Feb 9 10:04:17.967173 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Feb 9 10:04:17.967210 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Feb 9 08:56:26 -00 2024 Feb 9 10:04:17.967234 kernel: efi: EFI v2.70 by EDK II Feb 9 10:04:17.967250 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7ac1aa98 MEMRESERVE=0x71a8cf98 Feb 9 10:04:17.967263 kernel: ACPI: Early table checksum verification disabled Feb 9 10:04:17.967277 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Feb 9 10:04:17.967293 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Feb 9 10:04:17.967307 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Feb 9 10:04:17.967321 kernel: ACPI: DSDT 0x0000000078640000 00154F (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Feb 9 10:04:17.967334 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Feb 9 10:04:17.967353 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Feb 9 10:04:17.967367 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Feb 9 10:04:17.967380 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Feb 9 10:04:17.967394 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Feb 9 10:04:17.967410 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Feb 9 10:04:17.967429 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Feb 9 10:04:17.967444 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Feb 9 10:04:17.967458 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Feb 9 10:04:17.967472 kernel: printk: bootconsole [uart0] enabled Feb 9 10:04:17.967487 kernel: NUMA: Failed to initialise from firmware Feb 9 10:04:17.967501 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Feb 9 10:04:17.967516 kernel: NUMA: NODE_DATA [mem 0x4b5841900-0x4b5846fff] Feb 9 10:04:17.967530 kernel: Zone ranges: Feb 9 10:04:17.967544 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Feb 9 10:04:17.967559 kernel: DMA32 empty Feb 9 10:04:17.967573 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Feb 9 10:04:17.967592 kernel: Movable zone start for each node Feb 9 10:04:17.967606 kernel: Early memory node ranges Feb 9 10:04:17.967621 kernel: node 0: [mem 0x0000000040000000-0x00000000786effff] Feb 9 10:04:17.967635 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Feb 9 10:04:17.967649 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Feb 9 10:04:17.967664 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Feb 9 10:04:17.967678 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Feb 9 10:04:17.967692 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Feb 9 10:04:17.967707 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Feb 9 10:04:17.967721 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Feb 9 10:04:17.967735 kernel: psci: probing for conduit method from ACPI. Feb 9 10:04:17.967750 kernel: psci: PSCIv1.0 detected in firmware. Feb 9 10:04:17.970389 kernel: psci: Using standard PSCI v0.2 function IDs Feb 9 10:04:17.970418 kernel: psci: Trusted OS migration not required Feb 9 10:04:17.970444 kernel: psci: SMC Calling Convention v1.1 Feb 9 10:04:17.970461 kernel: ACPI: SRAT not present Feb 9 10:04:17.970477 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 9 10:04:17.970497 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 9 10:04:17.970513 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 9 10:04:17.970528 kernel: Detected PIPT I-cache on CPU0 Feb 9 10:04:17.970543 kernel: CPU features: detected: GIC system register CPU interface Feb 9 10:04:17.970559 kernel: CPU features: detected: Spectre-v2 Feb 9 10:04:17.970574 kernel: CPU features: detected: Spectre-v3a Feb 9 10:04:17.970589 kernel: CPU features: detected: Spectre-BHB Feb 9 10:04:17.970604 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 9 10:04:17.970619 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 9 10:04:17.970634 kernel: CPU features: detected: ARM erratum 1742098 Feb 9 10:04:17.970649 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Feb 9 10:04:17.970669 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Feb 9 10:04:17.970684 kernel: Policy zone: Normal Feb 9 10:04:17.970702 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 10:04:17.970719 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 10:04:17.970734 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 10:04:17.970750 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 10:04:17.970766 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 10:04:17.970803 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Feb 9 10:04:17.970820 kernel: Memory: 3826316K/4030464K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 204148K reserved, 0K cma-reserved) Feb 9 10:04:17.970836 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 10:04:17.970857 kernel: trace event string verifier disabled Feb 9 10:04:17.970872 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 9 10:04:17.970888 kernel: rcu: RCU event tracing is enabled. Feb 9 10:04:17.970904 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 10:04:17.970919 kernel: Trampoline variant of Tasks RCU enabled. Feb 9 10:04:17.970935 kernel: Tracing variant of Tasks RCU enabled. Feb 9 10:04:17.970951 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 10:04:17.970966 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 10:04:17.970981 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 9 10:04:17.970997 kernel: GICv3: 96 SPIs implemented Feb 9 10:04:17.971012 kernel: GICv3: 0 Extended SPIs implemented Feb 9 10:04:17.971027 kernel: GICv3: Distributor has no Range Selector support Feb 9 10:04:17.971047 kernel: Root IRQ handler: gic_handle_irq Feb 9 10:04:17.971062 kernel: GICv3: 16 PPIs implemented Feb 9 10:04:17.971077 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Feb 9 10:04:17.971093 kernel: ACPI: SRAT not present Feb 9 10:04:17.971107 kernel: ITS [mem 0x10080000-0x1009ffff] Feb 9 10:04:17.971123 kernel: ITS@0x0000000010080000: allocated 8192 Devices @4000a0000 (indirect, esz 8, psz 64K, shr 1) Feb 9 10:04:17.971138 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000b0000 (flat, esz 8, psz 64K, shr 1) Feb 9 10:04:17.971153 kernel: GICv3: using LPI property table @0x00000004000c0000 Feb 9 10:04:17.971169 kernel: ITS: Using hypervisor restricted LPI range [128] Feb 9 10:04:17.971185 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Feb 9 10:04:17.971200 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Feb 9 10:04:17.971219 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Feb 9 10:04:17.971235 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Feb 9 10:04:17.971250 kernel: Console: colour dummy device 80x25 Feb 9 10:04:17.971266 kernel: printk: console [tty1] enabled Feb 9 10:04:17.971282 kernel: ACPI: Core revision 20210730 Feb 9 10:04:17.971298 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Feb 9 10:04:17.971314 kernel: pid_max: default: 32768 minimum: 301 Feb 9 10:04:17.971330 kernel: LSM: Security Framework initializing Feb 9 10:04:17.971346 kernel: SELinux: Initializing. Feb 9 10:04:17.971362 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 10:04:17.971382 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 10:04:17.971398 kernel: rcu: Hierarchical SRCU implementation. Feb 9 10:04:17.971414 kernel: Platform MSI: ITS@0x10080000 domain created Feb 9 10:04:17.971429 kernel: PCI/MSI: ITS@0x10080000 domain created Feb 9 10:04:17.971445 kernel: Remapping and enabling EFI services. Feb 9 10:04:17.971461 kernel: smp: Bringing up secondary CPUs ... Feb 9 10:04:17.971476 kernel: Detected PIPT I-cache on CPU1 Feb 9 10:04:17.971492 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Feb 9 10:04:17.971508 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Feb 9 10:04:17.971527 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Feb 9 10:04:17.971543 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 10:04:17.971558 kernel: SMP: Total of 2 processors activated. Feb 9 10:04:17.971574 kernel: CPU features: detected: 32-bit EL0 Support Feb 9 10:04:17.971589 kernel: CPU features: detected: 32-bit EL1 Support Feb 9 10:04:17.971605 kernel: CPU features: detected: CRC32 instructions Feb 9 10:04:17.971621 kernel: CPU: All CPU(s) started at EL1 Feb 9 10:04:17.971637 kernel: alternatives: patching kernel code Feb 9 10:04:17.971652 kernel: devtmpfs: initialized Feb 9 10:04:17.971671 kernel: KASLR disabled due to lack of seed Feb 9 10:04:17.971687 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 10:04:17.971704 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 10:04:17.971730 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 10:04:17.971750 kernel: SMBIOS 3.0.0 present. Feb 9 10:04:17.971785 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Feb 9 10:04:17.971809 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 10:04:17.971827 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 9 10:04:17.971843 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 9 10:04:17.971860 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 9 10:04:17.971876 kernel: audit: initializing netlink subsys (disabled) Feb 9 10:04:17.971893 kernel: audit: type=2000 audit(0.249:1): state=initialized audit_enabled=0 res=1 Feb 9 10:04:17.971915 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 10:04:17.971932 kernel: cpuidle: using governor menu Feb 9 10:04:17.971949 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 9 10:04:17.971965 kernel: ASID allocator initialised with 32768 entries Feb 9 10:04:17.971981 kernel: ACPI: bus type PCI registered Feb 9 10:04:17.972002 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 10:04:17.972018 kernel: Serial: AMBA PL011 UART driver Feb 9 10:04:17.972034 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 10:04:17.972050 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 9 10:04:17.972067 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 10:04:17.972083 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 9 10:04:17.972099 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 10:04:17.972115 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 9 10:04:17.972131 kernel: ACPI: Added _OSI(Module Device) Feb 9 10:04:17.972151 kernel: ACPI: Added _OSI(Processor Device) Feb 9 10:04:17.972168 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 10:04:17.972184 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 10:04:17.972200 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 10:04:17.972216 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 10:04:17.972232 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 10:04:17.972249 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 10:04:17.972265 kernel: ACPI: Interpreter enabled Feb 9 10:04:17.972281 kernel: ACPI: Using GIC for interrupt routing Feb 9 10:04:17.972301 kernel: ACPI: MCFG table detected, 1 entries Feb 9 10:04:17.972317 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Feb 9 10:04:17.972610 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 10:04:17.972839 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Feb 9 10:04:17.973058 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Feb 9 10:04:17.973255 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Feb 9 10:04:17.973447 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Feb 9 10:04:17.973475 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Feb 9 10:04:17.973493 kernel: acpiphp: Slot [1] registered Feb 9 10:04:17.973509 kernel: acpiphp: Slot [2] registered Feb 9 10:04:17.973525 kernel: acpiphp: Slot [3] registered Feb 9 10:04:17.973541 kernel: acpiphp: Slot [4] registered Feb 9 10:04:17.973558 kernel: acpiphp: Slot [5] registered Feb 9 10:04:17.973574 kernel: acpiphp: Slot [6] registered Feb 9 10:04:17.973590 kernel: acpiphp: Slot [7] registered Feb 9 10:04:17.973606 kernel: acpiphp: Slot [8] registered Feb 9 10:04:17.973626 kernel: acpiphp: Slot [9] registered Feb 9 10:04:17.973642 kernel: acpiphp: Slot [10] registered Feb 9 10:04:17.973658 kernel: acpiphp: Slot [11] registered Feb 9 10:04:17.973674 kernel: acpiphp: Slot [12] registered Feb 9 10:04:17.973690 kernel: acpiphp: Slot [13] registered Feb 9 10:04:17.973706 kernel: acpiphp: Slot [14] registered Feb 9 10:04:17.973723 kernel: acpiphp: Slot [15] registered Feb 9 10:04:17.973739 kernel: acpiphp: Slot [16] registered Feb 9 10:04:17.973754 kernel: acpiphp: Slot [17] registered Feb 9 10:04:17.991053 kernel: acpiphp: Slot [18] registered Feb 9 10:04:17.991099 kernel: acpiphp: Slot [19] registered Feb 9 10:04:17.991117 kernel: acpiphp: Slot [20] registered Feb 9 10:04:17.991134 kernel: acpiphp: Slot [21] registered Feb 9 10:04:17.991151 kernel: acpiphp: Slot [22] registered Feb 9 10:04:17.991168 kernel: acpiphp: Slot [23] registered Feb 9 10:04:17.991184 kernel: acpiphp: Slot [24] registered Feb 9 10:04:17.991200 kernel: acpiphp: Slot [25] registered Feb 9 10:04:17.991217 kernel: acpiphp: Slot [26] registered Feb 9 10:04:17.991233 kernel: acpiphp: Slot [27] registered Feb 9 10:04:17.991253 kernel: acpiphp: Slot [28] registered Feb 9 10:04:17.991269 kernel: acpiphp: Slot [29] registered Feb 9 10:04:17.991285 kernel: acpiphp: Slot [30] registered Feb 9 10:04:17.991302 kernel: acpiphp: Slot [31] registered Feb 9 10:04:17.991318 kernel: PCI host bridge to bus 0000:00 Feb 9 10:04:17.991565 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Feb 9 10:04:17.991748 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Feb 9 10:04:17.991958 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Feb 9 10:04:17.992141 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Feb 9 10:04:17.992361 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Feb 9 10:04:17.992575 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Feb 9 10:04:17.992793 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Feb 9 10:04:17.993031 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Feb 9 10:04:17.993244 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Feb 9 10:04:17.993448 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 10:04:17.993659 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Feb 9 10:04:17.993886 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Feb 9 10:04:17.994091 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Feb 9 10:04:17.994293 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Feb 9 10:04:17.994495 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 10:04:17.994696 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Feb 9 10:04:17.994929 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Feb 9 10:04:17.995128 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Feb 9 10:04:17.995327 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Feb 9 10:04:17.995532 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Feb 9 10:04:17.995714 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Feb 9 10:04:18.008235 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Feb 9 10:04:18.008453 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Feb 9 10:04:18.008486 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Feb 9 10:04:18.008504 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Feb 9 10:04:18.008521 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Feb 9 10:04:18.008539 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Feb 9 10:04:18.008555 kernel: iommu: Default domain type: Translated Feb 9 10:04:18.008572 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 9 10:04:18.008589 kernel: vgaarb: loaded Feb 9 10:04:18.008605 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 10:04:18.008622 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 10:04:18.008643 kernel: PTP clock support registered Feb 9 10:04:18.008659 kernel: Registered efivars operations Feb 9 10:04:18.008676 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 9 10:04:18.008692 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 10:04:18.008709 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 10:04:18.008725 kernel: pnp: PnP ACPI init Feb 9 10:04:18.008964 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Feb 9 10:04:18.009003 kernel: pnp: PnP ACPI: found 1 devices Feb 9 10:04:18.009027 kernel: NET: Registered PF_INET protocol family Feb 9 10:04:18.009049 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 10:04:18.009067 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 10:04:18.009083 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 10:04:18.009100 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 10:04:18.009117 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 10:04:18.009133 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 10:04:18.009149 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 10:04:18.009166 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 10:04:18.009182 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 10:04:18.009203 kernel: PCI: CLS 0 bytes, default 64 Feb 9 10:04:18.009219 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Feb 9 10:04:18.009235 kernel: kvm [1]: HYP mode not available Feb 9 10:04:18.009251 kernel: Initialise system trusted keyrings Feb 9 10:04:18.009268 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 10:04:18.009284 kernel: Key type asymmetric registered Feb 9 10:04:18.009300 kernel: Asymmetric key parser 'x509' registered Feb 9 10:04:18.009316 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 10:04:18.009332 kernel: io scheduler mq-deadline registered Feb 9 10:04:18.009352 kernel: io scheduler kyber registered Feb 9 10:04:18.009369 kernel: io scheduler bfq registered Feb 9 10:04:18.009575 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Feb 9 10:04:18.009601 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Feb 9 10:04:18.009618 kernel: ACPI: button: Power Button [PWRB] Feb 9 10:04:18.009634 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 10:04:18.009651 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Feb 9 10:04:18.009875 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Feb 9 10:04:18.009905 kernel: printk: console [ttyS0] disabled Feb 9 10:04:18.009922 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Feb 9 10:04:18.009939 kernel: printk: console [ttyS0] enabled Feb 9 10:04:18.009955 kernel: printk: bootconsole [uart0] disabled Feb 9 10:04:18.009972 kernel: thunder_xcv, ver 1.0 Feb 9 10:04:18.009988 kernel: thunder_bgx, ver 1.0 Feb 9 10:04:18.010004 kernel: nicpf, ver 1.0 Feb 9 10:04:18.010020 kernel: nicvf, ver 1.0 Feb 9 10:04:18.010225 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 9 10:04:18.010419 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-09T10:04:17 UTC (1707473057) Feb 9 10:04:18.010442 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 10:04:18.010459 kernel: NET: Registered PF_INET6 protocol family Feb 9 10:04:18.010475 kernel: Segment Routing with IPv6 Feb 9 10:04:18.010491 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 10:04:18.010508 kernel: NET: Registered PF_PACKET protocol family Feb 9 10:04:18.010524 kernel: Key type dns_resolver registered Feb 9 10:04:18.010540 kernel: registered taskstats version 1 Feb 9 10:04:18.010561 kernel: Loading compiled-in X.509 certificates Feb 9 10:04:18.010578 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: ca91574208414224935c9cea513398977daf917d' Feb 9 10:04:18.010595 kernel: Key type .fscrypt registered Feb 9 10:04:18.010611 kernel: Key type fscrypt-provisioning registered Feb 9 10:04:18.010627 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 10:04:18.010643 kernel: ima: Allocated hash algorithm: sha1 Feb 9 10:04:18.010659 kernel: ima: No architecture policies found Feb 9 10:04:18.010675 kernel: Freeing unused kernel memory: 34688K Feb 9 10:04:18.010691 kernel: Run /init as init process Feb 9 10:04:18.010711 kernel: with arguments: Feb 9 10:04:18.010728 kernel: /init Feb 9 10:04:18.010744 kernel: with environment: Feb 9 10:04:18.010759 kernel: HOME=/ Feb 9 10:04:18.014817 kernel: TERM=linux Feb 9 10:04:18.014843 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 10:04:18.014866 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 10:04:18.014888 systemd[1]: Detected virtualization amazon. Feb 9 10:04:18.014914 systemd[1]: Detected architecture arm64. Feb 9 10:04:18.014932 systemd[1]: Running in initrd. Feb 9 10:04:18.014950 systemd[1]: No hostname configured, using default hostname. Feb 9 10:04:18.014967 systemd[1]: Hostname set to . Feb 9 10:04:18.014985 systemd[1]: Initializing machine ID from VM UUID. Feb 9 10:04:18.015003 systemd[1]: Queued start job for default target initrd.target. Feb 9 10:04:18.015020 systemd[1]: Started systemd-ask-password-console.path. Feb 9 10:04:18.015038 systemd[1]: Reached target cryptsetup.target. Feb 9 10:04:18.015059 systemd[1]: Reached target paths.target. Feb 9 10:04:18.015077 systemd[1]: Reached target slices.target. Feb 9 10:04:18.015094 systemd[1]: Reached target swap.target. Feb 9 10:04:18.015111 systemd[1]: Reached target timers.target. Feb 9 10:04:18.015129 systemd[1]: Listening on iscsid.socket. Feb 9 10:04:18.015146 systemd[1]: Listening on iscsiuio.socket. Feb 9 10:04:18.015164 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 10:04:18.015182 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 10:04:18.015203 systemd[1]: Listening on systemd-journald.socket. Feb 9 10:04:18.015221 systemd[1]: Listening on systemd-networkd.socket. Feb 9 10:04:18.015238 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 10:04:18.015256 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 10:04:18.015273 systemd[1]: Reached target sockets.target. Feb 9 10:04:18.015291 systemd[1]: Starting kmod-static-nodes.service... Feb 9 10:04:18.015308 systemd[1]: Finished network-cleanup.service. Feb 9 10:04:18.015326 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 10:04:18.015343 systemd[1]: Starting systemd-journald.service... Feb 9 10:04:18.015366 systemd[1]: Starting systemd-modules-load.service... Feb 9 10:04:18.015383 systemd[1]: Starting systemd-resolved.service... Feb 9 10:04:18.015400 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 10:04:18.015418 systemd[1]: Finished kmod-static-nodes.service. Feb 9 10:04:18.015436 kernel: audit: type=1130 audit(1707473057.977:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:18.015454 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 10:04:18.015472 kernel: audit: type=1130 audit(1707473057.999:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:18.015489 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 10:04:18.015514 systemd-journald[308]: Journal started Feb 9 10:04:18.015602 systemd-journald[308]: Runtime Journal (/run/log/journal/ec29b8fe525e43b929890a9d149b4cf4) is 8.0M, max 75.4M, 67.4M free. Feb 9 10:04:17.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:17.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:17.966252 systemd-modules-load[309]: Inserted module 'overlay' Feb 9 10:04:18.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:18.042794 kernel: audit: type=1130 audit(1707473058.026:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:18.042862 systemd[1]: Started systemd-journald.service. Feb 9 10:04:18.042893 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 10:04:18.046468 systemd-modules-load[309]: Inserted module 'br_netfilter' Feb 9 10:04:18.050493 kernel: Bridge firewalling registered Feb 9 10:04:18.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:18.063463 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 10:04:18.072148 kernel: audit: type=1130 audit(1707473058.052:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:18.068127 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 10:04:18.087803 kernel: SCSI subsystem initialized Feb 9 10:04:18.094651 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 10:04:18.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:18.109800 kernel: audit: type=1130 audit(1707473058.093:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:18.117597 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 10:04:18.117667 kernel: device-mapper: uevent: version 1.0.3 Feb 9 10:04:18.116583 systemd-resolved[310]: Positive Trust Anchors: Feb 9 10:04:18.116607 systemd-resolved[310]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 10:04:18.116662 systemd-resolved[310]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 10:04:18.123789 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 10:04:18.165734 systemd-modules-load[309]: Inserted module 'dm_multipath' Feb 9 10:04:18.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:18.167343 systemd[1]: Finished systemd-modules-load.service. Feb 9 10:04:18.177187 systemd[1]: Starting systemd-sysctl.service... Feb 9 10:04:18.181787 kernel: audit: type=1130 audit(1707473058.165:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:18.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:18.203594 systemd[1]: Finished systemd-sysctl.service. Feb 9 10:04:18.213790 kernel: audit: type=1130 audit(1707473058.201:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:18.218758 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 10:04:18.226727 systemd[1]: Starting dracut-cmdline.service... Feb 9 10:04:18.237744 kernel: audit: type=1130 audit(1707473058.222:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:18.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:18.264687 dracut-cmdline[332]: dracut-dracut-053 Feb 9 10:04:18.272942 dracut-cmdline[332]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 10:04:18.397805 kernel: Loading iSCSI transport class v2.0-870. Feb 9 10:04:18.411829 kernel: iscsi: registered transport (tcp) Feb 9 10:04:18.436005 kernel: iscsi: registered transport (qla4xxx) Feb 9 10:04:18.436075 kernel: QLogic iSCSI HBA Driver Feb 9 10:04:18.623415 systemd-resolved[310]: Defaulting to hostname 'linux'. Feb 9 10:04:18.627143 kernel: random: crng init done Feb 9 10:04:18.625161 systemd[1]: Started systemd-resolved.service. Feb 9 10:04:18.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:18.632653 systemd[1]: Reached target nss-lookup.target. Feb 9 10:04:18.643961 kernel: audit: type=1130 audit(1707473058.631:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:18.661831 systemd[1]: Finished dracut-cmdline.service. Feb 9 10:04:18.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:18.667034 systemd[1]: Starting dracut-pre-udev.service... Feb 9 10:04:18.732812 kernel: raid6: neonx8 gen() 6408 MB/s Feb 9 10:04:18.750800 kernel: raid6: neonx8 xor() 4566 MB/s Feb 9 10:04:18.768801 kernel: raid6: neonx4 gen() 6550 MB/s Feb 9 10:04:18.786799 kernel: raid6: neonx4 xor() 4664 MB/s Feb 9 10:04:18.804799 kernel: raid6: neonx2 gen() 5787 MB/s Feb 9 10:04:18.822799 kernel: raid6: neonx2 xor() 4361 MB/s Feb 9 10:04:18.840799 kernel: raid6: neonx1 gen() 4489 MB/s Feb 9 10:04:18.858800 kernel: raid6: neonx1 xor() 3574 MB/s Feb 9 10:04:18.876801 kernel: raid6: int64x8 gen() 3424 MB/s Feb 9 10:04:18.894798 kernel: raid6: int64x8 xor() 2042 MB/s Feb 9 10:04:18.912797 kernel: raid6: int64x4 gen() 3830 MB/s Feb 9 10:04:18.930800 kernel: raid6: int64x4 xor() 2155 MB/s Feb 9 10:04:18.948798 kernel: raid6: int64x2 gen() 3602 MB/s Feb 9 10:04:18.966799 kernel: raid6: int64x2 xor() 1918 MB/s Feb 9 10:04:18.984799 kernel: raid6: int64x1 gen() 2749 MB/s Feb 9 10:04:19.004277 kernel: raid6: int64x1 xor() 1404 MB/s Feb 9 10:04:19.004306 kernel: raid6: using algorithm neonx4 gen() 6550 MB/s Feb 9 10:04:19.004330 kernel: raid6: .... xor() 4664 MB/s, rmw enabled Feb 9 10:04:19.006094 kernel: raid6: using neon recovery algorithm Feb 9 10:04:19.024805 kernel: xor: measuring software checksum speed Feb 9 10:04:19.027801 kernel: 8regs : 9092 MB/sec Feb 9 10:04:19.027831 kernel: 32regs : 11108 MB/sec Feb 9 10:04:19.033866 kernel: arm64_neon : 9651 MB/sec Feb 9 10:04:19.033899 kernel: xor: using function: 32regs (11108 MB/sec) Feb 9 10:04:19.123822 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 9 10:04:19.141310 systemd[1]: Finished dracut-pre-udev.service. Feb 9 10:04:19.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:19.145000 audit: BPF prog-id=7 op=LOAD Feb 9 10:04:19.145000 audit: BPF prog-id=8 op=LOAD Feb 9 10:04:19.147993 systemd[1]: Starting systemd-udevd.service... Feb 9 10:04:19.178058 systemd-udevd[508]: Using default interface naming scheme 'v252'. Feb 9 10:04:19.189679 systemd[1]: Started systemd-udevd.service. Feb 9 10:04:19.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:19.197982 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 10:04:19.224745 dracut-pre-trigger[517]: rd.md=0: removing MD RAID activation Feb 9 10:04:19.286630 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 10:04:19.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:19.291087 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 10:04:19.397180 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 10:04:19.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:19.531374 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Feb 9 10:04:19.531453 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Feb 9 10:04:19.539652 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Feb 9 10:04:19.539718 kernel: nvme nvme0: pci function 0000:00:04.0 Feb 9 10:04:19.542797 kernel: ena 0000:00:05.0: ENA device version: 0.10 Feb 9 10:04:19.546555 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Feb 9 10:04:19.550808 kernel: nvme nvme0: 2/0/0 default/read/poll queues Feb 9 10:04:19.555792 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:5a:eb:37:55:59 Feb 9 10:04:19.556078 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 10:04:19.559539 kernel: GPT:9289727 != 16777215 Feb 9 10:04:19.559578 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 10:04:19.563040 kernel: GPT:9289727 != 16777215 Feb 9 10:04:19.563090 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 10:04:19.566401 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 10:04:19.572473 (udev-worker)[567]: Network interface NamePolicy= disabled on kernel command line. Feb 9 10:04:19.669815 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (568) Feb 9 10:04:19.687355 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 10:04:19.723591 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 10:04:19.882606 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 10:04:19.963950 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 10:04:19.969043 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 10:04:19.976400 systemd[1]: Starting disk-uuid.service... Feb 9 10:04:19.992916 disk-uuid[668]: Primary Header is updated. Feb 9 10:04:19.992916 disk-uuid[668]: Secondary Entries is updated. Feb 9 10:04:19.992916 disk-uuid[668]: Secondary Header is updated. Feb 9 10:04:20.002234 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 10:04:20.004796 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 10:04:20.011806 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 10:04:21.018806 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 10:04:21.019694 disk-uuid[669]: The operation has completed successfully. Feb 9 10:04:21.175011 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 10:04:21.175228 systemd[1]: Finished disk-uuid.service. Feb 9 10:04:21.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:21.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:21.215997 systemd[1]: Starting verity-setup.service... Feb 9 10:04:21.241814 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 9 10:04:21.368885 systemd[1]: Found device dev-mapper-usr.device. Feb 9 10:04:21.375601 systemd[1]: Finished verity-setup.service. Feb 9 10:04:21.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:21.381283 systemd[1]: Mounting sysusr-usr.mount... Feb 9 10:04:21.468811 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 10:04:21.467133 systemd[1]: Mounted sysusr-usr.mount. Feb 9 10:04:21.471351 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 10:04:21.478264 systemd[1]: Starting ignition-setup.service... Feb 9 10:04:21.489099 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 10:04:21.510409 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Feb 9 10:04:21.510478 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 9 10:04:21.512669 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 9 10:04:21.521143 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 9 10:04:21.538065 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 10:04:21.624025 systemd[1]: Finished ignition-setup.service. Feb 9 10:04:21.