d6a\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 12 22:04:03.079880 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount683426525.mount: Deactivated successfully. Feb 12 22:04:03.094960 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4053673129.mount: Deactivated successfully. Feb 12 22:04:03.108462 env[1637]: time="2024-02-12T22:04:03.108400779Z" level=info msg="CreateContainer within sandbox \"e6c4a6d8c5be4e573ebc9ac072bfc2ca2189928cb3309db20c4fe277f9245d6a\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"174810ffb4aca8647a06d4ee17d9d57ec7a7140131a36cff4abbc0243054e99b\"" Feb 12 22:04:03.111185 env[1637]: time="2024-02-12T22:04:03.111145509Z" level=info msg="StartContainer for \"174810ffb4aca8647a06d4ee17d9d57ec7a7140131a36cff4abbc0243054e99b\"" Feb 12 22:04:03.172150 systemd[1]: Started cri-containerd-174810ffb4aca8647a06d4ee17d9d57ec7a7140131a36cff4abbc0243054e99b.scope. Feb 12 22:04:03.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.206637 kernel: audit: type=1400 audit(1707775443.193:998): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.206792 kernel: audit: type=1400 audit(1707775443.193:999): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.213857 kernel: audit: type=1400 audit(1707775443.193:1000): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.224956 kernel: audit: type=1400 audit(1707775443.193:1001): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.225089 kernel: audit: type=1400 audit(1707775443.193:1002): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.230149 kernel: audit: type=1400 audit(1707775443.193:1003): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.230542 kernel: audit: type=1400 audit(1707775443.193:1004): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.235845 kernel: audit: type=1400 audit(1707775443.193:1005): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.195000 audit: BPF prog-id=112 op=LOAD Feb 12 22:04:03.196000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.196000 audit[2883]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2424 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:03.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343831306666623461636138363437613036643465653137643964 Feb 12 22:04:03.196000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.196000 audit[2883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=2424 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:03.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343831306666623461636138363437613036643465653137643964 Feb 12 22:04:03.196000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.196000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.196000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.196000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.196000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.196000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.196000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.196000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.196000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.196000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.196000 audit: BPF prog-id=113 op=LOAD Feb 12 22:04:03.196000 audit[2883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000294530 items=0 ppid=2424 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:03.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343831306666623461636138363437613036643465653137643964 Feb 12 22:04:03.200000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.200000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.200000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.200000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.200000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.200000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.200000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.200000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.200000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.200000 audit: BPF prog-id=114 op=LOAD Feb 12 22:04:03.200000 audit[2883]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000294578 items=0 ppid=2424 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:03.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343831306666623461636138363437613036643465653137643964 Feb 12 22:04:03.205000 audit: BPF prog-id=114 op=UNLOAD Feb 12 22:04:03.205000 audit: BPF prog-id=113 op=UNLOAD Feb 12 22:04:03.205000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.205000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.205000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.205000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.205000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.205000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.205000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.205000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.205000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.205000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:03.205000 audit: BPF prog-id=115 op=LOAD Feb 12 22:04:03.205000 audit[2883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000294988 items=0 ppid=2424 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:03.