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:21.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:21.632000 audit: BPF prog-id=9 op=LOAD Feb 9 10:04:21.625646 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 10:04:21.630093 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 10:04:21.635409 systemd[1]: Starting systemd-networkd.service... Feb 9 10:04:21.690877 systemd-networkd[1181]: lo: Link UP Feb 9 10:04:21.690899 systemd-networkd[1181]: lo: Gained carrier Feb 9 10:04:21.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:21.692452 systemd-networkd[1181]: Enumeration completed Feb 9 10:04:21.693317 systemd-networkd[1181]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 10:04:21.694284 systemd[1]: Started systemd-networkd.service. Feb 9 10:04:21.697150 systemd[1]: Reached target network.target. Feb 9 10:04:21.706497 systemd[1]: Starting iscsiuio.service... Feb 9 10:04:21.709013 systemd-networkd[1181]: eth0: Link UP Feb 9 10:04:21.709025 systemd-networkd[1181]: eth0: Gained carrier Feb 9 10:04:21.730526 systemd[1]: Started iscsiuio.service. Feb 9 10:04:21.743759 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 9 10:04:21.743826 kernel: audit: type=1130 audit(1707473061.732:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:21.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:21.749437 systemd[1]: Starting iscsid.service... Feb 9 10:04:21.759330 iscsid[1186]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 10:04:21.759330 iscsid[1186]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 10:04:21.759330 iscsid[1186]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 10:04:21.759330 iscsid[1186]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 10:04:21.759330 iscsid[1186]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 10:04:21.759330 iscsid[1186]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 10:04:21.758939 systemd-networkd[1181]: eth0: DHCPv4 address 172.31.25.36/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 9 10:04:21.793187 systemd[1]: Started iscsid.service. Feb 9 10:04:21.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:21.809051 kernel: audit: type=1130 audit(1707473061.794:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:21.809356 systemd[1]: Starting dracut-initqueue.service... Feb 9 10:04:21.834047 systemd[1]: Finished dracut-initqueue.service. Feb 9 10:04:21.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:21.838345 systemd[1]: Reached target remote-fs-pre.target. Feb 9 10:04:21.853819 kernel: audit: type=1130 audit(1707473061.837:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:21.847396 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 10:04:21.849592 systemd[1]: Reached target remote-fs.target. Feb 9 10:04:21.858689 systemd[1]: Starting dracut-pre-mount.service... Feb 9 10:04:21.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:21.875266 systemd[1]: Finished dracut-pre-mount.service. Feb 9 10:04:21.889660 kernel: audit: type=1130 audit(1707473061.879:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:23.018942 systemd-networkd[1181]: eth0: Gained IPv6LL Feb 9 10:04:24.234984 ignition[1180]: Ignition 2.14.0 Feb 9 10:04:24.235011 ignition[1180]: Stage: fetch-offline Feb 9 10:04:24.235335 ignition[1180]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:04:24.235396 ignition[1180]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 10:04:24.256296 ignition[1180]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 10:04:24.259454 ignition[1180]: Ignition finished successfully Feb 9 10:04:24.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:24.262990 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 10:04:24.266799 systemd[1]: Starting ignition-fetch.service... Feb 9 10:04:24.280824 kernel: audit: type=1130 audit(1707473064.264:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:24.285461 ignition[1205]: Ignition 2.14.0 Feb 9 10:04:24.285490 ignition[1205]: Stage: fetch Feb 9 10:04:24.285820 ignition[1205]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:04:24.285880 ignition[1205]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 10:04:24.308256 ignition[1205]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 10:04:24.311861 ignition[1205]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 10:04:24.316326 ignition[1205]: INFO : PUT result: OK Feb 9 10:04:24.322607 ignition[1205]: DEBUG : parsed url from cmdline: "" Feb 9 10:04:24.324898 ignition[1205]: INFO : no config URL provided Feb 9 10:04:24.324898 ignition[1205]: INFO : reading system config file "/usr/lib/ignition/user.ign" Feb 9 10:04:24.324898 ignition[1205]: INFO : no config at "/usr/lib/ignition/user.ign" Feb 9 10:04:24.324898 ignition[1205]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 10:04:24.335214 ignition[1205]: INFO : PUT result: OK Feb 9 10:04:24.349120 ignition[1205]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Feb 9 10:04:24.352172 ignition[1205]: INFO : GET result: OK Feb 9 10:04:24.354205 ignition[1205]: DEBUG : parsing config with SHA512: 0aa9b33ad18bd091848b4f6f8e30fe2a26d88e5bcfb12ddbab54281fecdb160299beac90f9f61e7f84b9ea9c76d03939f8debe84bc9f49faa4ccbe4e9370c1f8 Feb 9 10:04:24.422126 unknown[1205]: fetched base config from "system" Feb 9 10:04:24.422388 unknown[1205]: fetched base config from "system" Feb 9 10:04:24.423833 ignition[1205]: fetch: fetch complete Feb 9 10:04:24.422404 unknown[1205]: fetched user config from "aws" Feb 9 10:04:24.423856 ignition[1205]: fetch: fetch passed Feb 9 10:04:24.423946 ignition[1205]: Ignition finished successfully Feb 9 10:04:24.436337 systemd[1]: Finished ignition-fetch.service. Feb 9 10:04:24.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:24.442591 systemd[1]: Starting ignition-kargs.service... Feb 9 10:04:24.452275 kernel: audit: type=1130 audit(1707473064.439:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:24.466026 ignition[1211]: Ignition 2.14.0 Feb 9 10:04:24.466055 ignition[1211]: Stage: kargs Feb 9 10:04:24.466342 ignition[1211]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:04:24.466396 ignition[1211]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 10:04:24.482256 ignition[1211]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 10:04:24.485203 ignition[1211]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 10:04:24.489172 ignition[1211]: INFO : PUT result: OK Feb 9 10:04:24.494384 ignition[1211]: kargs: kargs passed Feb 9 10:04:24.494487 ignition[1211]: Ignition finished successfully Feb 9 10:04:24.498904 systemd[1]: Finished ignition-kargs.service. Feb 9 10:04:24.513907 kernel: audit: type=1130 audit(1707473064.497:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:24.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:24.513272 systemd[1]: Starting ignition-disks.service... Feb 9 10:04:24.529393 ignition[1217]: Ignition 2.14.0 Feb 9 10:04:24.531341 ignition[1217]: Stage: disks Feb 9 10:04:24.533176 ignition[1217]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:04:24.536022 ignition[1217]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 10:04:24.546822 ignition[1217]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 10:04:24.549614 ignition[1217]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 10:04:24.552614 ignition[1217]: INFO : PUT result: OK Feb 9 10:04:24.558383 ignition[1217]: disks: disks passed Feb 9 10:04:24.558485 ignition[1217]: Ignition finished successfully Feb 9 10:04:24.563733 systemd[1]: Finished ignition-disks.service. Feb 9 10:04:24.576878 kernel: audit: type=1130 audit(1707473064.563:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:24.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:24.565977 systemd[1]: Reached target initrd-root-device.target. Feb 9 10:04:24.576932 systemd[1]: Reached target local-fs-pre.target. Feb 9 10:04:24.579027 systemd[1]: Reached target local-fs.target. Feb 9 10:04:24.580960 systemd[1]: Reached target sysinit.target. Feb 9 10:04:24.582900 systemd[1]: Reached target basic.target. Feb 9 10:04:24.586198 systemd[1]: Starting systemd-fsck-root.service... Feb 9 10:04:24.628603 systemd-fsck[1225]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 9 10:04:24.637498 systemd[1]: Finished systemd-fsck-root.service. Feb 9 10:04:24.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:24.642570 systemd[1]: Mounting sysroot.mount... Feb 9 10:04:24.656826 kernel: audit: type=1130 audit(1707473064.635:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:24.673795 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 10:04:24.675576 systemd[1]: Mounted sysroot.mount. Feb 9 10:04:24.679261 systemd[1]: Reached target initrd-root-fs.target. Feb 9 10:04:24.733670 systemd[1]: Mounting sysroot-usr.mount... Feb 9 10:04:24.737972 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 10:04:24.738086 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 10:04:24.744918 systemd[1]: Reached target ignition-diskful.target. Feb 9 10:04:24.750981 systemd[1]: Mounted sysroot-usr.mount. Feb 9 10:04:24.800365 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 10:04:24.808142 systemd[1]: Starting initrd-setup-root.service... Feb 9 10:04:24.825809 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1242) Feb 9 10:04:24.828101 initrd-setup-root[1247]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 10:04:24.836701 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Feb 9 10:04:24.836735 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 9 10:04:24.836758 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 9 10:04:24.845808 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 9 10:04:24.849749 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 10:04:24.904817 initrd-setup-root[1273]: cut: /sysroot/etc/group: No such file or directory Feb 9 10:04:24.914139 initrd-setup-root[1281]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 10:04:24.922799 initrd-setup-root[1289]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 10:04:25.686900 systemd[1]: Finished initrd-setup-root.service. Feb 9 10:04:25.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:25.692338 systemd[1]: Starting ignition-mount.service... Feb 9 10:04:25.702181 kernel: audit: type=1130 audit(1707473065.689:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:25.703279 systemd[1]: Starting sysroot-boot.service... Feb 9 10:04:25.717115 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 10:04:25.717305 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 10:04:25.751329 ignition[1308]: INFO : Ignition 2.14.0 Feb 9 10:04:25.751329 ignition[1308]: INFO : Stage: mount Feb 9 10:04:25.751329 ignition[1308]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:04:25.751329 ignition[1308]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 10:04:25.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:25.752276 systemd[1]: Finished sysroot-boot.service. Feb 9 10:04:25.776430 ignition[1308]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 10:04:25.779802 ignition[1308]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 10:04:25.783676 ignition[1308]: INFO : PUT result: OK Feb 9 10:04:25.789332 ignition[1308]: INFO : mount: mount passed Feb 9 10:04:25.791427 ignition[1308]: INFO : Ignition finished successfully Feb 9 10:04:25.793906 systemd[1]: Finished ignition-mount.service. Feb 9 10:04:25.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:25.798533 systemd[1]: Starting ignition-files.service... Feb 9 10:04:25.816143 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 10:04:25.834816 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1317) Feb 9 10:04:25.840947 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Feb 9 10:04:25.841002 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 9 10:04:25.841029 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 9 10:04:25.849804 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 9 10:04:25.855819 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 10:04:25.885966 ignition[1336]: INFO : Ignition 2.14.0 Feb 9 10:04:25.885966 ignition[1336]: INFO : Stage: files Feb 9 10:04:25.890070 ignition[1336]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:04:25.890070 ignition[1336]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 10:04:25.908105 ignition[1336]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 10:04:25.911324 ignition[1336]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 10:04:25.915162 ignition[1336]: INFO : PUT result: OK Feb 9 10:04:25.920147 ignition[1336]: DEBUG : files: compiled without relabeling support, skipping Feb 9 10:04:25.925411 ignition[1336]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 10:04:25.928694 ignition[1336]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 10:04:26.073904 ignition[1336]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 10:04:26.079581 ignition[1336]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 10:04:26.083535 unknown[1336]: wrote ssh authorized keys file for user: core Feb 9 10:04:26.086308 ignition[1336]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 10:04:26.090963 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 9 10:04:26.095638 ignition[1336]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-arm64-v1.1.1.tgz: attempt #1 Feb 9 10:04:26.550619 ignition[1336]: INFO : GET result: OK Feb 9 10:04:26.973346 ignition[1336]: DEBUG : file matches expected sum of: 6b5df61a53601926e4b5a9174828123d555f592165439f541bc117c68781f41c8bd30dccd52367e406d104df849bcbcfb72d9c4bafda4b045c59ce95d0ca0742 Feb 9 10:04:26.980073 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 9 10:04:26.980073 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 10:04:26.980073 ignition[1336]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 9 10:04:27.058884 ignition[1336]: INFO : GET result: OK Feb 9 10:04:27.161732 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 10:04:27.167148 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 9 10:04:27.167148 ignition[1336]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-arm64.tar.gz: attempt #1 Feb 9 10:04:27.557287 ignition[1336]: INFO : GET result: OK Feb 9 10:04:27.802126 ignition[1336]: DEBUG : file matches expected sum of: 4c7e4541123cbd6f1d6fec1f827395cd58d65716c0998de790f965485738b6d6257c0dc46fd7f66403166c299f6d5bf9ff30b6e1ff9afbb071f17005e834518c Feb 9 10:04:27.809365 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 9 10:04:27.809365 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 10:04:27.809365 ignition[1336]: INFO : GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubectl: attempt #1 Feb 9 10:04:27.929625 ignition[1336]: INFO : GET result: OK Feb 9 10:04:28.492577 ignition[1336]: DEBUG : file matches expected sum of: 3672fda0beebbbd636a2088f427463cbad32683ea4fbb1df61650552e63846b6a47db803ccb70c3db0a8f24746a23a5632bdc15a3fb78f4f7d833e7f86763c2a Feb 9 10:04:28.502167 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 10:04:28.502167 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 9 10:04:28.502167 ignition[1336]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 10:04:28.518556 ignition[1336]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4011991854" Feb 9 10:04:28.526863 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1338) Feb 9 10:04:28.526900 ignition[1336]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4011991854": device or resource busy Feb 9 10:04:28.526900 ignition[1336]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4011991854", trying btrfs: device or resource busy Feb 9 10:04:28.526900 ignition[1336]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4011991854" Feb 9 10:04:28.538129 ignition[1336]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4011991854" Feb 9 10:04:28.631209 ignition[1336]: INFO : op(3): [started] unmounting "/mnt/oem4011991854" Feb 9 10:04:28.634151 ignition[1336]: INFO : op(3): [finished] unmounting "/mnt/oem4011991854" Feb 9 10:04:28.636685 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 9 10:04:28.636685 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 10:04:28.636685 ignition[1336]: INFO : GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubeadm: attempt #1 Feb 9 10:04:28.650074 systemd[1]: mnt-oem4011991854.mount: Deactivated successfully. Feb 9 10:04:28.698384 ignition[1336]: INFO : GET result: OK Feb 9 10:04:29.248969 ignition[1336]: DEBUG : file matches expected sum of: 46c9f489062bdb84574703f7339d140d7e42c9c71b367cd860071108a3c1d38fabda2ef69f9c0ff88f7c80e88d38f96ab2248d4c9a6c9c60b0a4c20fd640d0db Feb 9 10:04:29.255159 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 10:04:29.255159 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 10:04:29.255159 ignition[1336]: INFO : GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubelet: attempt #1 Feb 9 10:04:29.311703 ignition[1336]: INFO : GET result: OK Feb 9 10:04:30.697540 ignition[1336]: DEBUG : file matches expected sum of: 0e4ee1f23bf768c49d09beb13a6b5fad6efc8e3e685e7c5610188763e3af55923fb46158b5e76973a0f9a055f9b30d525b467c53415f965536adc2f04d9cf18d Feb 9 10:04:30.705664 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 10:04:30.705664 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 10:04:30.705664 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 10:04:30.705664 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Feb 9 10:04:30.705664 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 10:04:30.705664 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 10:04:30.705664 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 10:04:30.705664 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 10:04:30.705664 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 10:04:30.705664 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 10:04:30.705664 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 10:04:30.750629 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 10:04:30.750629 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 10:04:30.750629 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 10:04:30.750629 ignition[1336]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 10:04:30.780533 ignition[1336]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1337321176" Feb 9 10:04:30.784168 ignition[1336]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1337321176": device or resource busy Feb 9 10:04:30.784168 ignition[1336]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1337321176", trying btrfs: device or resource busy Feb 9 10:04:30.792388 ignition[1336]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1337321176" Feb 9 10:04:30.795894 ignition[1336]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1337321176" Feb 9 10:04:30.800127 ignition[1336]: INFO : op(6): [started] unmounting "/mnt/oem1337321176" Feb 9 10:04:30.800127 ignition[1336]: INFO : op(6): [finished] unmounting "/mnt/oem1337321176" Feb 9 10:04:30.800127 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 10:04:30.800127 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 9 10:04:30.800127 ignition[1336]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 10:04:30.825853 systemd[1]: mnt-oem1337321176.mount: Deactivated successfully. Feb 9 10:04:30.840380 ignition[1336]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2237853820" Feb 9 10:04:30.843902 ignition[1336]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2237853820": device or resource busy Feb 9 10:04:30.843902 ignition[1336]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2237853820", trying btrfs: device or resource busy Feb 9 10:04:30.843902 ignition[1336]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2237853820" Feb 9 10:04:30.861885 ignition[1336]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2237853820" Feb 9 10:04:30.861885 ignition[1336]: INFO : op(9): [started] unmounting "/mnt/oem2237853820" Feb 9 10:04:30.872986 ignition[1336]: INFO : op(9): [finished] unmounting "/mnt/oem2237853820" Feb 9 10:04:30.872986 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 9 10:04:30.872986 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 9 10:04:30.872986 ignition[1336]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 10:04:30.862042 systemd[1]: mnt-oem2237853820.mount: Deactivated successfully. Feb 9 10:04:30.907959 ignition[1336]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2340001053" Feb 9 10:04:30.911937 ignition[1336]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2340001053": device or resource busy Feb 9 10:04:30.911937 ignition[1336]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2340001053", trying btrfs: device or resource busy Feb 9 10:04:30.911937 ignition[1336]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2340001053" Feb 9 10:04:30.941163 ignition[1336]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2340001053" Feb 9 10:04:30.941163 ignition[1336]: INFO : op(c): [started] unmounting "/mnt/oem2340001053" Feb 9 10:04:30.941163 ignition[1336]: INFO : op(c): [finished] unmounting "/mnt/oem2340001053" Feb 9 10:04:30.941163 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 9 10:04:30.941163 ignition[1336]: INFO : files: op(13): [started] processing unit "nvidia.service" Feb 9 10:04:30.941163 ignition[1336]: INFO : files: op(13): [finished] processing unit "nvidia.service" Feb 9 10:04:30.941163 ignition[1336]: INFO : files: op(14): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 10:04:30.941163 ignition[1336]: INFO : files: op(14): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 10:04:30.941163 ignition[1336]: INFO : files: op(15): [started] processing unit "amazon-ssm-agent.service" Feb 9 10:04:30.941163 ignition[1336]: INFO : files: op(15): op(16): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 9 10:04:30.941163 ignition[1336]: INFO : files: op(15): op(16): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 9 10:04:30.941163 ignition[1336]: INFO : files: op(15): [finished] processing unit "amazon-ssm-agent.service" Feb 9 10:04:30.941163 ignition[1336]: INFO : files: op(17): [started] processing unit "prepare-cni-plugins.service" Feb 9 10:04:30.941163 ignition[1336]: INFO : files: op(17): op(18): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 10:04:30.941163 ignition[1336]: INFO : files: op(17): op(18): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 10:04:30.941163 ignition[1336]: INFO : files: op(17): [finished] processing unit "prepare-cni-plugins.service" Feb 9 10:04:30.941163 ignition[1336]: INFO : files: op(19): [started] processing unit "prepare-critools.service" Feb 9 10:04:30.941163 ignition[1336]: INFO : files: op(19): op(1a): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 10:04:30.941163 ignition[1336]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 10:04:30.941163 ignition[1336]: INFO : files: op(19): [finished] processing unit "prepare-critools.service" Feb 9 10:04:31.086010 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 10:04:31.086053 kernel: audit: type=1130 audit(1707473070.972:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.086090 kernel: audit: type=1130 audit(1707473071.018:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.086116 kernel: audit: type=1131 audit(1707473071.018:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.086141 kernel: audit: type=1130 audit(1707473071.067:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:30.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:30.965531 systemd[1]: Finished ignition-files.service. Feb 9 10:04:31.089726 ignition[1336]: INFO : files: op(1b): [started] processing unit "prepare-helm.service" Feb 9 10:04:31.089726 ignition[1336]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 10:04:31.089726 ignition[1336]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 10:04:31.089726 ignition[1336]: INFO : files: op(1b): [finished] processing unit "prepare-helm.service" Feb 9 10:04:31.089726 ignition[1336]: INFO : files: op(1d): [started] setting preset to enabled for "nvidia.service" Feb 9 10:04:31.089726 ignition[1336]: INFO : files: op(1d): [finished] setting preset to enabled for "nvidia.service" Feb 9 10:04:31.089726 ignition[1336]: INFO : files: op(1e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 10:04:31.089726 ignition[1336]: INFO : files: op(1e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 10:04:31.089726 ignition[1336]: INFO : files: op(1f): [started] setting preset to enabled for "amazon-ssm-agent.service" Feb 9 10:04:31.089726 ignition[1336]: INFO : files: op(1f): [finished] setting preset to enabled for "amazon-ssm-agent.service" Feb 9 10:04:31.089726 ignition[1336]: INFO : files: op(20): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 10:04:31.089726 ignition[1336]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 10:04:31.089726 ignition[1336]: INFO : files: op(21): [started] setting preset to enabled for "prepare-critools.service" Feb 9 10:04:31.089726 ignition[1336]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 10:04:31.089726 ignition[1336]: INFO : files: op(22): [started] setting preset to enabled for "prepare-helm.service" Feb 9 10:04:31.089726 ignition[1336]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 10:04:31.089726 ignition[1336]: INFO : files: createResultFile: createFiles: op(23): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 10:04:31.089726 ignition[1336]: INFO : files: createResultFile: createFiles: op(23): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 10:04:31.089726 ignition[1336]: INFO : files: files passed Feb 9 10:04:31.089726 ignition[1336]: INFO : Ignition finished successfully Feb 9 10:04:31.229561 kernel: audit: type=1130 audit(1707473071.125:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.229600 kernel: audit: type=1131 audit(1707473071.135:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.229625 kernel: audit: type=1130 audit(1707473071.181:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:30.984994 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 10:04:30.988182 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 10:04:31.238903 initrd-setup-root-after-ignition[1361]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 10:04:30.997747 systemd[1]: Starting ignition-quench.service... Feb 9 10:04:31.008806 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 10:04:31.009057 systemd[1]: Finished ignition-quench.service. Feb 9 10:04:31.047019 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 10:04:31.073145 systemd[1]: Reached target ignition-complete.target. Feb 9 10:04:31.089055 systemd[1]: Starting initrd-parse-etc.service... Feb 9 10:04:31.126497 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 10:04:31.126710 systemd[1]: Finished initrd-parse-etc.service. Feb 9 10:04:31.138753 systemd[1]: Reached target initrd-fs.target. Feb 9 10:04:31.151988 systemd[1]: Reached target initrd.target. Feb 9 10:04:31.153965 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 10:04:31.155418 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 10:04:31.180343 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 10:04:31.193973 systemd[1]: Starting initrd-cleanup.service... Feb 9 10:04:31.290956 systemd[1]: Stopped target nss-lookup.target. Feb 9 10:04:31.295224 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 10:04:31.299576 systemd[1]: Stopped target timers.target. Feb 9 10:04:31.303339 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 10:04:31.303663 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 10:04:31.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.317223 systemd[1]: Stopped target initrd.target. Feb 9 10:04:31.319005 kernel: audit: type=1131 audit(1707473071.307:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.321105 systemd[1]: Stopped target basic.target. Feb 9 10:04:31.333002 systemd[1]: Stopped target ignition-complete.target. Feb 9 10:04:31.337271 systemd[1]: Stopped target ignition-diskful.target. Feb 9 10:04:31.341455 systemd[1]: Stopped target initrd-root-device.target. Feb 9 10:04:31.345866 systemd[1]: Stopped target remote-fs.target. Feb 9 10:04:31.349722 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 10:04:31.353860 systemd[1]: Stopped target sysinit.target. Feb 9 10:04:31.357680 systemd[1]: Stopped target local-fs.target. Feb 9 10:04:31.361516 systemd[1]: Stopped target local-fs-pre.target. Feb 9 10:04:31.365572 systemd[1]: Stopped target swap.target. Feb 9 10:04:31.369097 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 10:04:31.371640 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 10:04:31.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.375734 systemd[1]: Stopped target cryptsetup.target. Feb 9 10:04:31.386660 kernel: audit: type=1131 audit(1707473071.373:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.386907 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 10:04:31.389450 systemd[1]: Stopped dracut-initqueue.service. Feb 9 10:04:31.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.393561 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 10:04:31.408538 kernel: audit: type=1131 audit(1707473071.391:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.393804 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 10:04:31.403250 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 10:04:31.403471 systemd[1]: Stopped ignition-files.service. Feb 9 10:04:31.412290 systemd[1]: Stopping ignition-mount.service... Feb 9 10:04:31.437902 ignition[1374]: INFO : Ignition 2.14.0 Feb 9 10:04:31.437902 ignition[1374]: INFO : Stage: umount Feb 9 10:04:31.437902 ignition[1374]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:04:31.437902 ignition[1374]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 10:04:31.440034 iscsid[1186]: iscsid shutting down. Feb 9 10:04:31.432703 systemd[1]: Stopping iscsid.service... Feb 9 10:04:31.448873 ignition[1374]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 10:04:31.466795 ignition[1374]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 10:04:31.460501 systemd[1]: Stopping sysroot-boot.service... Feb 9 10:04:31.463960 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 10:04:31.464448 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 10:04:31.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.478143 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 10:04:31.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.478363 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 10:04:31.489995 ignition[1374]: INFO : PUT result: OK Feb 9 10:04:31.492186 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 10:04:31.492401 systemd[1]: Finished initrd-cleanup.service. Feb 9 10:04:31.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.498947 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 10:04:31.501225 systemd[1]: Stopped iscsid.service. Feb 9 10:04:31.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.506311 systemd[1]: Stopping iscsiuio.service... Feb 9 10:04:31.514855 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 10:04:31.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.522854 ignition[1374]: INFO : umount: umount passed Feb 9 10:04:31.522854 ignition[1374]: INFO : Ignition finished successfully Feb 9 10:04:31.515057 systemd[1]: Stopped iscsiuio.service. Feb 9 10:04:31.529257 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 10:04:31.531707 systemd[1]: Stopped ignition-mount.service. Feb 9 10:04:31.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.535606 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 10:04:31.535708 systemd[1]: Stopped ignition-disks.service. Feb 9 10:04:31.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.541531 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 10:04:31.541647 systemd[1]: Stopped ignition-kargs.service. Feb 9 10:04:31.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.547878 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 10:04:31.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.547967 systemd[1]: Stopped ignition-fetch.service. Feb 9 10:04:31.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.549942 systemd[1]: Stopped target network.target. Feb 9 10:04:31.551853 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 10:04:31.551937 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 10:04:31.554138 systemd[1]: Stopped target paths.target. Feb 9 10:04:31.555950 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 10:04:31.556836 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 10:04:31.565035 systemd[1]: Stopped target slices.target. Feb 9 10:04:31.566877 systemd[1]: Stopped target sockets.target. Feb 9 10:04:31.568867 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 10:04:31.568943 systemd[1]: Closed iscsid.socket. Feb 9 10:04:31.570667 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 10:04:31.570739 systemd[1]: Closed iscsiuio.socket. Feb 9 10:04:31.572464 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 10:04:31.572550 systemd[1]: Stopped ignition-setup.service. Feb 9 10:04:31.575375 systemd[1]: Stopping systemd-networkd.service... Feb 9 10:04:31.605385 systemd[1]: Stopping systemd-resolved.service... Feb 9 10:04:31.614407 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 10:04:31.614961 systemd[1]: Stopped systemd-resolved.service. Feb 9 10:04:31.617000 audit: BPF prog-id=6 op=UNLOAD Feb 9 10:04:31.615955 systemd-networkd[1181]: eth0: DHCPv6 lease lost Feb 9 10:04:31.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.622017 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 10:04:31.622673 systemd[1]: Stopped systemd-networkd.service. Feb 9 10:04:31.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.630911 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 10:04:31.630997 systemd[1]: Closed systemd-networkd.socket. Feb 9 10:04:31.634151 systemd[1]: Stopping network-cleanup.service... Feb 9 10:04:31.636695 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 10:04:31.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.646000 audit: BPF prog-id=9 op=UNLOAD Feb 9 10:04:31.636993 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 10:04:31.650253 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 10:04:31.650355 systemd[1]: Stopped systemd-sysctl.service. Feb 9 10:04:31.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.658400 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 10:04:31.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.658512 systemd[1]: Stopped systemd-modules-load.service. Feb 9 10:04:31.661915 systemd[1]: Stopping systemd-udevd.service... Feb 9 10:04:31.669621 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 10:04:31.670062 systemd[1]: Stopped systemd-udevd.service. Feb 9 10:04:31.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.677533 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 10:04:31.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:31.677619 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 10:04:31.680222 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 10:04:31.680302 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 10:04:31.683949 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 10:04:31.684056 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 10:04:31.686310 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 10:04:31.686402 systemd[1]: Stopped dracut-cmdline.service. Feb 9 10:04:31.688460 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 10:04:31.688538 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 10:04:31.692000 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 10:04:31.780315 systemd-journald[308]: Received SIGTERM from PID 1 (systemd). Feb 9 10:04:31.705165 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 10:04:31.705283 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 10:04:31.707807 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 10:04:31.707904 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 10:04:31.712338 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 10:04:31.712428 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 10:04:31.715300 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 10:04:31.715515 systemd[1]: Stopped sysroot-boot.service. Feb 9 10:04:31.717763 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 10:04:31.717974 systemd[1]: Stopped network-cleanup.service. Feb 9 10:04:31.720379 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 10:04:31.720558 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 10:04:31.723060 systemd[1]: Reached target initrd-switch-root.target. Feb 9 10:04:31.725260 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 10:04:31.725348 systemd[1]: Stopped initrd-setup-root.service. Feb 9 10:04:31.728626 systemd[1]: Starting initrd-switch-root.service... Feb 9 10:04:31.747178 systemd[1]: Switching root. Feb 9 10:04:31.802529 systemd-journald[308]: Journal stopped Feb 9 10:04:43.832533 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 10:04:43.832641 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 10:04:43.832676 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 10:04:43.832708 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 10:04:43.832737 kernel: SELinux: policy capability open_perms=1 Feb 9 10:04:43.836564 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 10:04:43.836630 kernel: SELinux: policy capability always_check_network=0 Feb 9 10:04:43.836662 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 10:04:43.836699 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 10:04:43.836730 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 10:04:43.836763 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 10:04:43.836833 systemd[1]: Successfully loaded SELinux policy in 177.010ms. Feb 9 10:04:43.836889 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 19.626ms. Feb 9 10:04:43.836941 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 10:04:43.836978 systemd[1]: Detected virtualization amazon. Feb 9 10:04:43.837010 systemd[1]: Detected architecture arm64. Feb 9 10:04:43.837042 systemd[1]: Detected first boot. Feb 9 10:04:43.837078 systemd[1]: Initializing machine ID from VM UUID. Feb 9 10:04:43.837109 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 10:04:43.837137 systemd[1]: Populated /etc with preset unit settings. Feb 9 10:04:43.837169 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:04:43.837205 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:04:43.837240 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:04:43.837282 kernel: kauditd_printk_skb: 49 callbacks suppressed Feb 9 10:04:43.837313 kernel: audit: type=1334 audit(1707473083.368:89): prog-id=12 op=LOAD Feb 9 10:04:43.837343 kernel: audit: type=1334 audit(1707473083.368:90): prog-id=3 op=UNLOAD Feb 9 10:04:43.837377 kernel: audit: type=1334 audit(1707473083.370:91): prog-id=13 op=LOAD Feb 9 10:04:43.837406 kernel: audit: type=1334 audit(1707473083.372:92): prog-id=14 op=LOAD Feb 9 10:04:43.837435 kernel: audit: type=1334 audit(1707473083.373:93): prog-id=4 op=UNLOAD Feb 9 10:04:43.837464 kernel: audit: type=1334 audit(1707473083.373:94): prog-id=5 op=UNLOAD Feb 9 10:04:43.837494 kernel: audit: type=1334 audit(1707473083.378:95): prog-id=15 op=LOAD Feb 9 10:04:43.837523 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 10:04:43.837558 kernel: audit: type=1334 audit(1707473083.378:96): prog-id=12 op=UNLOAD Feb 9 10:04:43.837591 systemd[1]: Stopped initrd-switch-root.service. Feb 9 10:04:43.837623 kernel: audit: type=1334 audit(1707473083.380:97): prog-id=16 op=LOAD Feb 9 10:04:43.837654 kernel: audit: type=1334 audit(1707473083.383:98): prog-id=17 op=LOAD Feb 9 10:04:43.837684 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 10:04:43.837714 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 10:04:43.837744 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 10:04:43.837789 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 10:04:43.837837 systemd[1]: Created slice system-getty.slice. Feb 9 10:04:43.837867 systemd[1]: Created slice system-modprobe.slice. Feb 9 10:04:43.837899 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 10:04:43.837932 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 10:04:43.837964 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 10:04:43.837993 systemd[1]: Created slice user.slice. Feb 9 10:04:43.838025 systemd[1]: Started systemd-ask-password-console.path. Feb 9 10:04:43.838060 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 10:04:43.838093 systemd[1]: Set up automount boot.automount. Feb 9 10:04:43.838122 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 10:04:43.838151 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 10:04:43.838182 systemd[1]: Stopped target initrd-fs.target. Feb 9 10:04:43.838214 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 10:04:43.838243 systemd[1]: Reached target integritysetup.target. Feb 9 10:04:43.838275 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 10:04:43.838309 systemd[1]: Reached target remote-fs.target. Feb 9 10:04:43.838338 systemd[1]: Reached target slices.target. Feb 9 10:04:43.838367 systemd[1]: Reached target swap.target. Feb 9 10:04:43.838400 systemd[1]: Reached target torcx.target. Feb 9 10:04:43.838433 systemd[1]: Reached target veritysetup.target. Feb 9 10:04:43.838462 systemd[1]: Listening on systemd-coredump.socket. Feb 9 10:04:43.838494 systemd[1]: Listening on systemd-initctl.socket. Feb 9 10:04:43.838525 systemd[1]: Listening on systemd-networkd.socket. Feb 9 10:04:43.838557 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 10:04:43.838586 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 10:04:43.838615 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 10:04:43.843380 systemd[1]: Mounting dev-hugepages.mount... Feb 9 10:04:43.843435 systemd[1]: Mounting dev-mqueue.mount... Feb 9 10:04:43.843467 systemd[1]: Mounting media.mount... Feb 9 10:04:43.843499 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 10:04:43.843529 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 10:04:43.843559 systemd[1]: Mounting tmp.mount... Feb 9 10:04:43.843590 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 10:04:43.843623 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 10:04:43.843690 systemd[1]: Starting kmod-static-nodes.service... Feb 9 10:04:43.843724 systemd[1]: Starting modprobe@configfs.service... Feb 9 10:04:43.843759 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 10:04:43.844197 systemd[1]: Starting modprobe@drm.service... Feb 9 10:04:43.844252 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 10:04:43.844285 systemd[1]: Starting modprobe@fuse.service... Feb 9 10:04:43.844326 systemd[1]: Starting modprobe@loop.service... Feb 9 10:04:43.844361 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 10:04:43.844392 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 10:04:43.844424 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 10:04:43.844454 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 10:04:43.844489 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 10:04:43.845907 systemd[1]: Stopped systemd-journald.service. Feb 9 10:04:43.845962 kernel: loop: module loaded Feb 9 10:04:43.845992 kernel: fuse: init (API version 7.34) Feb 9 10:04:43.846022 systemd[1]: Starting systemd-journald.service... Feb 9 10:04:43.846051 systemd[1]: Starting systemd-modules-load.service... Feb 9 10:04:43.846083 systemd[1]: Starting systemd-network-generator.service... Feb 9 10:04:43.846125 systemd[1]: Starting systemd-remount-fs.service... Feb 9 10:04:43.846155 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 10:04:43.846191 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 10:04:43.846221 systemd[1]: Stopped verity-setup.service. Feb 9 10:04:43.846255 systemd[1]: Mounted dev-hugepages.mount. Feb 9 10:04:43.846296 systemd[1]: Mounted dev-mqueue.mount. Feb 9 10:04:43.846330 systemd[1]: Mounted media.mount. Feb 9 10:04:43.846363 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 10:04:43.846396 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 10:04:43.846425 systemd[1]: Mounted tmp.mount. Feb 9 10:04:43.846455 systemd[1]: Finished kmod-static-nodes.service. Feb 9 10:04:43.846485 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 10:04:43.846517 systemd[1]: Finished modprobe@configfs.service. Feb 9 10:04:43.846547 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 10:04:43.846580 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 10:04:43.846613 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 10:04:43.846647 systemd[1]: Finished modprobe@drm.service. Feb 9 10:04:43.846697 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 10:04:43.846732 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 10:04:43.846762 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 10:04:43.846838 systemd[1]: Finished modprobe@fuse.service. Feb 9 10:04:43.846880 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 10:04:43.846910 systemd[1]: Finished modprobe@loop.service. Feb 9 10:04:43.846940 systemd[1]: Finished systemd-remount-fs.service. Feb 9 10:04:43.846974 systemd-journald[1482]: Journal started Feb 9 10:04:43.847075 systemd-journald[1482]: Runtime Journal (/run/log/journal/ec29b8fe525e43b929890a9d149b4cf4) is 8.0M, max 75.4M, 67.4M free. Feb 9 10:04:34.820000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 10:04:35.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 10:04:35.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 10:04:35.297000 audit: BPF prog-id=10 op=LOAD Feb 9 10:04:35.297000 audit: BPF prog-id=10 op=UNLOAD Feb 9 10:04:35.297000 audit: BPF prog-id=11 op=LOAD Feb 9 10:04:35.297000 audit: BPF prog-id=11 op=UNLOAD Feb 9 10:04:35.912000 audit[1408]: AVC avc: denied { associate } for pid=1408 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 10:04:35.912000 audit[1408]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458b2 a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1391 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:04:35.912000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:04:35.915000 audit[1408]: AVC avc: denied { associate } for pid=1408 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 10:04:35.915000 audit[1408]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145989 a2=1ed a3=0 items=2 ppid=1391 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:04:35.915000 audit: CWD cwd="/" Feb 9 10:04:35.915000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:04:35.915000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:04:35.915000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:04:43.368000 audit: BPF prog-id=12 op=LOAD Feb 9 10:04:43.368000 audit: BPF prog-id=3 op=UNLOAD Feb 9 10:04:43.370000 audit: BPF prog-id=13 op=LOAD Feb 9 10:04:43.372000 audit: BPF prog-id=14 op=LOAD Feb 9 10:04:43.373000 audit: BPF prog-id=4 op=UNLOAD Feb 9 10:04:43.373000 audit: BPF prog-id=5 op=UNLOAD Feb 9 10:04:43.378000 audit: BPF prog-id=15 op=LOAD Feb 9 10:04:43.378000 audit: BPF prog-id=12 op=UNLOAD Feb 9 10:04:43.380000 audit: BPF prog-id=16 op=LOAD Feb 9 10:04:43.383000 audit: BPF prog-id=17 op=LOAD Feb 9 10:04:43.383000 audit: BPF prog-id=13 op=UNLOAD Feb 9 10:04:43.383000 audit: BPF prog-id=14 op=UNLOAD Feb 9 10:04:43.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.401000 audit: BPF prog-id=15 op=UNLOAD Feb 9 10:04:43.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.674000 audit: BPF prog-id=18 op=LOAD Feb 9 10:04:43.677000 audit: BPF prog-id=19 op=LOAD Feb 9 10:04:43.677000 audit: BPF prog-id=20 op=LOAD Feb 9 10:04:43.677000 audit: BPF prog-id=16 op=UNLOAD Feb 9 10:04:43.677000 audit: BPF prog-id=17 op=UNLOAD Feb 9 10:04:43.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.850972 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 10:04:43.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.828000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 10:04:43.828000 audit[1482]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=fffff44dd710 a2=4000 a3=1 items=0 ppid=1 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:04:43.828000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 10:04:43.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.367587 systemd[1]: Queued start job for default target multi-user.target. Feb 9 10:04:35.909764 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:04:43.386202 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 10:04:35.911318 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:35Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 10:04:35.911366 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:35Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 10:04:35.911433 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:35Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 10:04:35.911459 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:35Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 10:04:43.868895 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 10:04:43.868985 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 10:04:35.911519 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:35Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 10:04:35.911550 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:35Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 10:04:35.911968 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:35Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 10:04:35.912044 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:35Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 10:04:35.912080 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:35Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 10:04:35.912926 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:35Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 10:04:35.913026 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:35Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 10:04:35.913072 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:35Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 10:04:35.913113 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:35Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 10:04:35.913158 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:35Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 10:04:35.913196 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:35Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 10:04:42.041675 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:42Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:04:42.042228 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:42Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:04:42.042472 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:42Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:04:42.042937 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:42Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:04:42.043051 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:42Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 10:04:42.043193 /usr/lib/systemd/system-generators/torcx-generator[1408]: time="2024-02-09T10:04:42Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 10:04:43.882365 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 10:04:43.890837 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 10:04:43.897567 systemd[1]: Starting systemd-random-seed.service... Feb 9 10:04:43.901810 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 10:04:43.909533 systemd[1]: Started systemd-journald.service. Feb 9 10:04:43.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.914199 systemd[1]: Finished systemd-network-generator.service. Feb 9 10:04:43.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.921237 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 10:04:43.925759 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 10:04:43.933924 systemd[1]: Finished systemd-modules-load.service. Feb 9 10:04:43.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.938627 systemd[1]: Reached target network-pre.target. Feb 9 10:04:43.944800 systemd[1]: Starting systemd-journal-flush.service... Feb 9 10:04:43.951207 systemd[1]: Starting systemd-sysctl.service... Feb 9 10:04:43.963867 systemd[1]: Finished systemd-random-seed.service. Feb 9 10:04:43.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:43.968354 systemd[1]: Reached target first-boot-complete.target. Feb 9 10:04:43.975859 systemd-journald[1482]: Time spent on flushing to /var/log/journal/ec29b8fe525e43b929890a9d149b4cf4 is 39.460ms for 1179 entries. Feb 9 10:04:43.975859 systemd-journald[1482]: System Journal (/var/log/journal/ec29b8fe525e43b929890a9d149b4cf4) is 8.0M, max 195.6M, 187.6M free. Feb 9 10:04:44.170157 systemd-journald[1482]: Received client request to flush runtime journal. Feb 9 10:04:44.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:44.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:44.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:44.004631 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 10:04:44.171940 udevadm[1523]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 10:04:44.011244 systemd[1]: Starting systemd-udev-settle.service... Feb 9 10:04:44.020705 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 10:04:44.027542 systemd[1]: Starting systemd-sysusers.service... Feb 9 10:04:44.084414 systemd[1]: Finished systemd-sysctl.service. Feb 9 10:04:44.172161 systemd[1]: Finished systemd-journal-flush.service. Feb 9 10:04:44.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:44.417399 systemd[1]: Finished systemd-sysusers.service. Feb 9 10:04:44.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:44.421765 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 10:04:44.679005 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 10:04:44.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:45.217546 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 10:04:45.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:45.219000 audit: BPF prog-id=21 op=LOAD Feb 9 10:04:45.220000 audit: BPF prog-id=22 op=LOAD Feb 9 10:04:45.220000 audit: BPF prog-id=7 op=UNLOAD Feb 9 10:04:45.220000 audit: BPF prog-id=8 op=UNLOAD Feb 9 10:04:45.222930 systemd[1]: Starting systemd-udevd.service... Feb 9 10:04:45.260404 systemd-udevd[1530]: Using default interface naming scheme 'v252'. Feb 9 10:04:45.292269 systemd[1]: Started systemd-udevd.service. Feb 9 10:04:45.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:45.294000 audit: BPF prog-id=23 op=LOAD Feb 9 10:04:45.297540 systemd[1]: Starting systemd-networkd.service... Feb 9 10:04:45.304000 audit: BPF prog-id=24 op=LOAD Feb 9 10:04:45.304000 audit: BPF prog-id=25 op=LOAD Feb 9 10:04:45.304000 audit: BPF prog-id=26 op=LOAD Feb 9 10:04:45.307328 systemd[1]: Starting systemd-userdbd.service... Feb 9 10:04:45.388234 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 10:04:45.396438 systemd[1]: Started systemd-userdbd.service. Feb 9 10:04:45.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:45.412346 (udev-worker)[1534]: Network interface NamePolicy= disabled on kernel command line. Feb 9 10:04:45.535709 systemd-networkd[1536]: lo: Link UP Feb 9 10:04:45.536230 systemd-networkd[1536]: lo: Gained carrier Feb 9 10:04:45.537293 systemd-networkd[1536]: Enumeration completed Feb 9 10:04:45.537588 systemd[1]: Started systemd-networkd.service. Feb 9 10:04:45.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:45.543559 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 10:04:45.544204 systemd-networkd[1536]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 10:04:45.551801 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:04:45.552835 systemd-networkd[1536]: eth0: Link UP Feb 9 10:04:45.553434 systemd-networkd[1536]: eth0: Gained carrier Feb 9 10:04:45.569051 systemd-networkd[1536]: eth0: DHCPv4 address 172.31.25.36/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 9 10:04:45.971823 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1550) Feb 9 10:04:46.080441 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 10:04:46.087528 systemd[1]: Finished systemd-udev-settle.service. Feb 9 10:04:46.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:46.092208 systemd[1]: Starting lvm2-activation-early.service... Feb 9 10:04:46.308989 lvm[1649]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 10:04:46.346202 systemd[1]: Finished lvm2-activation-early.service. Feb 9 10:04:46.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:46.348765 systemd[1]: Reached target cryptsetup.target. Feb 9 10:04:46.353153 systemd[1]: Starting lvm2-activation.service... Feb 9 10:04:46.362107 lvm[1650]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 10:04:46.398479 systemd[1]: Finished lvm2-activation.service. Feb 9 10:04:46.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:46.400989 systemd[1]: Reached target local-fs-pre.target. Feb 9 10:04:46.403144 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 10:04:46.403197 systemd[1]: Reached target local-fs.target. Feb 9 10:04:46.405157 systemd[1]: Reached target machines.target. Feb 9 10:04:46.409307 systemd[1]: Starting ldconfig.service... Feb 9 10:04:46.411556 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 10:04:46.411693 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:04:46.414080 systemd[1]: Starting systemd-boot-update.service... Feb 9 10:04:46.418502 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 10:04:46.423892 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 10:04:46.432222 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 10:04:46.432356 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 10:04:46.434798 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 10:04:46.437872 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1652 (bootctl) Feb 9 10:04:46.440430 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 10:04:46.469493 systemd-tmpfiles[1655]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 10:04:46.472349 systemd-tmpfiles[1655]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 10:04:46.476156 systemd-tmpfiles[1655]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 10:04:46.559331 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 10:04:46.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:46.625326 systemd-fsck[1661]: fsck.fat 4.2 (2021-01-31) Feb 9 10:04:46.625326 systemd-fsck[1661]: /dev/nvme0n1p1: 236 files, 113719/258078 clusters Feb 9 10:04:46.629141 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 10:04:46.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:46.636192 systemd[1]: Mounting boot.mount... Feb 9 10:04:46.694918 systemd[1]: Mounted boot.mount. Feb 9 10:04:46.714626 systemd[1]: Finished systemd-boot-update.service. Feb 9 10:04:46.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:47.066429 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 10:04:47.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:47.072263 systemd[1]: Starting audit-rules.service... Feb 9 10:04:47.076957 systemd[1]: Starting clean-ca-certificates.service... Feb 9 10:04:47.083367 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 10:04:47.087000 audit: BPF prog-id=27 op=LOAD Feb 9 10:04:47.090881 systemd[1]: Starting systemd-resolved.service... Feb 9 10:04:47.094000 audit: BPF prog-id=28 op=LOAD Feb 9 10:04:47.097692 systemd[1]: Starting systemd-timesyncd.service... Feb 9 10:04:47.103259 systemd[1]: Starting systemd-update-utmp.service... Feb 9 10:04:47.117000 audit[1681]: SYSTEM_BOOT pid=1681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 10:04:47.123408 systemd[1]: Finished systemd-update-utmp.service. Feb 9 10:04:47.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:47.145893 systemd[1]: Finished clean-ca-certificates.service. Feb 9 10:04:47.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:47.150118 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 10:04:47.225479 systemd[1]: Started systemd-timesyncd.service. Feb 9 10:04:47.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:47.228114 systemd[1]: Reached target time-set.target. Feb 9 10:04:47.257175 systemd-resolved[1679]: Positive Trust Anchors: Feb 9 10:04:47.257754 systemd-resolved[1679]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 10:04:47.257962 systemd-resolved[1679]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 10:04:47.275367 systemd-networkd[1536]: eth0: Gained IPv6LL Feb 9 10:04:47.278421 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 10:04:47.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:47.323303 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 10:04:47.