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343831306666623461636138363437613036643465653137643964 Feb 12 22:04:03.284007 env[1637]: time="2024-02-12T22:04:03.283931077Z" level=info msg="StartContainer for \"174810ffb4aca8647a06d4ee17d9d57ec7a7140131a36cff4abbc0243054e99b\" returns successfully" Feb 12 22:04:03.904943 kubelet[2783]: E0212 22:04:03.904895 2783 controller.go:189] failed to update lease, error: Put "https://172.31.25.29:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-29?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 12 22:04:04.276587 kubelet[2783]: E0212 22:04:04.276211 2783 kubelet_node_status.go:540] "Error updating node status, will retry" err="failed to patch status \"{\\\"status\\\":{\\\"$setElementOrder/conditions\\\":[{\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"type\\\":\\\"DiskPressure\\\"},{\\\"type\\\":\\\"PIDPressure\\\"},{\\\"type\\\":\\\"Ready\\\"}],\\\"conditions\\\":[{\\\"lastHeartbeatTime\\\":\\\"2024-02-12T22:03:54Z\\\",\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2024-02-12T22:03:54Z\\\",\\\"type\\\":\\\"DiskPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2024-02-12T22:03:54Z\\\",\\\"type\\\":\\\"PIDPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2024-02-12T22:03:54Z\\\",\\\"message\\\":\\\"container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized\\\",\\\"type\\\":\\\"Ready\\\"}]}}\" for node \"ip-172-31-25-29\": Patch \"https://172.31.25.29:6443/api/v1/nodes/ip-172-31-25-29/status?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 12 22:04:04.730000 audit[2894]: AVC avc: denied { watch } for pid=2894 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c678 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:04:04.730000 audit[2894]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0003c6030 a2=fc6 a3=0 items=0 ppid=2424 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c678 key=(null) Feb 12 22:04:04.730000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:04:04.731000 audit[2894]: AVC avc: denied { watch } for pid=2894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c678 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:04:04.731000 audit[2894]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0004efa60 a2=fc6 a3=0 items=0 ppid=2424 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c678 key=(null) Feb 12 22:04:04.731000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:04:07.381649 systemd[1]: cri-containerd-cf868d92bb8a053c5d4fe1fd67f5fa06a3b31baba2d4aef1bd1b6e3419ef5124.scope: Deactivated successfully. Feb 12 22:04:07.382014 systemd[1]: cri-containerd-cf868d92bb8a053c5d4fe1fd67f5fa06a3b31baba2d4aef1bd1b6e3419ef5124.scope: Consumed 1.663s CPU time. Feb 12 22:04:07.385000 audit: BPF prog-id=86 op=UNLOAD Feb 12 22:04:07.385000 audit: BPF prog-id=98 op=UNLOAD Feb 12 22:04:07.413459 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cf868d92bb8a053c5d4fe1fd67f5fa06a3b31baba2d4aef1bd1b6e3419ef5124-rootfs.mount: Deactivated successfully. Feb 12 22:04:07.437089 env[1637]: time="2024-02-12T22:04:07.436930144Z" level=info msg="shim disconnected" id=cf868d92bb8a053c5d4fe1fd67f5fa06a3b31baba2d4aef1bd1b6e3419ef5124 Feb 12 22:04:07.437089 env[1637]: time="2024-02-12T22:04:07.436976502Z" level=warning msg="cleaning up after shim disconnected" id=cf868d92bb8a053c5d4fe1fd67f5fa06a3b31baba2d4aef1bd1b6e3419ef5124 namespace=k8s.io Feb 12 22:04:07.437089 env[1637]: time="2024-02-12T22:04:07.437091054Z" level=info msg="cleaning up dead shim" Feb 12 22:04:07.449226 env[1637]: time="2024-02-12T22:04:07.449181981Z" level=warning msg="cleanup warnings time=\"2024-02-12T22:04:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2924 runtime=io.containerd.runc.v2\n" Feb 12 22:04:08.084792 kubelet[2783]: I0212 22:04:08.084688 2783 scope.go:115] "RemoveContainer" containerID="cf868d92bb8a053c5d4fe1fd67f5fa06a3b31baba2d4aef1bd1b6e3419ef5124" Feb 12 22:04:08.089792 env[1637]: time="2024-02-12T22:04:08.089751289Z" level=info msg="CreateContainer within sandbox \"1501337152ac05edd33c02ee9e9cbaff0b72906fe591f748a51547f193da233c\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 12 22:04:08.122660 env[1637]: time="2024-02-12T22:04:08.122527627Z" level=info msg="CreateContainer within sandbox \"1501337152ac05edd33c02ee9e9cbaff0b72906fe591f748a51547f193da233c\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"e7aaef94a770efe65de28b5acdc8af46a243b31ce85927975a3a4f2eccee164a\"" Feb 12 22:04:08.123469 env[1637]: time="2024-02-12T22:04:08.123438648Z" level=info msg="StartContainer for \"e7aaef94a770efe65de28b5acdc8af46a243b31ce85927975a3a4f2eccee164a\"" Feb 12 22:04:08.153618 systemd[1]: Started cri-containerd-e7aaef94a770efe65de28b5acdc8af46a243b31ce85927975a3a4f2eccee164a.scope. Feb 12 22:04:08.