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:47.333000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 10:04:47.333000 audit[1696]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff9d461b0 a2=420 a3=0 items=0 ppid=1675 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:04:47.333000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 10:04:47.336103 augenrules[1696]: No rules Feb 9 10:04:47.337526 systemd[1]: Finished audit-rules.service. Feb 9 10:04:47.355292 systemd-resolved[1679]: Defaulting to hostname 'linux'. Feb 9 10:04:47.358236 systemd[1]: Started systemd-resolved.service. Feb 9 10:04:47.361266 systemd[1]: Reached target network.target. Feb 9 10:04:47.363513 systemd[1]: Reached target network-online.target. Feb 9 10:04:47.366564 systemd[1]: Reached target nss-lookup.target. Feb 9 10:04:47.512642 systemd-timesyncd[1680]: Contacted time server 45.63.54.13:123 (0.flatcar.pool.ntp.org). Feb 9 10:04:47.512878 systemd-timesyncd[1680]: Initial clock synchronization to Fri 2024-02-09 10:04:47.707915 UTC. Feb 9 10:04:51.312228 ldconfig[1651]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 10:04:51.535115 systemd[1]: Finished ldconfig.service. Feb 9 10:04:51.540349 systemd[1]: Starting systemd-update-done.service... Feb 9 10:04:51.710577 systemd[1]: Finished systemd-update-done.service. Feb 9 10:04:51.713171 systemd[1]: Reached target sysinit.target. Feb 9 10:04:51.715408 systemd[1]: Started motdgen.path. Feb 9 10:04:51.717190 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 10:04:51.720220 systemd[1]: Started logrotate.timer. Feb 9 10:04:51.722175 systemd[1]: Started mdadm.timer. Feb 9 10:04:51.723895 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 10:04:51.725956 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 10:04:51.726000 systemd[1]: Reached target paths.target. Feb 9 10:04:51.727884 systemd[1]: Reached target timers.target. Feb 9 10:04:51.741012 systemd[1]: Listening on dbus.socket. Feb 9 10:04:51.744622 systemd[1]: Starting docker.socket... Feb 9 10:04:51.751108 systemd[1]: Listening on sshd.socket. Feb 9 10:04:51.753564 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:04:51.754580 systemd[1]: Listening on docker.socket. Feb 9 10:04:51.757002 systemd[1]: Reached target sockets.target. Feb 9 10:04:51.759148 systemd[1]: Reached target basic.target. Feb 9 10:04:51.761171 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 10:04:51.761386 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 10:04:51.772723 systemd[1]: Started amazon-ssm-agent.service. Feb 9 10:04:51.778683 systemd[1]: Starting containerd.service... Feb 9 10:04:51.783323 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 10:04:51.788011 systemd[1]: Starting dbus.service... Feb 9 10:04:51.794531 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 10:04:51.804905 systemd[1]: Starting extend-filesystems.service... Feb 9 10:04:51.814025 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 10:04:51.816556 systemd[1]: Starting motdgen.service... Feb 9 10:04:51.821710 systemd[1]: Started nvidia.service. Feb 9 10:04:51.826076 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 10:04:51.833518 systemd[1]: Starting prepare-critools.service... Feb 9 10:04:51.838158 systemd[1]: Starting prepare-helm.service... Feb 9 10:04:51.842601 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 10:04:51.848191 systemd[1]: Starting sshd-keygen.service... Feb 9 10:04:51.859374 systemd[1]: Starting systemd-logind.service... Feb 9 10:04:51.862338 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:04:51.862520 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 10:04:51.863729 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 10:04:51.873953 systemd[1]: Starting update-engine.service... Feb 9 10:04:51.881079 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 10:04:51.956424 tar[1730]: ./ Feb 9 10:04:51.956424 tar[1730]: ./macvlan Feb 9 10:04:51.963713 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 10:04:51.965184 tar[1735]: crictl Feb 9 10:04:51.965070 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 10:04:51.977861 jq[1714]: false Feb 9 10:04:51.982666 jq[1728]: true Feb 9 10:04:52.010897 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 10:04:52.011248 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 10:04:52.021465 tar[1744]: linux-arm64/helm Feb 9 10:04:52.023066 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 10:04:52.025131 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 10:04:52.047261 extend-filesystems[1715]: Found nvme0n1 Feb 9 10:04:52.051041 extend-filesystems[1715]: Found nvme0n1p1 Feb 9 10:04:52.051041 extend-filesystems[1715]: Found nvme0n1p2 Feb 9 10:04:52.051041 extend-filesystems[1715]: Found nvme0n1p3 Feb 9 10:04:52.051041 extend-filesystems[1715]: Found usr Feb 9 10:04:52.051041 extend-filesystems[1715]: Found nvme0n1p4 Feb 9 10:04:52.081438 extend-filesystems[1715]: Found nvme0n1p6 Feb 9 10:04:52.081438 extend-filesystems[1715]: Found nvme0n1p7 Feb 9 10:04:52.081438 extend-filesystems[1715]: Found nvme0n1p9 Feb 9 10:04:52.081438 extend-filesystems[1715]: Checking size of /dev/nvme0n1p9 Feb 9 10:04:52.096252 jq[1748]: true Feb 9 10:04:52.125015 dbus-daemon[1713]: [system] SELinux support is enabled Feb 9 10:04:52.125290 systemd[1]: Started dbus.service. Feb 9 10:04:52.132135 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 10:04:52.132196 systemd[1]: Reached target system-config.target. Feb 9 10:04:52.148492 dbus-daemon[1713]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1536 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 9 10:04:52.139992 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 10:04:52.140033 systemd[1]: Reached target user-config.target. Feb 9 10:04:52.154255 systemd[1]: Starting systemd-hostnamed.service... Feb 9 10:04:52.163045 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 10:04:52.163426 systemd[1]: Finished motdgen.service. Feb 9 10:04:52.226531 extend-filesystems[1715]: Resized partition /dev/nvme0n1p9 Feb 9 10:04:52.269198 extend-filesystems[1776]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 10:04:52.288854 bash[1777]: Updated "/home/core/.ssh/authorized_keys" Feb 9 10:04:52.293531 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 10:04:52.299820 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Feb 9 10:04:52.343700 amazon-ssm-agent[1710]: 2024/02/09 10:04:52 Failed to load instance info from vault. RegistrationKey does not exist. Feb 9 10:04:52.354217 amazon-ssm-agent[1710]: Initializing new seelog logger Feb 9 10:04:52.366834 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Feb 9 10:04:52.473431 dbus-daemon[1713]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 9 10:04:52.581046 update_engine[1727]: I0209 10:04:52.396668 1727 main.cc:92] Flatcar Update Engine starting Feb 9 10:04:52.444357 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 10:04:52.581758 amazon-ssm-agent[1710]: New Seelog Logger Creation Complete Feb 9 10:04:52.581758 amazon-ssm-agent[1710]: 2024/02/09 10:04:52 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Feb 9 10:04:52.581758 amazon-ssm-agent[1710]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Feb 9 10:04:52.478537 dbus-daemon[1713]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.4' (uid=0 pid=1761 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 9 10:04:52.473687 systemd[1]: Started systemd-hostnamed.service. Feb 9 10:04:52.514955 polkitd[1809]: Started polkitd version 121 Feb 9 10:04:52.482192 systemd[1]: Starting polkit.service... Feb 9 10:04:52.578822 systemd-logind[1723]: Watching system buttons on /dev/input/event0 (Power Button) Feb 9 10:04:52.592891 update_engine[1727]: I0209 10:04:52.588099 1727 update_check_scheduler.cc:74] Next update check in 6m25s Feb 9 10:04:52.592966 extend-filesystems[1776]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Feb 9 10:04:52.592966 extend-filesystems[1776]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 9 10:04:52.592966 extend-filesystems[1776]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Feb 9 10:04:52.609299 amazon-ssm-agent[1710]: 2024/02/09 10:04:52 processing appconfig overrides Feb 9 10:04:52.579609 systemd-logind[1723]: New seat seat0. Feb 9 10:04:52.609485 extend-filesystems[1715]: Resized filesystem in /dev/nvme0n1p9 Feb 9 10:04:52.587728 systemd[1]: Started update-engine.service. Feb 9 10:04:52.624195 env[1736]: time="2024-02-09T10:04:52.616994385Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 10:04:52.622322 systemd[1]: Started locksmithd.service. Feb 9 10:04:52.627427 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 10:04:52.628401 systemd[1]: Finished extend-filesystems.service. Feb 9 10:04:52.634489 systemd[1]: Started systemd-logind.service. Feb 9 10:04:52.646836 polkitd[1809]: Loading rules from directory /etc/polkit-1/rules.d Feb 9 10:04:52.647135 polkitd[1809]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 9 10:04:52.654047 polkitd[1809]: Finished loading, compiling and executing 2 rules Feb 9 10:04:52.654993 dbus-daemon[1713]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 9 10:04:52.655289 systemd[1]: Started polkit.service. Feb 9 10:04:52.656088 polkitd[1809]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 9 10:04:52.706965 systemd-resolved[1679]: System hostname changed to 'ip-172-31-25-36'. Feb 9 10:04:52.706966 systemd-hostnamed[1761]: Hostname set to (transient) Feb 9 10:04:52.735961 tar[1730]: ./static Feb 9 10:04:52.830244 env[1736]: time="2024-02-09T10:04:52.830167062Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 10:04:52.830496 env[1736]: time="2024-02-09T10:04:52.830448317Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:04:52.850148 env[1736]: time="2024-02-09T10:04:52.849990406Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:04:52.850148 env[1736]: time="2024-02-09T10:04:52.850083947Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:04:52.850489 env[1736]: time="2024-02-09T10:04:52.850432122Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:04:52.850574 env[1736]: time="2024-02-09T10:04:52.850482721Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 10:04:52.850574 env[1736]: time="2024-02-09T10:04:52.850519066Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 10:04:52.850574 env[1736]: time="2024-02-09T10:04:52.850545406Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 10:04:52.850756 env[1736]: time="2024-02-09T10:04:52.850714205Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:04:52.851267 env[1736]: time="2024-02-09T10:04:52.851217011Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:04:52.851543 env[1736]: time="2024-02-09T10:04:52.851491535Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:04:52.851624 env[1736]: time="2024-02-09T10:04:52.851538993Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 10:04:52.851707 env[1736]: time="2024-02-09T10:04:52.851666019Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 10:04:52.851811 env[1736]: time="2024-02-09T10:04:52.851701037Z" level=info msg="metadata content store policy set" policy=shared Feb 9 10:04:52.864570 env[1736]: time="2024-02-09T10:04:52.864479769Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 10:04:52.864727 env[1736]: time="2024-02-09T10:04:52.864578020Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 10:04:52.864727 env[1736]: time="2024-02-09T10:04:52.864638806Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 10:04:52.864877 env[1736]: time="2024-02-09T10:04:52.864827457Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 10:04:52.864958 env[1736]: time="2024-02-09T10:04:52.864889692Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 10:04:52.864958 env[1736]: time="2024-02-09T10:04:52.864927108Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 10:04:52.865062 env[1736]: time="2024-02-09T10:04:52.864965778Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 10:04:52.865532 env[1736]: time="2024-02-09T10:04:52.865467063Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 10:04:52.865642 env[1736]: time="2024-02-09T10:04:52.865536905Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 10:04:52.865642 env[1736]: time="2024-02-09T10:04:52.865574894Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 10:04:52.865642 env[1736]: time="2024-02-09T10:04:52.865606407Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 10:04:52.865848 env[1736]: time="2024-02-09T10:04:52.865637737Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 10:04:52.865968 env[1736]: time="2024-02-09T10:04:52.865918773Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 10:04:52.866165 env[1736]: time="2024-02-09T10:04:52.866121872Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 10:04:52.866593 env[1736]: time="2024-02-09T10:04:52.866546548Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 10:04:52.866675 env[1736]: time="2024-02-09T10:04:52.866612884Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 10:04:52.866675 env[1736]: time="2024-02-09T10:04:52.866650434Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 10:04:52.866813 env[1736]: time="2024-02-09T10:04:52.866750974Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 10:04:52.866876 env[1736]: time="2024-02-09T10:04:52.866802887Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 10:04:52.866876 env[1736]: time="2024-02-09T10:04:52.866838721Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 10:04:52.866985 env[1736]: time="2024-02-09T10:04:52.866869880Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 10:04:52.866985 env[1736]: time="2024-02-09T10:04:52.866908843Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 10:04:52.866985 env[1736]: time="2024-02-09T10:04:52.866943411Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 10:04:52.866985 env[1736]: time="2024-02-09T10:04:52.866974205Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 10:04:52.867193 env[1736]: time="2024-02-09T10:04:52.867003832Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 10:04:52.867193 env[1736]: time="2024-02-09T10:04:52.867037462Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 10:04:52.867369 env[1736]: time="2024-02-09T10:04:52.867319606Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 10:04:52.867453 env[1736]: time="2024-02-09T10:04:52.867371105Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 10:04:52.867513 env[1736]: time="2024-02-09T10:04:52.867454713Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 10:04:52.867569 env[1736]: time="2024-02-09T10:04:52.867484899Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 10:04:52.867569 env[1736]: time="2024-02-09T10:04:52.867549727Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 10:04:52.867677 env[1736]: time="2024-02-09T10:04:52.867605145Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 10:04:52.867677 env[1736]: time="2024-02-09T10:04:52.867644034Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 10:04:52.867803 env[1736]: time="2024-02-09T10:04:52.867733375Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 10:04:52.868641 env[1736]: time="2024-02-09T10:04:52.868502015Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 10:04:52.870113 env[1736]: time="2024-02-09T10:04:52.868638449Z" level=info msg="Connect containerd service" Feb 9 10:04:52.870113 env[1736]: time="2024-02-09T10:04:52.868721388Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 10:04:52.870592 env[1736]: time="2024-02-09T10:04:52.870526144Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 10:04:52.870773 env[1736]: time="2024-02-09T10:04:52.870718581Z" level=info msg="Start subscribing containerd event" Feb 9 10:04:52.870878 env[1736]: time="2024-02-09T10:04:52.870816004Z" level=info msg="Start recovering state" Feb 9 10:04:52.870945 env[1736]: time="2024-02-09T10:04:52.870929762Z" level=info msg="Start event monitor" Feb 9 10:04:52.871008 env[1736]: time="2024-02-09T10:04:52.870967532Z" level=info msg="Start snapshots syncer" Feb 9 10:04:52.871008 env[1736]: time="2024-02-09T10:04:52.870991583Z" level=info msg="Start cni network conf syncer for default" Feb 9 10:04:52.871127 env[1736]: time="2024-02-09T10:04:52.871011874Z" level=info msg="Start streaming server" Feb 9 10:04:52.871722 env[1736]: time="2024-02-09T10:04:52.871670309Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 10:04:52.871942 env[1736]: time="2024-02-09T10:04:52.871881174Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 10:04:52.907012 tar[1730]: ./vlan Feb 9 10:04:52.926316 systemd[1]: Started containerd.service. Feb 9 10:04:52.938535 env[1736]: time="2024-02-09T10:04:52.938291495Z" level=info msg="containerd successfully booted in 0.560062s" Feb 9 10:04:53.012750 coreos-metadata[1712]: Feb 09 10:04:53.012 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Feb 9 10:04:53.014418 coreos-metadata[1712]: Feb 09 10:04:53.014 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Feb 9 10:04:53.015504 coreos-metadata[1712]: Feb 09 10:04:53.015 INFO Fetch successful Feb 9 10:04:53.015504 coreos-metadata[1712]: Feb 09 10:04:53.015 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 9 10:04:53.016433 coreos-metadata[1712]: Feb 09 10:04:53.016 INFO Fetch successful Feb 9 10:04:53.026902 unknown[1712]: wrote ssh authorized keys file for user: core Feb 9 10:04:53.073513 update-ssh-keys[1895]: Updated "/home/core/.ssh/authorized_keys" Feb 9 10:04:53.075154 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 10:04:53.211679 tar[1730]: ./portmap Feb 9 10:04:53.375201 tar[1730]: ./host-local Feb 9 10:04:53.451579 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO Create new startup processor Feb 9 10:04:53.452153 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [LongRunningPluginsManager] registered plugins: {} Feb 9 10:04:53.452153 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO Initializing bookkeeping folders Feb 9 10:04:53.452153 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO removing the completed state files Feb 9 10:04:53.452153 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO Initializing bookkeeping folders for long running plugins Feb 9 10:04:53.452375 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Feb 9 10:04:53.452375 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO Initializing healthcheck folders for long running plugins Feb 9 10:04:53.452375 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO Initializing locations for inventory plugin Feb 9 10:04:53.452375 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO Initializing default location for custom inventory Feb 9 10:04:53.452375 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO Initializing default location for file inventory Feb 9 10:04:53.452375 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO Initializing default location for role inventory Feb 9 10:04:53.452676 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO Init the cloudwatchlogs publisher Feb 9 10:04:53.452676 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [instanceID=i-0f18d27bab02c0c9b] Successfully loaded platform independent plugin aws:softwareInventory Feb 9 10:04:53.452676 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [instanceID=i-0f18d27bab02c0c9b] Successfully loaded platform independent plugin aws:updateSsmAgent Feb 9 10:04:53.452676 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [instanceID=i-0f18d27bab02c0c9b] Successfully loaded platform independent plugin aws:configurePackage Feb 9 10:04:53.452676 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [instanceID=i-0f18d27bab02c0c9b] Successfully loaded platform independent plugin aws:downloadContent Feb 9 10:04:53.452676 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [instanceID=i-0f18d27bab02c0c9b] Successfully loaded platform independent plugin aws:runDocument Feb 9 10:04:53.452676 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [instanceID=i-0f18d27bab02c0c9b] Successfully loaded platform independent plugin aws:runPowerShellScript Feb 9 10:04:53.452676 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [instanceID=i-0f18d27bab02c0c9b] Successfully loaded platform independent plugin aws:configureDocker Feb 9 10:04:53.452676 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [instanceID=i-0f18d27bab02c0c9b] Successfully loaded platform independent plugin aws:runDockerAction Feb 9 10:04:53.453141 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [instanceID=i-0f18d27bab02c0c9b] Successfully loaded platform independent plugin aws:refreshAssociation Feb 9 10:04:53.453141 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [instanceID=i-0f18d27bab02c0c9b] Successfully loaded platform dependent plugin aws:runShellScript Feb 9 10:04:53.453141 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Feb 9 10:04:53.453141 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO OS: linux, Arch: arm64 Feb 9 10:04:53.454158 amazon-ssm-agent[1710]: datastore file /var/lib/amazon/ssm/i-0f18d27bab02c0c9b/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Feb 9 10:04:53.459676 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [MessagingDeliveryService] Starting document processing engine... Feb 9 10:04:53.484743 tar[1730]: ./vrf Feb 9 10:04:53.569323 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [MessagingDeliveryService] [EngineProcessor] Starting Feb 9 10:04:53.607720 tar[1730]: ./bridge Feb 9 10:04:53.664101 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Feb 9 10:04:53.725828 tar[1730]: ./tuning Feb 9 10:04:53.758719 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [MessagingDeliveryService] Starting message polling Feb 9 10:04:53.850275 tar[1730]: ./firewall Feb 9 10:04:53.853370 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [MessagingDeliveryService] Starting send replies to MDS Feb 9 10:04:53.948427 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [instanceID=i-0f18d27bab02c0c9b] Starting association polling Feb 9 10:04:53.982186 tar[1730]: ./host-device Feb 9 10:04:54.043475 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Feb 9 10:04:54.092975 tar[1730]: ./sbr Feb 9 10:04:54.138718 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [MessagingDeliveryService] [Association] Launching response handler Feb 9 10:04:54.190566 tar[1730]: ./loopback Feb 9 10:04:54.234228 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Feb 9 10:04:54.285320 tar[1730]: ./dhcp Feb 9 10:04:54.330002 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Feb 9 10:04:54.379657 tar[1744]: linux-arm64/LICENSE Feb 9 10:04:54.380380 tar[1744]: linux-arm64/README.md Feb 9 10:04:54.393722 systemd[1]: Finished prepare-helm.service. Feb 9 10:04:54.426280 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Feb 9 10:04:54.432561 systemd[1]: Finished prepare-critools.service. Feb 9 10:04:54.506816 tar[1730]: ./ptp Feb 9 10:04:54.522364 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [OfflineService] Starting document processing engine... Feb 9 10:04:54.569558 tar[1730]: ./ipvlan Feb 9 10:04:54.618713 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [OfflineService] [EngineProcessor] Starting Feb 9 10:04:54.631578 tar[1730]: ./bandwidth Feb 9 10:04:54.709470 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 10:04:54.715174 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [OfflineService] [EngineProcessor] Initial processing Feb 9 10:04:54.811895 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [OfflineService] Starting message polling Feb 9 10:04:54.908835 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [OfflineService] Starting send replies to MDS Feb 9 10:04:55.005843 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [LongRunningPluginsManager] starting long running plugin manager Feb 9 10:04:55.031049 locksmithd[1855]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 10:04:55.103293 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Feb 9 10:04:55.200939 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [HealthCheck] HealthCheck reporting agent health. Feb 9 10:04:55.298505 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [MessageGatewayService] Starting session document processing engine... Feb 9 10:04:55.396597 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [MessageGatewayService] [EngineProcessor] Starting Feb 9 10:04:55.494783 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Feb 9 10:04:55.593191 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0f18d27bab02c0c9b, requestId: 38143185-35ed-48cb-8a33-57e7a18f8780 Feb 9 10:04:55.692026 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Feb 9 10:04:55.790736 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [MessageGatewayService] listening reply. Feb 9 10:04:55.889617 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [StartupProcessor] Executing startup processor tasks Feb 9 10:04:55.989182 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Feb 9 10:04:56.088561 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Feb 9 10:04:56.188041 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.2 Feb 9 10:04:56.223236 sshd_keygen[1754]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 10:04:56.258892 systemd[1]: Finished sshd-keygen.service. Feb 9 10:04:56.263804 systemd[1]: Starting issuegen.service... Feb 9 10:04:56.273294 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 10:04:56.273650 systemd[1]: Finished issuegen.service. Feb 9 10:04:56.278671 systemd[1]: Starting systemd-user-sessions.service... Feb 9 10:04:56.287728 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0f18d27bab02c0c9b?role=subscribe&stream=input Feb 9 10:04:56.294977 systemd[1]: Finished systemd-user-sessions.service. Feb 9 10:04:56.299083 systemd[1]: Created slice system-sshd.slice. Feb 9 10:04:56.304040 systemd[1]: Started getty@tty1.service. Feb 9 10:04:56.308998 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 10:04:56.311612 systemd[1]: Reached target getty.target. Feb 9 10:04:56.313740 systemd[1]: Reached target multi-user.target. Feb 9 10:04:56.330330 systemd[1]: Started sshd@0-172.31.25.36:22-139.178.89.65:41542.service. Feb 9 10:04:56.336747 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 10:04:56.354683 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 10:04:56.355054 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 10:04:56.358038 systemd[1]: Startup finished in 1.136s (kernel) + 16.831s (initrd) + 21.929s (userspace) = 39.898s. Feb 9 10:04:56.387563 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0f18d27bab02c0c9b?role=subscribe&stream=input Feb 9 10:04:56.487648 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [MessageGatewayService] Starting receiving message from control channel Feb 9 10:04:56.588002 amazon-ssm-agent[1710]: 2024-02-09 10:04:53 INFO [MessageGatewayService] [EngineProcessor] Initial processing Feb 9 10:04:56.791674 sshd[1941]: Accepted publickey for core from 139.178.89.65 port 41542 ssh2: RSA SHA256:UO2w0p1VaRQESu4O+suVoF1J839EJd5GhshUczsPwPM Feb 9 10:04:56.796084 sshd[1941]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:04:56.814165 systemd[1]: Created slice user-500.slice. Feb 9 10:04:56.816766 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 10:04:56.820841 systemd-logind[1723]: New session 1 of user core. Feb 9 10:04:56.852666 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 10:04:56.855705 systemd[1]: Starting user@500.service... Feb 9 10:04:56.862215 (systemd)[1945]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:04:57.038890 systemd[1945]: Queued start job for default target default.target. Feb 9 10:04:57.039931 systemd[1945]: Reached target paths.target. Feb 9 10:04:57.039983 systemd[1945]: Reached target sockets.target. Feb 9 10:04:57.040016 systemd[1945]: Reached target timers.target. Feb 9 10:04:57.040047 systemd[1945]: Reached target basic.target. Feb 9 10:04:57.040202 systemd[1]: Started user@500.service. Feb 9 10:04:57.042039 systemd[1]: Started session-1.scope. Feb 9 10:04:57.043484 systemd[1945]: Reached target default.target. Feb 9 10:04:57.043860 systemd[1945]: Startup finished in 170ms. Feb 9 10:04:57.189492 systemd[1]: Started sshd@1-172.31.25.36:22-139.178.89.65:41552.service. Feb 9 10:04:57.383043 sshd[1954]: Accepted publickey for core from 139.178.89.65 port 41552 ssh2: RSA SHA256:UO2w0p1VaRQESu4O+suVoF1J839EJd5GhshUczsPwPM Feb 9 10:04:57.385326 sshd[1954]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:04:57.394871 systemd-logind[1723]: New session 2 of user core. Feb 9 10:04:57.395952 systemd[1]: Started session-2.scope. Feb 9 10:04:57.535757 sshd[1954]: pam_unix(sshd:session): session closed for user core Feb 9 10:04:57.541205 systemd-logind[1723]: Session 2 logged out. Waiting for processes to exit. Feb 9 10:04:57.542655 systemd[1]: sshd@1-172.31.25.36:22-139.178.89.65:41552.service: Deactivated successfully. Feb 9 10:04:57.543947 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 10:04:57.545372 systemd-logind[1723]: Removed session 2. Feb 9 10:04:57.564988 systemd[1]: Started sshd@2-172.31.25.36:22-139.178.89.65:41564.service. Feb 9 10:04:57.739915 sshd[1960]: Accepted publickey for core from 139.178.89.65 port 41564 ssh2: RSA SHA256:UO2w0p1VaRQESu4O+suVoF1J839EJd5GhshUczsPwPM Feb 9 10:04:57.742328 sshd[1960]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:04:57.750948 systemd[1]: Started session-3.scope. Feb 9 10:04:57.751734 systemd-logind[1723]: New session 3 of user core. Feb 9 10:04:57.875966 sshd[1960]: pam_unix(sshd:session): session closed for user core Feb 9 10:04:57.882770 systemd-logind[1723]: Session 3 logged out. Waiting for processes to exit. Feb 9 10:04:57.884533 systemd[1]: sshd@2-172.31.25.36:22-139.178.89.65:41564.service: Deactivated successfully. Feb 9 10:04:57.885772 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 10:04:57.887239 systemd-logind[1723]: Removed session 3. Feb 9 10:04:57.902295 systemd[1]: Started sshd@3-172.31.25.36:22-139.178.89.65:41576.service. Feb 9 10:04:58.104186 sshd[1966]: Accepted publickey for core from 139.178.89.65 port 41576 ssh2: RSA SHA256:UO2w0p1VaRQESu4O+suVoF1J839EJd5GhshUczsPwPM Feb 9 10:04:58.104338 sshd[1966]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:04:58.112556 systemd[1]: Started session-4.scope. Feb 9 10:04:58.114742 systemd-logind[1723]: New session 4 of user core. Feb 9 10:04:58.245892 sshd[1966]: pam_unix(sshd:session): session closed for user core Feb 9 10:04:58.253061 systemd-logind[1723]: Session 4 logged out. Waiting for processes to exit. Feb 9 10:04:58.254477 systemd[1]: sshd@3-172.31.25.36:22-139.178.89.65:41576.service: Deactivated successfully. Feb 9 10:04:58.255681 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 10:04:58.257008 systemd-logind[1723]: Removed session 4. Feb 9 10:04:58.275512 systemd[1]: Started sshd@4-172.31.25.36:22-139.178.89.65:40772.service. Feb 9 10:04:58.451393 sshd[1972]: Accepted publickey for core from 139.178.89.65 port 40772 ssh2: RSA SHA256:UO2w0p1VaRQESu4O+suVoF1J839EJd5GhshUczsPwPM Feb 9 10:04:58.453249 sshd[1972]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:04:58.462237 systemd[1]: Started session-5.scope. Feb 9 10:04:58.463007 systemd-logind[1723]: New session 5 of user core. Feb 9 10:04:58.588569 sudo[1975]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 10:04:58.589124 sudo[1975]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:04:58.601063 dbus-daemon[1713]: avc: received setenforce notice (enforcing=1) Feb 9 10:04:58.603918 sudo[1975]: pam_unix(sudo:session): session closed for user root Feb 9 10:04:58.628751 sshd[1972]: pam_unix(sshd:session): session closed for user core Feb 9 10:04:58.634306 systemd-logind[1723]: Session 5 logged out. Waiting for processes to exit. Feb 9 10:04:58.634350 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 10:04:58.635597 systemd[1]: sshd@4-172.31.25.36:22-139.178.89.65:40772.service: Deactivated successfully. Feb 9 10:04:58.637645 systemd-logind[1723]: Removed session 5. Feb 9 10:04:58.657507 systemd[1]: Started sshd@5-172.31.25.36:22-139.178.89.65:40788.service. Feb 9 10:04:58.837348 sshd[1979]: Accepted publickey for core from 139.178.89.65 port 40788 ssh2: RSA SHA256:UO2w0p1VaRQESu4O+suVoF1J839EJd5GhshUczsPwPM Feb 9 10:04:58.840364 sshd[1979]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:04:58.849035 systemd-logind[1723]: New session 6 of user core. Feb 9 10:04:58.850070 systemd[1]: Started session-6.scope. Feb 9 10:04:58.959919 sudo[1983]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 10:04:58.960458 sudo[1983]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:04:58.965489 sudo[1983]: pam_unix(sudo:session): session closed for user root Feb 9 10:04:58.974550 sudo[1982]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 10:04:58.975556 sudo[1982]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:04:58.993947 systemd[1]: Stopping audit-rules.service... Feb 9 10:04:58.993000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 10:04:58.996169 auditctl[1986]: No rules Feb 9 10:04:58.997177 kernel: kauditd_printk_skb: 73 callbacks suppressed Feb 9 10:04:58.997252 kernel: audit: type=1305 audit(1707473098.993:168): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 10:04:58.997874 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 10:04:58.998224 systemd[1]: Stopped audit-rules.service. Feb 9 10:04:58.993000 audit[1986]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffcf95d30 a2=420 a3=0 items=0 ppid=1 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:04:59.005961 systemd[1]: Starting audit-rules.service... Feb 9 10:04:59.013466 kernel: audit: type=1300 audit(1707473098.993:168): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffcf95d30 a2=420 a3=0 items=0 ppid=1 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:04:58.993000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 10:04:59.017472 kernel: audit: type=1327 audit(1707473098.993:168): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 10:04:59.017577 kernel: audit: type=1131 audit(1707473098.996:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:58.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:59.045151 augenrules[2003]: No rules Feb 9 10:04:59.046749 systemd[1]: Finished audit-rules.service. Feb 9 10:04:59.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:59.056064 sudo[1982]: pam_unix(sudo:session): session closed for user root Feb 9 10:04:59.055000 audit[1982]: USER_END pid=1982 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:04:59.066246 kernel: audit: type=1130 audit(1707473099.046:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:59.066330 kernel: audit: type=1106 audit(1707473099.055:171): pid=1982 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:04:59.066373 kernel: audit: type=1104 audit(1707473099.055:172): pid=1982 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:04:59.055000 audit[1982]: CRED_DISP pid=1982 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:04:59.080238 sshd[1979]: pam_unix(sshd:session): session closed for user core Feb 9 10:04:59.081000 audit[1979]: USER_END pid=1979 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 10:04:59.081000 audit[1979]: CRED_DISP pid=1979 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 10:04:59.094850 systemd[1]: sshd@5-172.31.25.36:22-139.178.89.65:40788.service: Deactivated successfully. Feb 9 10:04:59.096104 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 10:04:59.103382 kernel: audit: type=1106 audit(1707473099.081:173): pid=1979 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 10:04:59.103506 kernel: audit: type=1104 audit(1707473099.081:174): pid=1979 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 10:04:59.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.25.36:22-139.178.89.65:40788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:59.115190 kernel: audit: type=1131 audit(1707473099.093:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.25.36:22-139.178.89.65:40788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:59.111789 systemd[1]: Started sshd@6-172.31.25.36:22-139.178.89.65:40790.service. Feb 9 10:04:59.113883 systemd-logind[1723]: Session 6 logged out. Waiting for processes to exit. Feb 9 10:04:59.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.25.36:22-139.178.89.65:40790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:04:59.117644 systemd-logind[1723]: Removed session 6. Feb 9 10:04:59.289000 audit[2009]: USER_ACCT pid=2009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 10:04:59.290364 sshd[2009]: Accepted publickey for core from 139.178.89.65 port 40790 ssh2: RSA SHA256:UO2w0p1VaRQESu4O+suVoF1J839EJd5GhshUczsPwPM Feb 9 10:04:59.291000 audit[2009]: CRED_ACQ pid=2009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 10:04:59.291000 audit[2009]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcaeb12f0 a2=3 a3=1 items=0 ppid=1 pid=2009 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:04:59.291000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:04:59.293304 sshd[2009]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:04:59.301738 systemd[1]: Started session-7.scope. Feb 9 10:04:59.302673 systemd-logind[1723]: New session 7 of user core. Feb 9 10:04:59.310000 audit[2009]: USER_START pid=2009 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 10:04:59.313000 audit[2011]: CRED_ACQ pid=2011 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 10:04:59.409000 audit[2012]: USER_ACCT pid=2012 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:04:59.410975 sudo[2012]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 10:04:59.410000 audit[2012]: CRED_REFR pid=2012 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:04:59.411541 sudo[2012]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:04:59.414000 audit[2012]: USER_START pid=2012 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:05:00.092374 systemd[1]: Starting docker.service... Feb 9 10:05:00.174348 env[2027]: time="2024-02-09T10:05:00.174257251Z" level=info msg="Starting up" Feb 9 10:05:00.176621 env[2027]: time="2024-02-09T10:05:00.176576712Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 10:05:00.176813 env[2027]: time="2024-02-09T10:05:00.176762844Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 10:05:00.176951 env[2027]: time="2024-02-09T10:05:00.176918418Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 10:05:00.177086 env[2027]: time="2024-02-09T10:05:00.177058725Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 10:05:00.180199 env[2027]: time="2024-02-09T10:05:00.180156477Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 10:05:00.180370 env[2027]: time="2024-02-09T10:05:00.180342150Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 10:05:00.180530 env[2027]: time="2024-02-09T10:05:00.180486991Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 10:05:00.180638 env[2027]: time="2024-02-09T10:05:00.180610789Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 10:05:00.189990 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2547185421-merged.mount: Deactivated successfully. Feb 9 10:05:01.213601 env[2027]: time="2024-02-09T10:05:01.213525868Z" level=info msg="Loading containers: start." Feb 9 10:05:01.318000 audit[2058]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2058 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.318000 audit[2058]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffffe1cc2e0 a2=0 a3=1 items=0 ppid=2027 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.318000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 10:05:01.323000 audit[2060]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2060 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.323000 audit[2060]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffc8189c40 a2=0 a3=1 items=0 ppid=2027 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.323000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 10:05:01.326000 audit[2062]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2062 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.326000 audit[2062]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc2b1a880 a2=0 a3=1 items=0 ppid=2027 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.326000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 10:05:01.330000 audit[2064]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2064 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.330000 audit[2064]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe2da85e0 a2=0 a3=1 items=0 ppid=2027 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.330000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 10:05:01.336000 audit[2066]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2066 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.336000 audit[2066]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffbbd0a10 a2=0 a3=1 items=0 ppid=2027 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.336000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 10:05:01.370000 audit[2071]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2071 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.370000 audit[2071]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe1718e90 a2=0 a3=1 items=0 ppid=2027 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.370000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 10:05:01.468000 audit[2073]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2073 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.468000 audit[2073]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe9bd5f20 a2=0 a3=1 items=0 ppid=2027 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.468000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 10:05:01.472000 audit[2075]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2075 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.472000 audit[2075]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=fffff7b0c8c0 a2=0 a3=1 items=0 ppid=2027 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.472000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 10:05:01.476000 audit[2077]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2077 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.476000 audit[2077]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffd71ac0f0 a2=0 a3=1 items=0 ppid=2027 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.476000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:05:01.492000 audit[2081]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2081 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.492000 audit[2081]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff3d70f30 a2=0 a3=1 items=0 ppid=2027 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.492000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:05:01.494000 audit[2082]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2082 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.494000 audit[2082]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffffc7c40e0 a2=0 a3=1 items=0 ppid=2027 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.494000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:05:01.506815 kernel: Initializing XFRM netlink socket Feb 9 10:05:01.560667 env[2027]: time="2024-02-09T10:05:01.560598969Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 10:05:01.564420 (udev-worker)[2038]: Network interface NamePolicy= disabled on kernel command line. Feb 9 10:05:01.589000 audit[2090]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2090 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.589000 audit[2090]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=fffff1081870 a2=0 a3=1 items=0 ppid=2027 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.589000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 10:05:01.606000 audit[2093]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2093 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.606000 audit[2093]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=fffff8efb140 a2=0 a3=1 items=0 ppid=2027 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.606000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 10:05:01.613000 audit[2096]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2096 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.613000 audit[2096]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffdccf8e90 a2=0 a3=1 items=0 ppid=2027 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.613000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 10:05:01.617000 audit[2098]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2098 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.617000 audit[2098]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd571bee0 a2=0 a3=1 items=0 ppid=2027 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.617000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 10:05:01.622000 audit[2100]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2100 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.622000 audit[2100]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffd1d2abb0 a2=0 a3=1 items=0 ppid=2027 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.622000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 10:05:01.626000 audit[2102]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2102 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.626000 audit[2102]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffc6b872a0 a2=0 a3=1 items=0 ppid=2027 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.626000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 10:05:01.631000 audit[2104]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2104 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.631000 audit[2104]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffd0cde1b0 a2=0 a3=1 items=0 ppid=2027 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.631000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 10:05:01.644000 audit[2107]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2107 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.644000 audit[2107]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffff02401b0 a2=0 a3=1 items=0 ppid=2027 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.644000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 10:05:01.648000 audit[2109]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.648000 audit[2109]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffc3d3fd70 a2=0 a3=1 items=0 ppid=2027 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.648000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 10:05:01.653000 audit[2111]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2111 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.653000 audit[2111]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffec588650 a2=0 a3=1 items=0 ppid=2027 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.653000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 10:05:01.657000 audit[2113]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2113 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.657000 audit[2113]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc558ec10 a2=0 a3=1 items=0 ppid=2027 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.657000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 10:05:01.659406 systemd-networkd[1536]: docker0: Link UP Feb 9 10:05:01.674000 audit[2117]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2117 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.674000 audit[2117]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe1a003d0 a2=0 a3=1 items=0 ppid=2027 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.674000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:05:01.676000 audit[2118]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2118 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:01.676000 audit[2118]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe5c3d5d0 a2=0 a3=1 items=0 ppid=2027 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:01.676000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:05:01.678376 env[2027]: time="2024-02-09T10:05:01.678327815Z" level=info msg="Loading containers: done." Feb 9 10:05:01.698721 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1883106118-merged.mount: Deactivated successfully. Feb 9 10:05:01.718119 env[2027]: time="2024-02-09T10:05:01.718038971Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 10:05:01.718550 env[2027]: time="2024-02-09T10:05:01.718498790Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 10:05:01.718823 env[2027]: time="2024-02-09T10:05:01.718762468Z" level=info msg="Daemon has completed initialization" Feb 9 10:05:01.744679 systemd[1]: Started docker.service. Feb 9 10:05:01.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:01.753688 env[2027]: time="2024-02-09T10:05:01.753621370Z" level=info msg="API listen on /run/docker.sock" Feb 9 10:05:01.789836 systemd[1]: Reloading. Feb 9 10:05:01.940119 /usr/lib/systemd/system-generators/torcx-generator[2171]: time="2024-02-09T10:05:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:05:01.940197 /usr/lib/systemd/system-generators/torcx-generator[2171]: time="2024-02-09T10:05:01Z" level=info msg="torcx already run" Feb 9 10:05:02.083358 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:05:02.083674 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:05:02.127179 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:05:02.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.276000 audit: BPF prog-id=37 op=LOAD Feb 9 10:05:02.277000 audit: BPF prog-id=24 op=UNLOAD Feb 9 10:05:02.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.278000 audit: BPF prog-id=38 op=LOAD Feb 9 10:05:02.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.279000 audit: BPF prog-id=39 op=LOAD Feb 9 10:05:02.279000 audit: BPF prog-id=25 op=UNLOAD Feb 9 10:05:02.279000 audit: BPF prog-id=26 op=UNLOAD Feb 9 10:05:02.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.282000 audit: BPF prog-id=40 op=LOAD Feb 9 10:05:02.282000 audit: BPF prog-id=18 op=UNLOAD Feb 9 10:05:02.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.283000 audit: BPF prog-id=41 op=LOAD Feb 9 10:05:02.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.284000 audit: BPF prog-id=42 op=LOAD Feb 9 10:05:02.285000 audit: BPF prog-id=19 op=UNLOAD Feb 9 10:05:02.285000 audit: BPF prog-id=20 op=UNLOAD Feb 9 10:05:02.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.288000 audit: BPF prog-id=43 op=LOAD Feb 9 10:05:02.288000 audit: BPF prog-id=35 op=UNLOAD Feb 9 10:05:02.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.292000 audit: BPF prog-id=44 op=LOAD Feb 9 10:05:02.292000 audit: BPF prog-id=28 op=UNLOAD Feb 9 10:05:02.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.294000 audit: BPF prog-id=45 op=LOAD Feb 9 10:05:02.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.294000 audit: BPF prog-id=46 op=LOAD Feb 9 10:05:02.294000 audit: BPF prog-id=21 op=UNLOAD Feb 9 10:05:02.294000 audit: BPF prog-id=22 op=UNLOAD Feb 9 10:05:02.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.295000 audit: BPF prog-id=47 op=LOAD Feb 9 10:05:02.295000 audit: BPF prog-id=27 op=UNLOAD Feb 9 10:05:02.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.302000 audit: BPF prog-id=48 op=LOAD Feb 9 10:05:02.302000 audit: BPF prog-id=29 op=UNLOAD Feb 9 10:05:02.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.303000 audit: BPF prog-id=49 op=LOAD Feb 9 10:05:02.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.303000 audit: BPF prog-id=50 op=LOAD Feb 9 10:05:02.303000 audit: BPF prog-id=30 op=UNLOAD Feb 9 10:05:02.303000 audit: BPF prog-id=31 op=UNLOAD Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit: BPF prog-id=51 op=LOAD Feb 9 10:05:02.306000 audit: BPF prog-id=32 op=UNLOAD Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit: BPF prog-id=52 op=LOAD Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.307000 audit: BPF prog-id=53 op=LOAD Feb 9 10:05:02.307000 audit: BPF prog-id=33 op=UNLOAD Feb 9 10:05:02.307000 audit: BPF prog-id=34 op=UNLOAD Feb 9 10:05:02.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:02.308000 audit: BPF prog-id=54 op=LOAD Feb 9 10:05:02.308000 audit: BPF prog-id=23 op=UNLOAD Feb 9 10:05:02.327953 systemd[1]: Started kubelet.service. Feb 9 10:05:02.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:02.483725 kubelet[2220]: E0209 10:05:02.483639 2220 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 10:05:02.488943 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 10:05:02.489266 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 10:05:02.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:05:03.869624 env[1736]: time="2024-02-09T10:05:03.869523262Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 9 10:05:04.592055 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount235615495.mount: Deactivated successfully. Feb 9 10:05:07.444335 env[1736]: time="2024-02-09T10:05:07.444271204Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:07.448063 env[1736]: time="2024-02-09T10:05:07.448015862Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d88fbf485621d26e515136c1848b666d7dfe0fa84ca7ebd826447b039d306d88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:07.451146 env[1736]: time="2024-02-09T10:05:07.451084059Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:07.454873 env[1736]: time="2024-02-09T10:05:07.454812966Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:07.456529 env[1736]: time="2024-02-09T10:05:07.456475352Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:d88fbf485621d26e515136c1848b666d7dfe0fa84ca7ebd826447b039d306d88\"" Feb 9 10:05:07.473427 env[1736]: time="2024-02-09T10:05:07.473378355Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 9 10:05:10.301576 env[1736]: time="2024-02-09T10:05:10.301515343Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:10.305235 env[1736]: time="2024-02-09T10:05:10.305186725Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71d8e883014e0849ca9a3161bd1feac09ad210dea2f4140732e218f04a6826c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:10.308433 env[1736]: time="2024-02-09T10:05:10.308384047Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:10.311580 env[1736]: time="2024-02-09T10:05:10.311532994Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:10.313192 env[1736]: time="2024-02-09T10:05:10.313137765Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:71d8e883014e0849ca9a3161bd1feac09ad210dea2f4140732e218f04a6826c2\"" Feb 9 10:05:10.331379 env[1736]: time="2024-02-09T10:05:10.331330641Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 9 10:05:12.259930 env[1736]: time="2024-02-09T10:05:12.259849797Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:12.263396 env[1736]: time="2024-02-09T10:05:12.263333570Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a636f3d6300bad4775ea80ad544e38f486a039732c4871bddc1db3a5336c871a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:12.266634 env[1736]: time="2024-02-09T10:05:12.266575772Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:12.270125 env[1736]: time="2024-02-09T10:05:12.270055954Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:12.271806 env[1736]: time="2024-02-09T10:05:12.271739493Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:a636f3d6300bad4775ea80ad544e38f486a039732c4871bddc1db3a5336c871a\"" Feb 9 10:05:12.288422 env[1736]: time="2024-02-09T10:05:12.288371677Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 10:05:12.729746 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 10:05:12.730125 systemd[1]: Stopped kubelet.service. Feb 9 10:05:12.742040 kernel: kauditd_printk_skb: 292 callbacks suppressed Feb 9 10:05:12.742183 kernel: audit: type=1130 audit(1707473112.729:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:12.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:12.732759 systemd[1]: Started kubelet.service. Feb 9 10:05:12.750531 kernel: audit: type=1131 audit(1707473112.729:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:12.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:12.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:12.758639 kernel: audit: type=1130 audit(1707473112.730:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:12.903848 kubelet[2255]: E0209 10:05:12.903714 2255 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 10:05:12.917103 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 10:05:12.917427 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 10:05:12.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:05:12.926817 kernel: audit: type=1131 audit(1707473112.917:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:05:13.761927 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2119969052.mount: Deactivated successfully. Feb 9 10:05:14.444605 env[1736]: time="2024-02-09T10:05:14.444541576Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:14.447751 env[1736]: time="2024-02-09T10:05:14.447667678Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:14.450690 env[1736]: time="2024-02-09T10:05:14.450631946Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:14.453914 env[1736]: time="2024-02-09T10:05:14.453851527Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:14.455392 env[1736]: time="2024-02-09T10:05:14.455339491Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926\"" Feb 9 10:05:14.471965 env[1736]: time="2024-02-09T10:05:14.471915443Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 10:05:14.981266 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2042715450.mount: Deactivated successfully. Feb 9 10:05:14.997236 env[1736]: time="2024-02-09T10:05:14.997179916Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:14.999981 env[1736]: time="2024-02-09T10:05:14.999934541Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:15.002671 env[1736]: time="2024-02-09T10:05:15.002627059Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:15.005509 env[1736]: time="2024-02-09T10:05:15.005450673Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:15.006691 env[1736]: time="2024-02-09T10:05:15.006642139Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 9 10:05:15.022230 env[1736]: time="2024-02-09T10:05:15.022182659Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 9 10:05:16.161004 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1111648194.mount: Deactivated successfully. Feb 9 10:05:17.161668 amazon-ssm-agent[1710]: 2024-02-09 10:05:17 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Feb 9 10:05:19.649954 env[1736]: time="2024-02-09T10:05:19.649872252Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:19.653652 env[1736]: time="2024-02-09T10:05:19.653589966Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:19.656690 env[1736]: time="2024-02-09T10:05:19.656641013Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:19.659851 env[1736]: time="2024-02-09T10:05:19.659790511Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:19.661328 env[1736]: time="2024-02-09T10:05:19.661280050Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb\"" Feb 9 10:05:19.683895 env[1736]: time="2024-02-09T10:05:19.683827762Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 9 10:05:20.272138 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4292309623.mount: Deactivated successfully. Feb 9 10:05:21.013597 env[1736]: time="2024-02-09T10:05:21.013517838Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:21.018334 env[1736]: time="2024-02-09T10:05:21.018274966Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:21.021449 env[1736]: time="2024-02-09T10:05:21.021369435Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:21.024511 env[1736]: time="2024-02-09T10:05:21.024434591Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:21.025900 env[1736]: time="2024-02-09T10:05:21.025844674Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0\"" Feb 9 10:05:22.712996 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 9 10:05:22.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:22.722808 kernel: audit: type=1131 audit(1707473122.712:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:22.737000 audit: BPF prog-id=53 op=UNLOAD Feb 9 10:05:22.737000 audit: BPF prog-id=52 op=UNLOAD Feb 9 10:05:22.743301 kernel: audit: type=1334 audit(1707473122.737:423): prog-id=53 op=UNLOAD Feb 9 10:05:22.743371 kernel: audit: type=1334 audit(1707473122.737:424): prog-id=52 op=UNLOAD Feb 9 10:05:22.737000 audit: BPF prog-id=51 op=UNLOAD Feb 9 10:05:22.746121 kernel: audit: type=1334 audit(1707473122.737:425): prog-id=51 op=UNLOAD Feb 9 10:05:22.979745 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 9 10:05:22.980153 systemd[1]: Stopped kubelet.service. Feb 9 10:05:22.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:22.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:22.999567 kernel: audit: type=1130 audit(1707473122.978:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:22.999709 kernel: audit: type=1131 audit(1707473122.978:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:22.995347 systemd[1]: Started kubelet.service. Feb 9 10:05:23.011421 kernel: audit: type=1130 audit(1707473122.993:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:22.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:23.106972 kubelet[2334]: E0209 10:05:23.106890 2334 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 10:05:23.111442 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 10:05:23.111794 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 10:05:23.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:05:23.120847 kernel: audit: type=1131 audit(1707473123.110:429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:05:28.418632 systemd[1]: Stopped kubelet.service. Feb 9 10:05:28.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:28.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:28.435350 kernel: audit: type=1130 audit(1707473128.418:430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:28.435486 kernel: audit: type=1131 audit(1707473128.418:431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:28.454464 systemd[1]: Reloading. Feb 9 10:05:28.564391 /usr/lib/systemd/system-generators/torcx-generator[2363]: time="2024-02-09T10:05:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:05:28.572399 /usr/lib/systemd/system-generators/torcx-generator[2363]: time="2024-02-09T10:05:28Z" level=info msg="torcx already run" Feb 9 10:05:28.737688 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:05:28.737728 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:05:28.781181 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:05:28.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.954304 kernel: audit: type=1400 audit(1707473128.939:432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.954399 kernel: audit: type=1400 audit(1707473128.939:433): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.954453 kernel: audit: type=1400 audit(1707473128.939:434): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.968847 kernel: audit: type=1400 audit(1707473128.939:435): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.968951 kernel: audit: type=1400 audit(1707473128.939:436): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.983563 kernel: audit: type=1400 audit(1707473128.939:437): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.983629 kernel: audit: type=1400 audit(1707473128.939:438): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.990938 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 10:05:28.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.946000 audit: BPF prog-id=55 op=LOAD Feb 9 10:05:28.946000 audit: BPF prog-id=37 op=UNLOAD Feb 9 10:05:28.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.954000 audit: BPF prog-id=56 op=LOAD Feb 9 10:05:28.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.961000 audit: BPF prog-id=57 op=LOAD Feb 9 10:05:28.961000 audit: BPF prog-id=38 op=UNLOAD Feb 9 10:05:28.961000 audit: BPF prog-id=39 op=UNLOAD Feb 9 10:05:28.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.968000 audit: BPF prog-id=58 op=LOAD Feb 9 10:05:28.968000 audit: BPF prog-id=40 op=UNLOAD Feb 9 10:05:28.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.975000 audit: BPF prog-id=59 op=LOAD Feb 9 10:05:28.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.983000 audit: BPF prog-id=60 op=LOAD Feb 9 10:05:28.983000 audit: BPF prog-id=41 op=UNLOAD Feb 9 10:05:28.983000 audit: BPF prog-id=42 op=UNLOAD Feb 9 10:05:28.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.992000 audit: BPF prog-id=61 op=LOAD Feb 9 10:05:28.992000 audit: BPF prog-id=43 op=UNLOAD Feb 9 10:05:28.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.997000 audit: BPF prog-id=62 op=LOAD Feb 9 10:05:28.997000 audit: BPF prog-id=44 op=UNLOAD Feb 9 10:05:28.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.998000 audit: BPF prog-id=63 op=LOAD Feb 9 10:05:28.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:28.998000 audit: BPF prog-id=64 op=LOAD Feb 9 10:05:28.998000 audit: BPF prog-id=45 op=UNLOAD Feb 9 10:05:28.999000 audit: BPF prog-id=46 op=UNLOAD Feb 9 10:05:29.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.000000 audit: BPF prog-id=65 op=LOAD Feb 9 10:05:29.000000 audit: BPF prog-id=47 op=UNLOAD Feb 9 10:05:29.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.007000 audit: BPF prog-id=66 op=LOAD Feb 9 10:05:29.007000 audit: BPF prog-id=48 op=UNLOAD Feb 9 10:05:29.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.007000 audit: BPF prog-id=67 op=LOAD Feb 9 10:05:29.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.008000 audit: BPF prog-id=68 op=LOAD Feb 9 10:05:29.008000 audit: BPF prog-id=49 op=UNLOAD Feb 9 10:05:29.008000 audit: BPF prog-id=50 op=UNLOAD Feb 9 10:05:29.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:29.011000 audit: BPF prog-id=69 op=LOAD Feb 9 10:05:29.011000 audit: BPF prog-id=54 op=UNLOAD Feb 9 10:05:29.051030 systemd[1]: Started kubelet.service. Feb 9 10:05:29.