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.194009 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 12 22:04:08.194161 kernel: audit: type=1400 audit(1707775448.181:1020): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.194205 kernel: audit: type=1400 audit(1707775448.181:1021): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.199398 kernel: audit: type=1400 audit(1707775448.181:1022): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.200196 kernel: audit: type=1400 audit(1707775448.181:1023): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.210117 kernel: audit: type=1400 audit(1707775448.181:1024): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.210907 kernel: audit: type=1400 audit(1707775448.181:1025): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.226192 kernel: audit: type=1400 audit(1707775448.181:1026): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.237455 kernel: audit: type=1400 audit(1707775448.181:1027): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.237594 kernel: audit: type=1400 audit(1707775448.181:1028): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.242776 kernel: audit: type=1400 audit(1707775448.181:1029): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.181000 audit: BPF prog-id=116 op=LOAD Feb 12 22:04:08.182000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.182000 audit[2946]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2405 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:08.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537616165663934613737306566653635646532386235616364633861 Feb 12 22:04:08.182000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.182000 audit[2946]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2405 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:08.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537616165663934613737306566653635646532386235616364633861 Feb 12 22:04:08.182000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.182000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.182000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.182000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.182000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.182000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.182000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.182000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.182000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.182000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.182000 audit: BPF prog-id=117 op=LOAD Feb 12 22:04:08.182000 audit[2946]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003cc2a0 items=0 ppid=2405 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:08.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537616165663934613737306566653635646532386235616364633861 Feb 12 22:04:08.183000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.183000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.183000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.183000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.183000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.183000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.183000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.183000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.183000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.183000 audit: BPF prog-id=118 op=LOAD Feb 12 22:04:08.183000 audit[2946]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003cc2e8 items=0 ppid=2405 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:08.183000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537616165663934613737306566653635646532386235616364633861 Feb 12 22:04:08.193000 audit: BPF prog-id=118 op=UNLOAD Feb 12 22:04:08.193000 audit: BPF prog-id=117 op=UNLOAD Feb 12 22:04:08.193000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.193000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.193000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.193000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.193000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.193000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.193000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.193000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.193000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.193000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:04:08.193000 audit: BPF prog-id=119 op=LOAD Feb 12 22:04:08.193000 audit[2946]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003cc6f8 items=0 ppid=2405 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:04:08.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537616165663934613737306566653635646532386235616364633861 Feb 12 22:04:08.265454 env[1637]: time="2024-02-12T22:04:08.265385261Z" level=info msg="StartContainer for \"e7aaef94a770efe65de28b5acdc8af46a243b31ce85927975a3a4f2eccee164a\" returns successfully" Feb 12 22:04:08.413553 systemd[1]: run-containerd-runc-k8s.io-e7aaef94a770efe65de28b5acdc8af46a243b31ce85927975a3a4f2eccee164a-runc.AmhPaB.mount: Deactivated successfully. Feb 12 22:04:13.905799 kubelet[2783]: E0212 22:04:13.905745 2783 controller.go:189] failed to update lease, error: Put "https://172.31.25.29:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-29?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 12 22:04:14.278910 kubelet[2783]: E0212 22:04:14.278603 2783 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"ip-172-31-25-29\": Get \"https://172.31.25.29:6443/api/v1/nodes/ip-172-31-25-29?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"