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:29.149629 kubelet[2419]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 10:05:29.150200 kubelet[2419]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:05:29.150368 kubelet[2419]: I0209 10:05:29.150305 2419 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 10:05:29.152657 kubelet[2419]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 10:05:29.152657 kubelet[2419]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:05:30.948010 kubelet[2419]: I0209 10:05:30.947971 2419 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 10:05:30.948689 kubelet[2419]: I0209 10:05:30.948665 2419 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 10:05:30.949187 kubelet[2419]: I0209 10:05:30.949162 2419 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 10:05:30.961437 kubelet[2419]: I0209 10:05:30.961398 2419 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 10:05:30.962568 kubelet[2419]: W0209 10:05:30.962525 2419 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 10:05:30.962837 kubelet[2419]: E0209 10:05:30.962814 2419 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.25.36:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.25.36:6443: connect: connection refused Feb 9 10:05:30.963629 kubelet[2419]: I0209 10:05:30.963584 2419 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 10:05:30.964093 kubelet[2419]: I0209 10:05:30.964050 2419 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 10:05:30.964190 kubelet[2419]: I0209 10:05:30.964172 2419 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 10:05:30.964368 kubelet[2419]: I0209 10:05:30.964225 2419 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 10:05:30.964368 kubelet[2419]: I0209 10:05:30.964250 2419 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 10:05:30.964492 kubelet[2419]: I0209 10:05:30.964425 2419 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:05:30.970184 kubelet[2419]: I0209 10:05:30.970150 2419 kubelet.go:398] "Attempting to sync node with API server" Feb 9 10:05:30.970414 kubelet[2419]: I0209 10:05:30.970389 2419 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 10:05:30.970607 kubelet[2419]: I0209 10:05:30.970585 2419 kubelet.go:297] "Adding apiserver pod source" Feb 9 10:05:30.970743 kubelet[2419]: I0209 10:05:30.970722 2419 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 10:05:30.971039 kubelet[2419]: W0209 10:05:30.970961 2419 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.25.36:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-36&limit=500&resourceVersion=0": dial tcp 172.31.25.36:6443: connect: connection refused Feb 9 10:05:30.971128 kubelet[2419]: E0209 10:05:30.971046 2419 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.25.36:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-36&limit=500&resourceVersion=0": dial tcp 172.31.25.36:6443: connect: connection refused Feb 9 10:05:30.972167 kubelet[2419]: W0209 10:05:30.972095 2419 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.25.36:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.25.36:6443: connect: connection refused Feb 9 10:05:30.972403 kubelet[2419]: E0209 10:05:30.972380 2419 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.25.36:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.25.36:6443: connect: connection refused Feb 9 10:05:30.972682 kubelet[2419]: I0209 10:05:30.972658 2419 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 10:05:30.973463 kubelet[2419]: W0209 10:05:30.973436 2419 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 10:05:30.974399 kubelet[2419]: I0209 10:05:30.974367 2419 server.go:1186] "Started kubelet" Feb 9 10:05:30.976000 audit[2419]: AVC avc: denied { mac_admin } for pid=2419 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:30.976000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:05:30.976000 audit[2419]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40010b3f50 a1=40010c0ea0 a2=40010b3f20 a3=25 items=0 ppid=1 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:30.976000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:05:30.978183 kubelet[2419]: I0209 10:05:30.978152 2419 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 10:05:30.977000 audit[2419]: AVC avc: denied { mac_admin } for pid=2419 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:30.977000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:05:30.977000 audit[2419]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bee480 a1=40010c0eb8 a2=4000ca2000 a3=25 items=0 ppid=1 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:30.977000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:05:30.978853 kubelet[2419]: I0209 10:05:30.978827 2419 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 10:05:30.979152 kubelet[2419]: I0209 10:05:30.979130 2419 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 10:05:30.980031 kubelet[2419]: E0209 10:05:30.979983 2419 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 10:05:30.980031 kubelet[2419]: E0209 10:05:30.980035 2419 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 10:05:30.980577 kubelet[2419]: E0209 10:05:30.980419 2419 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-36.17b229c41b3fce6f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-36", UID:"ip-172-31-25-36", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-36"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 5, 30, 974334575, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 5, 30, 974334575, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://172.31.25.36:6443/api/v1/namespaces/default/events": dial tcp 172.31.25.36:6443: connect: connection refused'(may retry after sleeping) Feb 9 10:05:30.984000 audit[2430]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:30.984000 audit[2430]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff4177450 a2=0 a3=1 items=0 ppid=2419 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:30.985592 kubelet[2419]: I0209 10:05:30.985449 2419 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 10:05:30.984000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 10:05:30.986284 kubelet[2419]: I0209 10:05:30.986255 2419 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 10:05:30.986614 kubelet[2419]: I0209 10:05:30.986567 2419 server.go:451] "Adding debug handlers to kubelet server" Feb 9 10:05:30.988000 audit[2431]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:30.988000 audit[2431]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc9a0f950 a2=0 a3=1 items=0 ppid=2419 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:30.988000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 10:05:30.990236 kubelet[2419]: I0209 10:05:30.990204 2419 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 10:05:30.991747 kubelet[2419]: E0209 10:05:30.991691 2419 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://172.31.25.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-36?timeout=10s": dial tcp 172.31.25.36:6443: connect: connection refused Feb 9 10:05:30.994000 audit[2433]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:30.994000 audit[2433]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe65859b0 a2=0 a3=1 items=0 ppid=2419 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:30.994000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 10:05:30.999000 audit[2435]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:30.999000 audit[2435]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc2925db0 a2=0 a3=1 items=0 ppid=2419 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:30.999000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 10:05:31.013384 kubelet[2419]: W0209 10:05:31.013279 2419 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.25.36:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.25.36:6443: connect: connection refused Feb 9 10:05:31.013384 kubelet[2419]: E0209 10:05:31.013380 2419 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.25.36:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.25.36:6443: connect: connection refused Feb 9 10:05:31.021000 audit[2440]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:31.021000 audit[2440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffc118a510 a2=0 a3=1 items=0 ppid=2419 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.021000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 10:05:31.034000 audit[2442]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=2442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:31.034000 audit[2442]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd986b0c0 a2=0 a3=1 items=0 ppid=2419 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.034000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 10:05:31.049068 kubelet[2419]: I0209 10:05:31.049002 2419 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 10:05:31.049068 kubelet[2419]: I0209 10:05:31.049052 2419 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 10:05:31.049304 kubelet[2419]: I0209 10:05:31.049086 2419 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:05:31.050000 audit[2445]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=2445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:31.052004 kubelet[2419]: I0209 10:05:31.051844 2419 policy_none.go:49] "None policy: Start" Feb 9 10:05:31.050000 audit[2445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffdaaab140 a2=0 a3=1 items=0 ppid=2419 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.050000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 10:05:31.052922 kubelet[2419]: I0209 10:05:31.052886 2419 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 10:05:31.053058 kubelet[2419]: I0209 10:05:31.052937 2419 state_mem.go:35] "Initializing new in-memory state store" Feb 9 10:05:31.062551 systemd[1]: Created slice kubepods.slice. Feb 9 10:05:31.073181 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 10:05:31.073000 audit[2448]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:31.073000 audit[2448]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffe82413a0 a2=0 a3=1 items=0 ppid=2419 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.073000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 10:05:31.075000 audit[2449]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:31.075000 audit[2449]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe18c4230 a2=0 a3=1 items=0 ppid=2419 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.075000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 10:05:31.077000 audit[2450]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:31.077000 audit[2450]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcccf6720 a2=0 a3=1 items=0 ppid=2419 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.077000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 10:05:31.081000 audit[2452]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=2452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:31.081000 audit[2452]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd45d7db0 a2=0 a3=1 items=0 ppid=2419 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.081000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 10:05:31.086000 audit[2454]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=2454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:31.086000 audit[2454]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffdb3e0540 a2=0 a3=1 items=0 ppid=2419 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.086000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 10:05:31.091479 kubelet[2419]: I0209 10:05:31.091427 2419 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-25-36" Feb 9 10:05:31.092222 kubelet[2419]: E0209 10:05:31.092194 2419 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.25.36:6443/api/v1/nodes\": dial tcp 172.31.25.36:6443: connect: connection refused" node="ip-172-31-25-36" Feb 9 10:05:31.096966 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 10:05:31.099000 audit[2457]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=2457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:31.099000 audit[2457]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffea52f790 a2=0 a3=1 items=0 ppid=2419 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.099000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 10:05:31.105532 kubelet[2419]: I0209 10:05:31.105495 2419 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 10:05:31.104000 audit[2459]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:31.104000 audit[2459]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=fffff4c51050 a2=0 a3=1 items=0 ppid=2419 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.104000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 10:05:31.105000 audit[2419]: AVC avc: denied { mac_admin } for pid=2419 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:31.105000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:05:31.105000 audit[2419]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40010b2840 a1=4000c36648 a2=40010b27e0 a3=25 items=0 ppid=1 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.105000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:05:31.107082 kubelet[2419]: I0209 10:05:31.107052 2419 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 10:05:31.107546 kubelet[2419]: I0209 10:05:31.107518 2419 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 10:05:31.112696 kubelet[2419]: E0209 10:05:31.112661 2419 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-25-36\" not found" Feb 9 10:05:31.112000 audit[2461]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:31.112000 audit[2461]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=540 a0=3 a1=ffffc007eb80 a2=0 a3=1 items=0 ppid=2419 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 10:05:31.113951 kubelet[2419]: I0209 10:05:31.113925 2419 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 10:05:31.115000 audit[2462]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=2462 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:05:31.115000 audit[2462]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe33e7220 a2=0 a3=1 items=0 ppid=2419 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.115000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 10:05:31.116000 audit[2463]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=2463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:31.116000 audit[2463]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe91ee580 a2=0 a3=1 items=0 ppid=2419 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 10:05:31.118000 audit[2464]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=2464 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:05:31.118000 audit[2464]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffd4778800 a2=0 a3=1 items=0 ppid=2419 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.118000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 10:05:31.118000 audit[2465]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:31.118000 audit[2465]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffeb46220 a2=0 a3=1 items=0 ppid=2419 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.118000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 10:05:31.121000 audit[2467]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=2467 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:05:31.121000 audit[2467]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd9e10470 a2=0 a3=1 items=0 ppid=2419 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.121000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 10:05:31.123000 audit[2468]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=2468 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:05:31.123000 audit[2468]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd5b5e030 a2=0 a3=1 items=0 ppid=2419 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.123000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 10:05:31.125000 audit[2469]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2469 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:05:31.125000 audit[2469]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffd75ff6f0 a2=0 a3=1 items=0 ppid=2419 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.125000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 10:05:31.130000 audit[2471]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2471 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:05:31.130000 audit[2471]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffdae15c30 a2=0 a3=1 items=0 ppid=2419 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.130000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 10:05:31.132000 audit[2472]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:05:31.132000 audit[2472]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff82f8440 a2=0 a3=1 items=0 ppid=2419 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.132000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 10:05:31.134000 audit[2473]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=2473 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:05:31.134000 audit[2473]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffce4e03c0 a2=0 a3=1 items=0 ppid=2419 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.134000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 10:05:31.139000 audit[2475]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=2475 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:05:31.139000 audit[2475]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff14d8630 a2=0 a3=1 items=0 ppid=2419 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.139000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 10:05:31.143000 audit[2477]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=2477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:05:31.143000 audit[2477]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff904c810 a2=0 a3=1 items=0 ppid=2419 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.143000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 10:05:31.148000 audit[2479]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=2479 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:05:31.148000 audit[2479]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffff2ac7d0 a2=0 a3=1 items=0 ppid=2419 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.148000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 10:05:31.153000 audit[2481]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2481 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:05:31.153000 audit[2481]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffe5e985c0 a2=0 a3=1 items=0 ppid=2419 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.153000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 10:05:31.159000 audit[2483]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=2483 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:05:31.159000 audit[2483]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=556 a0=3 a1=fffffadc53f0 a2=0 a3=1 items=0 ppid=2419 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.159000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 10:05:31.161915 kubelet[2419]: I0209 10:05:31.161880 2419 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 10:05:31.161915 kubelet[2419]: I0209 10:05:31.161926 2419 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 10:05:31.162083 kubelet[2419]: I0209 10:05:31.161959 2419 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 10:05:31.162083 kubelet[2419]: E0209 10:05:31.162040 2419 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 10:05:31.163427 kubelet[2419]: W0209 10:05:31.163339 2419 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.25.36:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.25.36:6443: connect: connection refused Feb 9 10:05:31.163585 kubelet[2419]: E0209 10:05:31.163434 2419 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.25.36:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.25.36:6443: connect: connection refused Feb 9 10:05:31.163000 audit[2484]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=2484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:05:31.163000 audit[2484]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe49b20d0 a2=0 a3=1 items=0 ppid=2419 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.163000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 10:05:31.165000 audit[2485]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=2485 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:05:31.165000 audit[2485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff8e546f0 a2=0 a3=1 items=0 ppid=2419 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 10:05:31.167000 audit[2486]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:05:31.167000 audit[2486]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe534a530 a2=0 a3=1 items=0 ppid=2419 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:31.167000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 10:05:31.192692 kubelet[2419]: E0209 10:05:31.192622 2419 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://172.31.25.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-36?timeout=10s": dial tcp 172.31.25.36:6443: connect: connection refused Feb 9 10:05:31.262964 kubelet[2419]: I0209 10:05:31.262924 2419 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:05:31.265086 kubelet[2419]: I0209 10:05:31.265032 2419 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:05:31.267834 kubelet[2419]: I0209 10:05:31.267590 2419 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:05:31.269030 kubelet[2419]: I0209 10:05:31.268995 2419 status_manager.go:698] "Failed to get status for pod" podUID=3375a63928b7419e936a15a37b4ffbc6 pod="kube-system/kube-scheduler-ip-172-31-25-36" err="Get \"https://172.31.25.36:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ip-172-31-25-36\": dial tcp 172.31.25.36:6443: connect: connection refused" Feb 9 10:05:31.271665 kubelet[2419]: I0209 10:05:31.271633 2419 status_manager.go:698] "Failed to get status for pod" podUID=32434eabc2c0f9e92f410a6cee152c0f pod="kube-system/kube-apiserver-ip-172-31-25-36" err="Get \"https://172.31.25.36:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ip-172-31-25-36\": dial tcp 172.31.25.36:6443: connect: connection refused" Feb 9 10:05:31.275270 kubelet[2419]: I0209 10:05:31.275235 2419 status_manager.go:698] "Failed to get status for pod" podUID=dacb4c777212725a26d5e5c2bb862217 pod="kube-system/kube-controller-manager-ip-172-31-25-36" err="Get \"https://172.31.25.36:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ip-172-31-25-36\": dial tcp 172.31.25.36:6443: connect: connection refused" Feb 9 10:05:31.279368 systemd[1]: Created slice kubepods-burstable-pod3375a63928b7419e936a15a37b4ffbc6.slice. Feb 9 10:05:31.291516 kubelet[2419]: I0209 10:05:31.291479 2419 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/32434eabc2c0f9e92f410a6cee152c0f-ca-certs\") pod \"kube-apiserver-ip-172-31-25-36\" (UID: \"32434eabc2c0f9e92f410a6cee152c0f\") " pod="kube-system/kube-apiserver-ip-172-31-25-36" Feb 9 10:05:31.291724 kubelet[2419]: I0209 10:05:31.291703 2419 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/dacb4c777212725a26d5e5c2bb862217-ca-certs\") pod \"kube-controller-manager-ip-172-31-25-36\" (UID: \"dacb4c777212725a26d5e5c2bb862217\") " pod="kube-system/kube-controller-manager-ip-172-31-25-36" Feb 9 10:05:31.291930 kubelet[2419]: I0209 10:05:31.291908 2419 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/dacb4c777212725a26d5e5c2bb862217-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-25-36\" (UID: \"dacb4c777212725a26d5e5c2bb862217\") " pod="kube-system/kube-controller-manager-ip-172-31-25-36" Feb 9 10:05:31.292102 kubelet[2419]: I0209 10:05:31.292080 2419 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/dacb4c777212725a26d5e5c2bb862217-kubeconfig\") pod \"kube-controller-manager-ip-172-31-25-36\" (UID: \"dacb4c777212725a26d5e5c2bb862217\") " pod="kube-system/kube-controller-manager-ip-172-31-25-36" Feb 9 10:05:31.292273 kubelet[2419]: I0209 10:05:31.292251 2419 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/dacb4c777212725a26d5e5c2bb862217-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-25-36\" (UID: \"dacb4c777212725a26d5e5c2bb862217\") " pod="kube-system/kube-controller-manager-ip-172-31-25-36" Feb 9 10:05:31.292988 kubelet[2419]: I0209 10:05:31.292566 2419 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3375a63928b7419e936a15a37b4ffbc6-kubeconfig\") pod \"kube-scheduler-ip-172-31-25-36\" (UID: \"3375a63928b7419e936a15a37b4ffbc6\") " pod="kube-system/kube-scheduler-ip-172-31-25-36" Feb 9 10:05:31.296001 kubelet[2419]: I0209 10:05:31.295952 2419 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/32434eabc2c0f9e92f410a6cee152c0f-k8s-certs\") pod \"kube-apiserver-ip-172-31-25-36\" (UID: \"32434eabc2c0f9e92f410a6cee152c0f\") " pod="kube-system/kube-apiserver-ip-172-31-25-36" Feb 9 10:05:31.296133 kubelet[2419]: I0209 10:05:31.296027 2419 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/32434eabc2c0f9e92f410a6cee152c0f-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-25-36\" (UID: \"32434eabc2c0f9e92f410a6cee152c0f\") " pod="kube-system/kube-apiserver-ip-172-31-25-36" Feb 9 10:05:31.296133 kubelet[2419]: I0209 10:05:31.296075 2419 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/dacb4c777212725a26d5e5c2bb862217-k8s-certs\") pod \"kube-controller-manager-ip-172-31-25-36\" (UID: \"dacb4c777212725a26d5e5c2bb862217\") " pod="kube-system/kube-controller-manager-ip-172-31-25-36" Feb 9 10:05:31.296526 systemd[1]: Created slice kubepods-burstable-pod32434eabc2c0f9e92f410a6cee152c0f.slice. Feb 9 10:05:31.297563 kubelet[2419]: I0209 10:05:31.297359 2419 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-25-36" Feb 9 10:05:31.297988 kubelet[2419]: E0209 10:05:31.297953 2419 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.25.36:6443/api/v1/nodes\": dial tcp 172.31.25.36:6443: connect: connection refused" node="ip-172-31-25-36" Feb 9 10:05:31.312111 systemd[1]: Created slice kubepods-burstable-poddacb4c777212725a26d5e5c2bb862217.slice. Feb 9 10:05:31.591926 env[1736]: time="2024-02-09T10:05:31.591430115Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-25-36,Uid:3375a63928b7419e936a15a37b4ffbc6,Namespace:kube-system,Attempt:0,}" Feb 9 10:05:31.594933 kubelet[2419]: E0209 10:05:31.594887 2419 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://172.31.25.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-36?timeout=10s": dial tcp 172.31.25.36:6443: connect: connection refused Feb 9 10:05:31.609384 env[1736]: time="2024-02-09T10:05:31.609012891Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-25-36,Uid:32434eabc2c0f9e92f410a6cee152c0f,Namespace:kube-system,Attempt:0,}" Feb 9 10:05:31.617933 env[1736]: time="2024-02-09T10:05:31.617839613Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-25-36,Uid:dacb4c777212725a26d5e5c2bb862217,Namespace:kube-system,Attempt:0,}" Feb 9 10:05:31.700578 kubelet[2419]: I0209 10:05:31.700546 2419 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-25-36" Feb 9 10:05:31.701285 kubelet[2419]: E0209 10:05:31.701239 2419 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.25.36:6443/api/v1/nodes\": dial tcp 172.31.25.36:6443: connect: connection refused" node="ip-172-31-25-36" Feb 9 10:05:31.864711 kubelet[2419]: W0209 10:05:31.864505 2419 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.25.36:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.25.36:6443: connect: connection refused Feb 9 10:05:31.864711 kubelet[2419]: E0209 10:05:31.864588 2419 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.25.36:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.25.36:6443: connect: connection refused Feb 9 10:05:32.090894 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount221625481.mount: Deactivated successfully. Feb 9 10:05:32.100747 env[1736]: time="2024-02-09T10:05:32.100681944Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:32.106955 env[1736]: time="2024-02-09T10:05:32.106890304Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:32.108488 env[1736]: time="2024-02-09T10:05:32.108434889Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:32.110991 env[1736]: time="2024-02-09T10:05:32.110913320Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:32.122224 env[1736]: time="2024-02-09T10:05:32.122086725Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:32.124311 env[1736]: time="2024-02-09T10:05:32.124261519Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:32.125947 env[1736]: time="2024-02-09T10:05:32.125901556Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:32.131415 env[1736]: time="2024-02-09T10:05:32.131356412Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:32.132899 env[1736]: time="2024-02-09T10:05:32.132855763Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:32.138600 env[1736]: time="2024-02-09T10:05:32.138531058Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:32.140063 env[1736]: time="2024-02-09T10:05:32.139997787Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:32.145231 env[1736]: time="2024-02-09T10:05:32.145176131Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:05:32.209110 env[1736]: time="2024-02-09T10:05:32.208729782Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:05:32.209110 env[1736]: time="2024-02-09T10:05:32.208827142Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:05:32.209110 env[1736]: time="2024-02-09T10:05:32.208853702Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:05:32.210520 env[1736]: time="2024-02-09T10:05:32.209256726Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c5abfa7713c04ae9db8a7622394a372938ce5c808b018d1c8236c40b92f14f5f pid=2506 runtime=io.containerd.runc.v2 Feb 9 10:05:32.214691 env[1736]: time="2024-02-09T10:05:32.214565843Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:05:32.214691 env[1736]: time="2024-02-09T10:05:32.214642859Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:05:32.215038 env[1736]: time="2024-02-09T10:05:32.214958473Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:05:32.215597 env[1736]: time="2024-02-09T10:05:32.215498799Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/189daea5ad21de27607a7f6393c9d59334357d4b450d88822e8b4c0557494fb4 pid=2507 runtime=io.containerd.runc.v2 Feb 9 10:05:32.222909 env[1736]: time="2024-02-09T10:05:32.222744112Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:05:32.223055 env[1736]: time="2024-02-09T10:05:32.222932842Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:05:32.223055 env[1736]: time="2024-02-09T10:05:32.223019268Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:05:32.223504 env[1736]: time="2024-02-09T10:05:32.223431305Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f0490af74bb86cd00a87925ebd711c7e00b81395c2f85b5ec2e722d02ce930f1 pid=2529 runtime=io.containerd.runc.v2 Feb 9 10:05:32.235247 kubelet[2419]: W0209 10:05:32.235112 2419 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.25.36:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.25.36:6443: connect: connection refused Feb 9 10:05:32.235247 kubelet[2419]: E0209 10:05:32.235200 2419 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.25.36:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.25.36:6443: connect: connection refused Feb 9 10:05:32.243125 systemd[1]: Started cri-containerd-c5abfa7713c04ae9db8a7622394a372938ce5c808b018d1c8236c40b92f14f5f.scope. Feb 9 10:05:32.273945 systemd[1]: Started cri-containerd-189daea5ad21de27607a7f6393c9d59334357d4b450d88822e8b4c0557494fb4.scope. Feb 9 10:05:32.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.285000 audit: BPF prog-id=70 op=LOAD Feb 9 10:05:32.286000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.286000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2506 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616266613737313363303461653964623861373632323339346133 Feb 9 10:05:32.287000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.287000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2506 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616266613737313363303461653964623861373632323339346133 Feb 9 10:05:32.287000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.287000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.287000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.287000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.287000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.287000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.287000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.287000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.287000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.287000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.287000 audit: BPF prog-id=71 op=LOAD Feb 9 10:05:32.287000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2506 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616266613737313363303461653964623861373632323339346133 Feb 9 10:05:32.287000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.287000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.287000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.287000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.287000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.287000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.287000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.287000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.287000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.287000 audit: BPF prog-id=72 op=LOAD Feb 9 10:05:32.287000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2506 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616266613737313363303461653964623861373632323339346133 Feb 9 10:05:32.287000 audit: BPF prog-id=72 op=UNLOAD Feb 9 10:05:32.288000 audit: BPF prog-id=71 op=UNLOAD Feb 9 10:05:32.288000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.288000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.288000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.288000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.288000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.288000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.288000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.288000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.288000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.288000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.288000 audit: BPF prog-id=73 op=LOAD Feb 9 10:05:32.288000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2506 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616266613737313363303461653964623861373632323339346133 Feb 9 10:05:32.310755 systemd[1]: Started cri-containerd-f0490af74bb86cd00a87925ebd711c7e00b81395c2f85b5ec2e722d02ce930f1.scope. Feb 9 10:05:32.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.321000 audit: BPF prog-id=74 op=LOAD Feb 9 10:05:32.321000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.321000 audit[2537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2507 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138396461656135616432316465323736303761376636333933633964 Feb 9 10:05:32.321000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.321000 audit[2537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2507 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138396461656135616432316465323736303761376636333933633964 Feb 9 10:05:32.321000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.321000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.321000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.321000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.321000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.321000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.321000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.321000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.321000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.321000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.321000 audit: BPF prog-id=75 op=LOAD Feb 9 10:05:32.321000 audit[2537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2507 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138396461656135616432316465323736303761376636333933633964 Feb 9 10:05:32.322000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.322000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.322000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.322000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.322000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.322000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.322000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.322000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.322000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.322000 audit: BPF prog-id=76 op=LOAD Feb 9 10:05:32.322000 audit[2537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2507 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138396461656135616432316465323736303761376636333933633964 Feb 9 10:05:32.322000 audit: BPF prog-id=76 op=UNLOAD Feb 9 10:05:32.322000 audit: BPF prog-id=75 op=UNLOAD Feb 9 10:05:32.322000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.322000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.322000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.322000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.322000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.322000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.322000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.322000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.322000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.322000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.322000 audit: BPF prog-id=77 op=LOAD Feb 9 10:05:32.322000 audit[2537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2507 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138396461656135616432316465323736303761376636333933633964 Feb 9 10:05:32.382169 env[1736]: time="2024-02-09T10:05:32.382001602Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-25-36,Uid:32434eabc2c0f9e92f410a6cee152c0f,Namespace:kube-system,Attempt:0,} returns sandbox id \"c5abfa7713c04ae9db8a7622394a372938ce5c808b018d1c8236c40b92f14f5f\"" Feb 9 10:05:32.396787 kubelet[2419]: E0209 10:05:32.396674 2419 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://172.31.25.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-36?timeout=10s": dial tcp 172.31.25.36:6443: connect: connection refused Feb 9 10:05:32.400071 env[1736]: time="2024-02-09T10:05:32.399976658Z" level=info msg="CreateContainer within sandbox \"c5abfa7713c04ae9db8a7622394a372938ce5c808b018d1c8236c40b92f14f5f\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 10:05:32.401133 env[1736]: time="2024-02-09T10:05:32.401048212Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-25-36,Uid:dacb4c777212725a26d5e5c2bb862217,Namespace:kube-system,Attempt:0,} returns sandbox id \"189daea5ad21de27607a7f6393c9d59334357d4b450d88822e8b4c0557494fb4\"" Feb 9 10:05:32.407686 env[1736]: time="2024-02-09T10:05:32.407624935Z" level=info msg="CreateContainer within sandbox \"189daea5ad21de27607a7f6393c9d59334357d4b450d88822e8b4c0557494fb4\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 10:05:32.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.418000 audit: BPF prog-id=78 op=LOAD Feb 9 10:05:32.419000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.419000 audit[2546]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2529 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630343930616637346262383663643030613837393235656264373131 Feb 9 10:05:32.420000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.420000 audit[2546]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2529 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630343930616637346262383663643030613837393235656264373131 Feb 9 10:05:32.420000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.420000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.420000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.420000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.420000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.420000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.420000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.420000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.420000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.420000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.420000 audit: BPF prog-id=79 op=LOAD Feb 9 10:05:32.420000 audit[2546]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2529 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630343930616637346262383663643030613837393235656264373131 Feb 9 10:05:32.420000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.420000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.420000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.420000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.420000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.420000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.420000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.420000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.420000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.420000 audit: BPF prog-id=80 op=LOAD Feb 9 10:05:32.420000 audit[2546]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2529 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630343930616637346262383663643030613837393235656264373131 Feb 9 10:05:32.422000 audit: BPF prog-id=80 op=UNLOAD Feb 9 10:05:32.423000 audit: BPF prog-id=79 op=UNLOAD Feb 9 10:05:32.423000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.423000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.423000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.423000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.423000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.423000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.423000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.423000 audit[2546]: AVC avc: denied { perfmon } for pid=2546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.423000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.423000 audit[2546]: AVC avc: denied { bpf } for pid=2546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.423000 audit: BPF prog-id=81 op=LOAD Feb 9 10:05:32.423000 audit[2546]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2529 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630343930616637346262383663643030613837393235656264373131 Feb 9 10:05:32.439962 env[1736]: time="2024-02-09T10:05:32.439889452Z" level=info msg="CreateContainer within sandbox \"c5abfa7713c04ae9db8a7622394a372938ce5c808b018d1c8236c40b92f14f5f\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"2d519795aa19ae1be81c410ae2fba630cb770828c297df075cd7cddfa02f8966\"" Feb 9 10:05:32.440848 env[1736]: time="2024-02-09T10:05:32.440797732Z" level=info msg="StartContainer for \"2d519795aa19ae1be81c410ae2fba630cb770828c297df075cd7cddfa02f8966\"" Feb 9 10:05:32.444171 env[1736]: time="2024-02-09T10:05:32.444112024Z" level=info msg="CreateContainer within sandbox \"189daea5ad21de27607a7f6393c9d59334357d4b450d88822e8b4c0557494fb4\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"6efbfc1ba96442a99334cb61e1424d3f67ab4137ca48bd5384fcf888dfbf013c\"" Feb 9 10:05:32.444973 env[1736]: time="2024-02-09T10:05:32.444927757Z" level=info msg="StartContainer for \"6efbfc1ba96442a99334cb61e1424d3f67ab4137ca48bd5384fcf888dfbf013c\"" Feb 9 10:05:32.493161 kubelet[2419]: W0209 10:05:32.493099 2419 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.25.36:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.25.36:6443: connect: connection refused Feb 9 10:05:32.493161 kubelet[2419]: E0209 10:05:32.493164 2419 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.25.36:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.25.36:6443: connect: connection refused Feb 9 10:05:32.498382 systemd[1]: Started cri-containerd-6efbfc1ba96442a99334cb61e1424d3f67ab4137ca48bd5384fcf888dfbf013c.scope. Feb 9 10:05:32.508342 kubelet[2419]: I0209 10:05:32.507853 2419 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-25-36" Feb 9 10:05:32.508342 kubelet[2419]: E0209 10:05:32.508308 2419 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.25.36:6443/api/v1/nodes\": dial tcp 172.31.25.36:6443: connect: connection refused" node="ip-172-31-25-36" Feb 9 10:05:32.518128 systemd[1]: Started cri-containerd-2d519795aa19ae1be81c410ae2fba630cb770828c297df075cd7cddfa02f8966.scope. Feb 9 10:05:32.540025 env[1736]: time="2024-02-09T10:05:32.539959189Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-25-36,Uid:3375a63928b7419e936a15a37b4ffbc6,Namespace:kube-system,Attempt:0,} returns sandbox id \"f0490af74bb86cd00a87925ebd711c7e00b81395c2f85b5ec2e722d02ce930f1\"" Feb 9 10:05:32.546633 env[1736]: time="2024-02-09T10:05:32.546565172Z" level=info msg="CreateContainer within sandbox \"f0490af74bb86cd00a87925ebd711c7e00b81395c2f85b5ec2e722d02ce930f1\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 10:05:32.563276 kubelet[2419]: W0209 10:05:32.563159 2419 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.25.36:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-36&limit=500&resourceVersion=0": dial tcp 172.31.25.36:6443: connect: connection refused Feb 9 10:05:32.563276 kubelet[2419]: E0209 10:05:32.563244 2419 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.25.36:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-36&limit=500&resourceVersion=0": dial tcp 172.31.25.36:6443: connect: connection refused Feb 9 10:05:32.570193 env[1736]: time="2024-02-09T10:05:32.570094268Z" level=info msg="CreateContainer within sandbox \"f0490af74bb86cd00a87925ebd711c7e00b81395c2f85b5ec2e722d02ce930f1\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"d1b537e0f6826c6d9446bcd0f2b47d80df1ecffa188cd855fbaa8ecb2a72ac16\"" Feb 9 10:05:32.570969 env[1736]: time="2024-02-09T10:05:32.570899320Z" level=info msg="StartContainer for \"d1b537e0f6826c6d9446bcd0f2b47d80df1ecffa188cd855fbaa8ecb2a72ac16\"" Feb 9 10:05:32.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.583000 audit: BPF prog-id=82 op=LOAD Feb 9 10:05:32.586000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.586000 audit[2615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2507 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665666266633162613936343432613939333334636236316531343234 Feb 9 10:05:32.587000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.587000 audit[2615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2507 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit: BPF prog-id=83 op=LOAD Feb 9 10:05:32.591000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit[2616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2506 pid=2616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264353139373935616131396165316265383163343130616532666261 Feb 9 10:05:32.591000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit[2616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2506 pid=2616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264353139373935616131396165316265383163343130616532666261 Feb 9 10:05:32.591000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.591000 audit: BPF prog-id=84 op=LOAD Feb 9 10:05:32.591000 audit[2616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2506 pid=2616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264353139373935616131396165316265383163343130616532666261 Feb 9 10:05:32.592000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.592000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.592000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.592000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.592000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.592000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.592000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.592000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.592000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.592000 audit: BPF prog-id=85 op=LOAD Feb 9 10:05:32.592000 audit[2616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2506 pid=2616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264353139373935616131396165316265383163343130616532666261 Feb 9 10:05:32.592000 audit: BPF prog-id=85 op=UNLOAD Feb 9 10:05:32.592000 audit: BPF prog-id=84 op=UNLOAD Feb 9 10:05:32.592000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.592000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.592000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.592000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.592000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.592000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.592000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.592000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.592000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.592000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.592000 audit: BPF prog-id=86 op=LOAD Feb 9 10:05:32.592000 audit[2616]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2506 pid=2616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264353139373935616131396165316265383163343130616532666261 Feb 9 10:05:32.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665666266633162613936343432613939333334636236316531343234 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit: BPF prog-id=87 op=LOAD Feb 9 10:05:32.596000 audit[2615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2507 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665666266633162613936343432613939333334636236316531343234 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit: BPF prog-id=88 op=LOAD Feb 9 10:05:32.596000 audit[2615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2507 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665666266633162613936343432613939333334636236316531343234 Feb 9 10:05:32.596000 audit: BPF prog-id=88 op=UNLOAD Feb 9 10:05:32.596000 audit: BPF prog-id=87 op=UNLOAD Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.596000 audit: BPF prog-id=89 op=LOAD Feb 9 10:05:32.596000 audit[2615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2507 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665666266633162613936343432613939333334636236316531343234 Feb 9 10:05:32.638959 systemd[1]: Started cri-containerd-d1b537e0f6826c6d9446bcd0f2b47d80df1ecffa188cd855fbaa8ecb2a72ac16.scope. Feb 9 10:05:32.676134 env[1736]: time="2024-02-09T10:05:32.676071213Z" level=info msg="StartContainer for \"2d519795aa19ae1be81c410ae2fba630cb770828c297df075cd7cddfa02f8966\" returns successfully" Feb 9 10:05:32.700615 env[1736]: time="2024-02-09T10:05:32.700536349Z" level=info msg="StartContainer for \"6efbfc1ba96442a99334cb61e1424d3f67ab4137ca48bd5384fcf888dfbf013c\" returns successfully" Feb 9 10:05:32.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.718000 audit: BPF prog-id=90 op=LOAD Feb 9 10:05:32.718000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.718000 audit[2668]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2529 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431623533376530663638323663366439343436626364306632623437 Feb 9 10:05:32.718000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.718000 audit[2668]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2529 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431623533376530663638323663366439343436626364306632623437 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit: BPF prog-id=91 op=LOAD Feb 9 10:05:32.719000 audit[2668]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2529 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431623533376530663638323663366439343436626364306632623437 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit: BPF prog-id=92 op=LOAD Feb 9 10:05:32.719000 audit[2668]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2529 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431623533376530663638323663366439343436626364306632623437 Feb 9 10:05:32.719000 audit: BPF prog-id=92 op=UNLOAD Feb 9 10:05:32.719000 audit: BPF prog-id=91 op=UNLOAD Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:32.719000 audit: BPF prog-id=93 op=LOAD Feb 9 10:05:32.719000 audit[2668]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2529 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:32.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431623533376530663638323663366439343436626364306632623437 Feb 9 10:05:32.826947 env[1736]: time="2024-02-09T10:05:32.826857107Z" level=info msg="StartContainer for \"d1b537e0f6826c6d9446bcd0f2b47d80df1ecffa188cd855fbaa8ecb2a72ac16\" returns successfully" Feb 9 10:05:33.455453 amazon-ssm-agent[1710]: 2024-02-09 10:05:33 INFO [HealthCheck] HealthCheck reporting agent health. Feb 9 10:05:34.110982 kubelet[2419]: I0209 10:05:34.110949 2419 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-25-36" Feb 9 10:05:36.422000 audit[2646]: AVC avc: denied { watch } for pid=2646 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6531 scontext=system_u:system_r:svirt_lxc_net_t:s0:c956,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:36.425178 kernel: kauditd_printk_skb: 620 callbacks suppressed Feb 9 10:05:36.425290 kernel: audit: type=1400 audit(1707473136.422:748): avc: denied { watch } for pid=2646 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6531 scontext=system_u:system_r:svirt_lxc_net_t:s0:c956,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:36.422000 audit[2646]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40005c80f0 a2=fc6 a3=0 items=0 ppid=2507 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c956,c982 key=(null) Feb 9 10:05:36.451011 kernel: audit: type=1300 audit(1707473136.422:748): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40005c80f0 a2=fc6 a3=0 items=0 ppid=2507 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c956,c982 key=(null) Feb 9 10:05:36.422000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:05:36.464033 kernel: audit: type=1327 audit(1707473136.422:748): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:05:36.422000 audit[2646]: AVC avc: denied { watch } for pid=2646 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c956,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:36.475114 kernel: audit: type=1400 audit(1707473136.422:749): avc: denied { watch } for pid=2646 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c956,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:36.422000 audit[2646]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001296040 a2=fc6 a3=0 items=0 ppid=2507 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c956,c982 key=(null) Feb 9 10:05:36.489057 kernel: audit: type=1300 audit(1707473136.422:749): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001296040 a2=fc6 a3=0 items=0 ppid=2507 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c956,c982 key=(null) Feb 9 10:05:36.422000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:05:36.501201 kernel: audit: type=1327 audit(1707473136.422:749): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:05:37.398000 audit[2654]: AVC avc: denied { watch } for pid=2654 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6531 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c254 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:37.400000 audit[2654]: AVC avc: denied { watch } for pid=2654 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=208 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c254 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:37.419135 kernel: audit: type=1400 audit(1707473137.398:750): avc: denied { watch } for pid=2654 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6531 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c254 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:37.419255 kernel: audit: type=1400 audit(1707473137.400:751): avc: denied { watch } for pid=2654 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=208 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c254 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:37.400000 audit[2654]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=46 a1=400b561680 a2=fc6 a3=0 items=0 ppid=2506 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c254 key=(null) Feb 9 10:05:37.447144 kernel: audit: type=1300 audit(1707473137.400:751): arch=c00000b7 syscall=27 success=no exit=-13 a0=46 a1=400b561680 a2=fc6 a3=0 items=0 ppid=2506 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c254 key=(null) Feb 9 10:05:37.400000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:05:37.465735 update_engine[1727]: I0209 10:05:37.464843 1727 update_attempter.cc:509] Updating boot flags... Feb 9 10:05:37.475812 kernel: audit: type=1327 audit(1707473137.400:751): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:05:37.398000 audit[2654]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=40047b0c90 a2=fc6 a3=0 items=0 ppid=2506 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c254 key=(null) Feb 9 10:05:37.398000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:05:37.408000 audit[2654]: AVC avc: denied { watch } for pid=2654 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c254 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:37.408000 audit[2654]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=40028f0400 a2=fc6 a3=0 items=0 ppid=2506 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c254 key=(null) Feb 9 10:05:37.408000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:05:37.433000 audit[2654]: AVC avc: denied { watch } for pid=2654 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=6533 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c254 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:37.433000 audit[2654]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=55 a1=400b7c4660 a2=fc6 a3=0 items=0 ppid=2506 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c254 key=(null) Feb 9 10:05:37.433000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:05:37.499000 audit[2654]: AVC avc: denied { watch } for pid=2654 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c254 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:37.499000 audit[2654]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4002964360 a2=fc6 a3=0 items=0 ppid=2506 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c254 key=(null) Feb 9 10:05:37.499000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:05:37.500000 audit[2654]: AVC avc: denied { watch } for pid=2654 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6531 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c254 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:05:37.500000 audit[2654]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400b8cd530 a2=fc6 a3=0 items=0 ppid=2506 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c254 key=(null) Feb 9 10:05:37.500000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:05:37.977243 kubelet[2419]: I0209 10:05:37.976899 2419 apiserver.go:52] "Watching apiserver" Feb 9 10:05:38.091494 kubelet[2419]: I0209 10:05:38.091402 2419 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 10:05:38.125681 kubelet[2419]: E0209 10:05:38.125251 2419 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-25-36\" not found" node="ip-172-31-25-36" Feb 9 10:05:38.125681 kubelet[2419]: I0209 10:05:38.125399 2419 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-25-36" Feb 9 10:05:38.140999 kubelet[2419]: E0209 10:05:38.140633 2419 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-36.17b229c41b3fce6f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-36", UID:"ip-172-31-25-36", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-36"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 5, 30, 974334575, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 5, 30, 974334575, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:05:38.150638 kubelet[2419]: I0209 10:05:38.150556 2419 reconciler.go:41] "Reconciler: start to sync state" Feb 9 10:05:38.278533 kubelet[2419]: E0209 10:05:38.278340 2419 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-36.17b229c41b9685f1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-36", UID:"ip-172-31-25-36", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-36"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 5, 30, 980017649, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 5, 30, 980017649, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:05:38.356299 kubelet[2419]: E0209 10:05:38.356105 2419 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-36.17b229c41f8215cb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-36", UID:"ip-172-31-25-36", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ip-172-31-25-36 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-36"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 5, 31, 45787083, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 5, 31, 45787083, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:05:38.415204 kubelet[2419]: E0209 10:05:38.415016 2419 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-36.17b229c41f82bbfe", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-36", UID:"ip-172-31-25-36", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ip-172-31-25-36 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-36"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 5, 31, 45829630, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 5, 31, 45829630, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:05:38.471352 kubelet[2419]: E0209 10:05:38.471127 2419 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-36.17b229c41f82e720", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-36", UID:"ip-172-31-25-36", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ip-172-31-25-36 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-36"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 5, 31, 45840672, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 5, 31, 45840672, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:05:38.531384 kubelet[2419]: E0209 10:05:38.531117 2419 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-36.17b229c41f8215cb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-36", UID:"ip-172-31-25-36", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ip-172-31-25-36 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-36"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 5, 31, 45787083, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 5, 31, 91357537, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:05:38.591623 kubelet[2419]: E0209 10:05:38.591440 2419 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-36.17b229c41f82bbfe", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-36", UID:"ip-172-31-25-36", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ip-172-31-25-36 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-36"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 5, 31, 45829630, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 5, 31, 91365434, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:05:38.657616 kubelet[2419]: E0209 10:05:38.657491 2419 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-36.17b229c41f82e720", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-36", UID:"ip-172-31-25-36", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ip-172-31-25-36 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-36"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 5, 31, 45840672, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 5, 31, 91371459, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:05:38.713738 kubelet[2419]: E0209 10:05:38.713599 2419 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-36.17b229c4236dbb90", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-36", UID:"ip-172-31-25-36", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-36"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 5, 31, 111562128, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 5, 31, 111562128, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:05:38.796048 kubelet[2419]: E0209 10:05:38.795740 2419 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-36.17b229c41f8215cb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-36", UID:"ip-172-31-25-36", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ip-172-31-25-36 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-36"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 5, 31, 45787083, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 5, 31, 264931957, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:05:39.197268 kubelet[2419]: E0209 10:05:39.197063 2419 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-36.17b229c41f82bbfe", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-36", UID:"ip-172-31-25-36", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ip-172-31-25-36 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-36"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 5, 31, 45829630, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 5, 31, 264941186, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:05:40.716177 systemd[1]: Reloading. Feb 9 10:05:40.861973 /usr/lib/systemd/system-generators/torcx-generator[2924]: time="2024-02-09T10:05:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:05:40.862580 /usr/lib/systemd/system-generators/torcx-generator[2924]: time="2024-02-09T10:05:40Z" level=info msg="torcx already run" Feb 9 10:05:41.090431 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:05:41.090470 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:05:41.147505 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:05:41.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.332000 audit: BPF prog-id=94 op=LOAD Feb 9 10:05:41.332000 audit: BPF prog-id=55 op=UNLOAD Feb 9 10:05:41.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.332000 audit: BPF prog-id=95 op=LOAD Feb 9 10:05:41.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.332000 audit: BPF prog-id=96 op=LOAD Feb 9 10:05:41.332000 audit: BPF prog-id=56 op=UNLOAD Feb 9 10:05:41.332000 audit: BPF prog-id=57 op=UNLOAD Feb 9 10:05:41.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.335000 audit: BPF prog-id=97 op=LOAD Feb 9 10:05:41.335000 audit: BPF prog-id=58 op=UNLOAD Feb 9 10:05:41.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.335000 audit: BPF prog-id=98 op=LOAD Feb 9 10:05:41.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.336000 audit: BPF prog-id=99 op=LOAD Feb 9 10:05:41.336000 audit: BPF prog-id=59 op=UNLOAD Feb 9 10:05:41.336000 audit: BPF prog-id=60 op=UNLOAD Feb 9 10:05:41.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.342000 audit: BPF prog-id=100 op=LOAD Feb 9 10:05:41.342000 audit: BPF prog-id=61 op=UNLOAD Feb 9 10:05:41.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.349000 audit: BPF prog-id=101 op=LOAD Feb 9 10:05:41.349000 audit: BPF prog-id=62 op=UNLOAD Feb 9 10:05:41.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.351000 audit: BPF prog-id=102 op=LOAD Feb 9 10:05:41.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.351000 audit: BPF prog-id=103 op=LOAD Feb 9 10:05:41.351000 audit: BPF prog-id=63 op=UNLOAD Feb 9 10:05:41.351000 audit: BPF prog-id=64 op=UNLOAD Feb 9 10:05:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.352000 audit: BPF prog-id=104 op=LOAD Feb 9 10:05:41.352000 audit: BPF prog-id=83 op=UNLOAD Feb 9 10:05:41.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.354000 audit: BPF prog-id=105 op=LOAD Feb 9 10:05:41.354000 audit: BPF prog-id=65 op=UNLOAD Feb 9 10:05:41.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.357000 audit: BPF prog-id=106 op=LOAD Feb 9 10:05:41.357000 audit: BPF prog-id=78 op=UNLOAD Feb 9 10:05:41.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.359000 audit: BPF prog-id=107 op=LOAD Feb 9 10:05:41.359000 audit: BPF prog-id=74 op=UNLOAD Feb 9 10:05:41.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.366000 audit: BPF prog-id=108 op=LOAD Feb 9 10:05:41.366000 audit: BPF prog-id=66 op=UNLOAD Feb 9 10:05:41.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.366000 audit: BPF prog-id=109 op=LOAD Feb 9 10:05:41.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.366000 audit: BPF prog-id=110 op=LOAD Feb 9 10:05:41.366000 audit: BPF prog-id=67 op=UNLOAD Feb 9 10:05:41.367000 audit: BPF prog-id=68 op=UNLOAD Feb 9 10:05:41.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.368000 audit: BPF prog-id=111 op=LOAD Feb 9 10:05:41.368000 audit: BPF prog-id=82 op=UNLOAD Feb 9 10:05:41.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.370000 audit: BPF prog-id=112 op=LOAD Feb 9 10:05:41.370000 audit: BPF prog-id=90 op=UNLOAD Feb 9 10:05:41.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.372000 audit: BPF prog-id=113 op=LOAD Feb 9 10:05:41.372000 audit: BPF prog-id=70 op=UNLOAD Feb 9 10:05:41.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.375000 audit: BPF prog-id=114 op=LOAD Feb 9 10:05:41.375000 audit: BPF prog-id=69 op=UNLOAD Feb 9 10:05:41.405904 kubelet[2419]: I0209 10:05:41.404350 2419 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 10:05:41.404934 systemd[1]: Stopping kubelet.service... Feb 9 10:05:41.429097 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 10:05:41.429554 systemd[1]: Stopped kubelet.service. Feb 9 10:05:41.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:41.431628 kernel: kauditd_printk_skb: 258 callbacks suppressed Feb 9 10:05:41.431685 kernel: audit: type=1131 audit(1707473141.427:1000): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:41.439195 systemd[1]: kubelet.service: Consumed 2.577s CPU time. Feb 9 10:05:41.442839 systemd[1]: Started kubelet.service. Feb 9 10:05:41.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:41.459824 kernel: audit: type=1130 audit(1707473141.443:1001): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:41.594043 kubelet[2981]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 10:05:41.594043 kubelet[2981]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:05:41.594650 kubelet[2981]: I0209 10:05:41.594202 2981 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 10:05:41.599563 kubelet[2981]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 10:05:41.603217 kubelet[2981]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:05:41.614370 kubelet[2981]: I0209 10:05:41.614310 2981 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 10:05:41.614370 kubelet[2981]: I0209 10:05:41.614358 2981 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 10:05:41.614798 kubelet[2981]: I0209 10:05:41.614753 2981 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 10:05:41.620832 kubelet[2981]: I0209 10:05:41.617335 2981 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 10:05:41.622683 kubelet[2981]: W0209 10:05:41.622638 2981 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 10:05:41.624676 kubelet[2981]: I0209 10:05:41.623185 2981 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 10:05:41.624676 kubelet[2981]: I0209 10:05:41.624400 2981 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 10:05:41.624894 kubelet[2981]: I0209 10:05:41.624799 2981 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 10:05:41.624987 kubelet[2981]: I0209 10:05:41.624911 2981 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 10:05:41.624987 kubelet[2981]: I0209 10:05:41.624947 2981 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 10:05:41.624987 kubelet[2981]: I0209 10:05:41.624973 2981 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 10:05:41.625217 kubelet[2981]: I0209 10:05:41.625026 2981 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:05:41.631991 kubelet[2981]: I0209 10:05:41.631918 2981 kubelet.go:398] "Attempting to sync node with API server" Feb 9 10:05:41.631991 kubelet[2981]: I0209 10:05:41.631973 2981 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 10:05:41.632225 kubelet[2981]: I0209 10:05:41.632023 2981 kubelet.go:297] "Adding apiserver pod source" Feb 9 10:05:41.632225 kubelet[2981]: I0209 10:05:41.632046 2981 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 10:05:41.633925 kubelet[2981]: I0209 10:05:41.633876 2981 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 10:05:41.634620 kubelet[2981]: I0209 10:05:41.634589 2981 server.go:1186] "Started kubelet" Feb 9 10:05:41.639000 audit[2981]: AVC avc: denied { mac_admin } for pid=2981 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.649508 kubelet[2981]: I0209 10:05:41.641594 2981 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 10:05:41.649508 kubelet[2981]: I0209 10:05:41.641661 2981 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 10:05:41.649508 kubelet[2981]: I0209 10:05:41.641706 2981 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 10:05:41.653802 kubelet[2981]: E0209 10:05:41.652232 2981 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 10:05:41.653802 kubelet[2981]: E0209 10:05:41.652284 2981 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 10:05:41.655934 kubelet[2981]: I0209 10:05:41.655894 2981 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 10:05:41.639000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:05:41.662164 kernel: audit: type=1400 audit(1707473141.639:1002): avc: denied { mac_admin } for pid=2981 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.662297 kernel: audit: type=1401 audit(1707473141.639:1002): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:05:41.662342 kubelet[2981]: I0209 10:05:41.661079 2981 server.go:451] "Adding debug handlers to kubelet server" Feb 9 10:05:41.639000 audit[2981]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c27fb0 a1=4000b57b00 a2=4000c27f80 a3=25 items=0 ppid=1 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:41.678148 kubelet[2981]: I0209 10:05:41.678110 2981 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 10:05:41.679054 kubelet[2981]: I0209 10:05:41.679022 2981 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 10:05:41.712845 kernel: audit: type=1300 audit(1707473141.639:1002): arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c27fb0 a1=4000b57b00 a2=4000c27f80 a3=25 items=0 ppid=1 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:41.712967 kernel: audit: type=1327 audit(1707473141.639:1002): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:05:41.639000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:05:41.639000 audit[2981]: AVC avc: denied { mac_admin } for pid=2981 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.725545 kernel: audit: type=1400 audit(1707473141.639:1003): avc: denied { mac_admin } for pid=2981 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.639000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:05:41.733247 kernel: audit: type=1401 audit(1707473141.639:1003): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:05:41.639000 audit[2981]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bc16e0 a1=4000b57b18 a2=4000ddc060 a3=25 items=0 ppid=1 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:41.746521 kernel: audit: type=1300 audit(1707473141.639:1003): arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bc16e0 a1=4000b57b18 a2=4000ddc060 a3=25 items=0 ppid=1 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:41.639000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:05:41.758967 kernel: audit: type=1327 audit(1707473141.639:1003): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:05:41.824596 kubelet[2981]: I0209 10:05:41.824557 2981 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-25-36" Feb 9 10:05:41.853814 kubelet[2981]: I0209 10:05:41.848098 2981 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-25-36" Feb 9 10:05:41.853814 kubelet[2981]: I0209 10:05:41.848953 2981 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-25-36" Feb 9 10:05:41.931564 kubelet[2981]: I0209 10:05:41.931531 2981 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 10:05:41.973760 kubelet[2981]: I0209 10:05:41.973725 2981 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 10:05:41.974041 kubelet[2981]: I0209 10:05:41.974018 2981 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 10:05:41.975979 kubelet[2981]: I0209 10:05:41.975930 2981 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 10:05:41.976154 kubelet[2981]: E0209 10:05:41.976039 2981 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 10:05:41.983098 kubelet[2981]: I0209 10:05:41.983062 2981 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 10:05:41.983292 kubelet[2981]: I0209 10:05:41.983271 2981 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 10:05:41.983456 kubelet[2981]: I0209 10:05:41.983435 2981 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:05:41.983840 kubelet[2981]: I0209 10:05:41.983817 2981 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 10:05:41.984015 kubelet[2981]: I0209 10:05:41.983995 2981 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 10:05:41.984162 kubelet[2981]: I0209 10:05:41.984142 2981 policy_none.go:49] "None policy: Start" Feb 9 10:05:41.989159 kubelet[2981]: I0209 10:05:41.989125 2981 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 10:05:41.989465 kubelet[2981]: I0209 10:05:41.989444 2981 state_mem.go:35] "Initializing new in-memory state store" Feb 9 10:05:41.990749 kubelet[2981]: I0209 10:05:41.990698 2981 state_mem.go:75] "Updated machine memory state" Feb 9 10:05:42.001340 kubelet[2981]: I0209 10:05:42.001307 2981 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 10:05:41.999000 audit[2981]: AVC avc: denied { mac_admin } for pid=2981 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:05:41.999000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:05:41.999000 audit[2981]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4001391980 a1=40013fefc0 a2=4001391950 a3=25 items=0 ppid=1 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:05:41.999000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:05:42.004964 kubelet[2981]: I0209 10:05:42.004930 2981 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 10:05:42.005821 kubelet[2981]: I0209 10:05:42.005795 2981 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 10:05:42.078815 kubelet[2981]: I0209 10:05:42.076942 2981 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:05:42.078815 kubelet[2981]: I0209 10:05:42.077068 2981 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:05:42.078815 kubelet[2981]: I0209 10:05:42.077131 2981 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:05:42.083255 kubelet[2981]: I0209 10:05:42.083198 2981 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3375a63928b7419e936a15a37b4ffbc6-kubeconfig\") pod \"kube-scheduler-ip-172-31-25-36\" (UID: \"3375a63928b7419e936a15a37b4ffbc6\") " pod="kube-system/kube-scheduler-ip-172-31-25-36" Feb 9 10:05:42.083692 kubelet[2981]: I0209 10:05:42.083658 2981 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/32434eabc2c0f9e92f410a6cee152c0f-ca-certs\") pod \"kube-apiserver-ip-172-31-25-36\" (UID: \"32434eabc2c0f9e92f410a6cee152c0f\") " pod="kube-system/kube-apiserver-ip-172-31-25-36" Feb 9 10:05:42.083963 kubelet[2981]: I0209 10:05:42.083940 2981 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/32434eabc2c0f9e92f410a6cee152c0f-k8s-certs\") pod \"kube-apiserver-ip-172-31-25-36\" (UID: \"32434eabc2c0f9e92f410a6cee152c0f\") " pod="kube-system/kube-apiserver-ip-172-31-25-36" Feb 9 10:05:42.084125 kubelet[2981]: I0209 10:05:42.084103 2981 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/dacb4c777212725a26d5e5c2bb862217-ca-certs\") pod \"kube-controller-manager-ip-172-31-25-36\" (UID: \"dacb4c777212725a26d5e5c2bb862217\") " pod="kube-system/kube-controller-manager-ip-172-31-25-36" Feb 9 10:05:42.084286 kubelet[2981]: I0209 10:05:42.084264 2981 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/dacb4c777212725a26d5e5c2bb862217-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-25-36\" (UID: \"dacb4c777212725a26d5e5c2bb862217\") " pod="kube-system/kube-controller-manager-ip-172-31-25-36" Feb 9 10:05:42.084441 kubelet[2981]: I0209 10:05:42.084420 2981 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/dacb4c777212725a26d5e5c2bb862217-k8s-certs\") pod \"kube-controller-manager-ip-172-31-25-36\" (UID: \"dacb4c777212725a26d5e5c2bb862217\") " pod="kube-system/kube-controller-manager-ip-172-31-25-36" Feb 9 10:05:42.084605 kubelet[2981]: I0209 10:05:42.084575 2981 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/dacb4c777212725a26d5e5c2bb862217-kubeconfig\") pod \"kube-controller-manager-ip-172-31-25-36\" (UID: \"dacb4c777212725a26d5e5c2bb862217\") " pod="kube-system/kube-controller-manager-ip-172-31-25-36" Feb 9 10:05:42.084803 kubelet[2981]: I0209 10:05:42.084759 2981 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/dacb4c777212725a26d5e5c2bb862217-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-25-36\" (UID: \"dacb4c777212725a26d5e5c2bb862217\") " pod="kube-system/kube-controller-manager-ip-172-31-25-36" Feb 9 10:05:42.084979 kubelet[2981]: I0209 10:05:42.084959 2981 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/32434eabc2c0f9e92f410a6cee152c0f-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-25-36\" (UID: \"32434eabc2c0f9e92f410a6cee152c0f\") " pod="kube-system/kube-apiserver-ip-172-31-25-36" Feb 9 10:05:42.101336 kubelet[2981]: E0209 10:05:42.101279 2981 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-25-36\" already exists" pod="kube-system/kube-apiserver-ip-172-31-25-36" Feb 9 10:05:42.649177 kubelet[2981]: I0209 10:05:42.649135 2981 apiserver.go:52] "Watching apiserver" Feb 9 10:05:42.680017 kubelet[2981]: I0209 10:05:42.679971 2981 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 10:05:42.688631 kubelet[2981]: I0209 10:05:42.688540 2981 reconciler.go:41] "Reconciler: start to sync state" Feb 9 10:05:43.043338 kubelet[2981]: E0209 10:05:43.043304 2981 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-25-36\" already exists" pod="kube-system/kube-apiserver-ip-172-31-25-36" Feb 9 10:05:43.239189 kubelet[2981]: E0209 10:05:43.239149 2981 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-25-36\" already exists" pod="kube-system/kube-scheduler-ip-172-31-25-36" Feb 9 10:05:43.453785 kubelet[2981]: I0209 10:05:43.453573 2981 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-25-36" podStartSLOduration=1.453521547 pod.CreationTimestamp="2024-02-09 10:05:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:05:43.453278164 +0000 UTC m=+1.997740802" watchObservedRunningTime="2024-02-09 10:05:43.453521547 +0000 UTC m=+1.997984161" Feb 9 10:05:45.325165 sudo[2012]: pam_unix(sudo:session): session closed for user root Feb 9 10:05:45.324000 audit[2012]: USER_END pid=2012 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:05:45.324000 audit[2012]: CRED_DISP pid=2012 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:05:45.348907 sshd[2009]: pam_unix(sshd:session): session closed for user core Feb 9 10:05:45.350000 audit[2009]: USER_END pid=2009 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 10:05:45.350000 audit[2009]: CRED_DISP pid=2009 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 10:05:45.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.25.36:22-139.178.89.65:40790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:05:45.355053 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 10:05:45.355451 systemd[1]: session-7.scope: Consumed 9.008s CPU time. Feb 9 10:05:45.356303 systemd[1]: sshd@6-172.31.25.36:22-139.178.89.65:40790.service: Deactivated successfully. Feb 9 10:05:45.358912 systemd-logind[1723]: Session 7 logged out. Waiting for processes to exit. Feb 9 10:05:45.362164 systemd-logind[1723]: Removed session 7. Feb 9 10:05:47.204424 amazon-ssm-agent[1710]: 2024-02-09 10:05:47 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Feb 9 10:05:47.246468 kubelet[2981]: I0209 10:05:47.246422 2981 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-25-36" podStartSLOduration=5.246371884 pod.CreationTimestamp="2024-02-09 10:05:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:05:44.114335446 +0000 UTC m=+2.658798060" watchObservedRunningTime="2024-02-09 10:05:47.246371884 +0000 UTC m=+5.790834570" Feb 9 10:05:58.993274 systemd[1]: cri-containerd-6efbfc1ba96442a99334cb61e1424d3f67ab4137ca48bd5384fcf888dfbf013c.scope: Deactivated successfully. Feb 9 10:05:58.993892 systemd[1]: cri-containerd-6efbfc1ba96442a99334cb61e1424d3f67ab4137ca48bd5384fcf888dfbf013c.scope: Consumed 2.879s CPU time. Feb 9 10:05:58.996000 audit: BPF prog-id=89 op=UNLOAD Feb 9 10:05:58.999295 kernel: kauditd_printk_skb: 9 callbacks suppressed Feb 9 10:05:58.999438 kernel: audit: type=1334 audit(1707473158.996:1010): prog-id=89 op=UNLOAD Feb 9 10:05:58.996000 audit: BPF prog-id=111 op=UNLOAD Feb 9 10:05:59.004862 kernel: audit: type=1334 audit(1707473158.996:1011): prog-id=111 op=UNLOAD Feb 9 10:05:59.036962 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6efbfc1ba96442a99334cb61e1424d3f67ab4137ca48bd5384fcf888dfbf013c-rootfs.mount: Deactivated successfully. Feb 9 10:05:59.049866 env[1736]: time="2024-02-09T10:05:59.049798495Z" level=info msg="shim disconnected" id=6efbfc1ba96442a99334cb61e1424d3f67ab4137ca48bd5384fcf888dfbf013c Feb 9 10:05:59.050660 env[1736]: time="2024-02-09T10:05:59.050605024Z" level=warning msg="cleaning up after shim disconnected" id=6efbfc1ba96442a99334cb61e1424d3f67ab4137ca48bd5384fcf888dfbf013c namespace=k8s.io Feb 9 10:05:59.050660 env[1736]: time="2024-02-09T10:05:59.050649451Z" level=info msg="cleaning up dead shim" Feb 9 10:05:59.065642 env[1736]: time="2024-02-09T10:05:59.065560680Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:05:59Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3064 runtime=io.containerd.runc.v2\n" Feb 9 10:06:00.060854 kubelet[2981]: I0209 10:06:00.060810 2981 scope.go:115] "RemoveContainer" containerID="6efbfc1ba96442a99334cb61e1424d3f67ab4137ca48bd5384fcf888dfbf013c" Feb 9 10:06:00.064607 env[1736]: time="2024-02-09T10:06:00.064553182Z" level=info msg="CreateContainer within sandbox \"189daea5ad21de27607a7f6393c9d59334357d4b450d88822e8b4c0557494fb4\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 9 10:06:00.091303 env[1736]: time="2024-02-09T10:06:00.091219955Z" level=info msg="CreateContainer within sandbox \"189daea5ad21de27607a7f6393c9d59334357d4b450d88822e8b4c0557494fb4\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"d385fa8f8afd965dd588104748170cc60f3397af93cb915ffa9d28d186ef052c\"" Feb 9 10:06:00.092147 env[1736]: time="2024-02-09T10:06:00.092085130Z" level=info msg="StartContainer for \"d385fa8f8afd965dd588104748170cc60f3397af93cb915ffa9d28d186ef052c\"" Feb 9 10:06:00.126344 systemd[1]: Started cri-containerd-d385fa8f8afd965dd588104748170cc60f3397af93cb915ffa9d28d186ef052c.scope. Feb 9 10:06:00.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.186230 kernel: audit: type=1400 audit(1707473160.170:1012): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.186396 kernel: audit: type=1400 audit(1707473160.178:1013): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.194120 kernel: audit: type=1400 audit(1707473160.178:1014): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.194264 kernel: audit: type=1400 audit(1707473160.178:1015): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.201835 kernel: audit: type=1400 audit(1707473160.178:1016): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.216751 kernel: audit: type=1400 audit(1707473160.178:1017): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.225675 kernel: audit: type=1400 audit(1707473160.178:1018): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.241328 kernel: audit: type=1400 audit(1707473160.178:1019): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.185000 audit: BPF prog-id=115 op=LOAD Feb 9 10:06:00.186000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.186000 audit[3084]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2507 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:06:00.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433383566613866386166643936356464353838313034373438313730 Feb 9 10:06:00.186000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.186000 audit[3084]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2507 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:06:00.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433383566613866386166643936356464353838313034373438313730 Feb 9 10:06:00.186000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.186000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.186000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.186000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.186000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.186000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.186000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.186000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.186000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.186000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.186000 audit: BPF prog-id=116 op=LOAD Feb 9 10:06:00.186000 audit[3084]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2507 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:06:00.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433383566613866386166643936356464353838313034373438313730 Feb 9 10:06:00.193000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.193000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.193000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.193000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.193000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.193000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.193000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.193000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.193000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.193000 audit: BPF prog-id=117 op=LOAD Feb 9 10:06:00.193000 audit[3084]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2507 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:06:00.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433383566613866386166643936356464353838313034373438313730 Feb 9 10:06:00.201000 audit: BPF prog-id=117 op=UNLOAD Feb 9 10:06:00.201000 audit: BPF prog-id=116 op=UNLOAD Feb 9 10:06:00.201000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.201000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.201000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.201000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.201000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.201000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.201000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.201000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.201000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.201000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:00.201000 audit: BPF prog-id=118 op=LOAD Feb 9 10:06:00.201000 audit[3084]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2507 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:06:00.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433383566613866386166643936356464353838313034373438313730 Feb 9 10:06:00.272350 env[1736]: time="2024-02-09T10:06:00.272226166Z" level=info msg="StartContainer for \"d385fa8f8afd965dd588104748170cc60f3397af93cb915ffa9d28d186ef052c\" returns successfully" Feb 9 10:06:01.918698 kubelet[2981]: E0209 10:06:01.918636 2981 controller.go:189] failed to update lease, error: Put "https://172.31.25.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-36?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 10:06:02.045851 kubelet[2981]: E0209 10:06:02.045813 2981 kubelet_node_status.go:540] "Error updating node status, will retry" err="failed to patch status \"{\\\"status\\\":{\\\"$setElementOrder/conditions\\\":[{\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"type\\\":\\\"DiskPressure\\\"},{\\\"type\\\":\\\"PIDPressure\\\"},{\\\"type\\\":\\\"Ready\\\"}],\\\"allocatable\\\":{\\\"ephemeral-storage\\\":\\\"5078580011\\\"},\\\"conditions\\\":[{\\\"lastHeartbeatTime\\\":\\\"2024-02-09T10:05:52Z\\\",\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2024-02-09T10:05:52Z\\\",\\\"type\\\":\\\"DiskPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2024-02-09T10:05:52Z\\\",\\\"type\\\":\\\"PIDPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2024-02-09T10:05:52Z\\\",\\\"message\\\":\\\"container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized\\\",\\\"type\\\":\\\"Ready\\\"}]}}\" for node \"ip-172-31-25-36\": Patch \"https://172.31.25.36:6443/api/v1/nodes/ip-172-31-25-36/status?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 10:06:02.524000 audit[3095]: AVC avc: denied { watch } for pid=3095 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6531 scontext=system_u:system_r:svirt_lxc_net_t:s0:c956,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:06:02.524000 audit[3095]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000f4a000 a2=fc6 a3=0 items=0 ppid=2507 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c956,c982 key=(null) Feb 9 10:06:02.524000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:06:02.525000 audit[3095]: AVC avc: denied { watch } for pid=3095 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c956,c982 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:06:02.525000 audit[3095]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000f36040 a2=fc6 a3=0 items=0 ppid=2507 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c956,c982 key=(null) Feb 9 10:06:02.525000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:06:04.861657 systemd[1]: cri-containerd-d1b537e0f6826c6d9446bcd0f2b47d80df1ecffa188cd855fbaa8ecb2a72ac16.scope: Deactivated successfully. Feb 9 10:06:04.862206 systemd[1]: cri-containerd-d1b537e0f6826c6d9446bcd0f2b47d80df1ecffa188cd855fbaa8ecb2a72ac16.scope: Consumed 2.164s CPU time. Feb 9 10:06:04.865000 audit: BPF prog-id=93 op=UNLOAD Feb 9 10:06:04.868121 kernel: kauditd_printk_skb: 55 callbacks suppressed Feb 9 10:06:04.868200 kernel: audit: type=1334 audit(1707473164.865:1032): prog-id=93 op=UNLOAD Feb 9 10:06:04.874800 kernel: audit: type=1334 audit(1707473164.865:1033): prog-id=112 op=UNLOAD Feb 9 10:06:04.865000 audit: BPF prog-id=112 op=UNLOAD Feb 9 10:06:04.903590 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d1b537e0f6826c6d9446bcd0f2b47d80df1ecffa188cd855fbaa8ecb2a72ac16-rootfs.mount: Deactivated successfully. Feb 9 10:06:04.929062 env[1736]: time="2024-02-09T10:06:04.928989887Z" level=info msg="shim disconnected" id=d1b537e0f6826c6d9446bcd0f2b47d80df1ecffa188cd855fbaa8ecb2a72ac16 Feb 9 10:06:04.929724 env[1736]: time="2024-02-09T10:06:04.929059238Z" level=warning msg="cleaning up after shim disconnected" id=d1b537e0f6826c6d9446bcd0f2b47d80df1ecffa188cd855fbaa8ecb2a72ac16 namespace=k8s.io Feb 9 10:06:04.929724 env[1736]: time="2024-02-09T10:06:04.929082459Z" level=info msg="cleaning up dead shim" Feb 9 10:06:04.942902 env[1736]: time="2024-02-09T10:06:04.942835636Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:06:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3123 runtime=io.containerd.runc.v2\n" Feb 9 10:06:05.077713 kubelet[2981]: I0209 10:06:05.077021 2981 scope.go:115] "RemoveContainer" containerID="d1b537e0f6826c6d9446bcd0f2b47d80df1ecffa188cd855fbaa8ecb2a72ac16" Feb 9 10:06:05.080430 env[1736]: time="2024-02-09T10:06:05.080354357Z" level=info msg="CreateContainer within sandbox \"f0490af74bb86cd00a87925ebd711c7e00b81395c2f85b5ec2e722d02ce930f1\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 9 10:06:05.098508 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3561063688.mount: Deactivated successfully. Feb 9 10:06:05.110308 env[1736]: time="2024-02-09T10:06:05.110227475Z" level=info msg="CreateContainer within sandbox \"f0490af74bb86cd00a87925ebd711c7e00b81395c2f85b5ec2e722d02ce930f1\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"0b62084828ac33b4388ad7f0f5bc02f60b5d22f2cf61f479765336c0b3f0ad9a\"" Feb 9 10:06:05.111007 env[1736]: time="2024-02-09T10:06:05.110944270Z" level=info msg="StartContainer for \"0b62084828ac33b4388ad7f0f5bc02f60b5d22f2cf61f479765336c0b3f0ad9a\"" Feb 9 10:06:05.146932 systemd[1]: Started cri-containerd-0b62084828ac33b4388ad7f0f5bc02f60b5d22f2cf61f479765336c0b3f0ad9a.scope. Feb 9 10:06:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197458 kernel: audit: type=1400 audit(1707473165.181:1034): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197567 kernel: audit: type=1400 audit(1707473165.181:1035): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.206325 kernel: audit: type=1400 audit(1707473165.181:1036): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.232368 kernel: audit: type=1400 audit(1707473165.181:1037): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.232468 kernel: audit: type=1400 audit(1707473165.181:1038): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.248075 kernel: audit: type=1400 audit(1707473165.181:1039): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.248191 kernel: audit: type=1400 audit(1707473165.181:1040): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.255968 kernel: audit: type=1400 audit(1707473165.181:1041): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.189000 audit: BPF prog-id=119 op=LOAD Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2529 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:06:05.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062363230383438323861633333623433383861643766306635626330 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2529 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:06:05.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062363230383438323861633333623433383861643766306635626330 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit: BPF prog-id=120 op=LOAD Feb 9 10:06:05.197000 audit[3144]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2529 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:06:05.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062363230383438323861633333623433383861643766306635626330 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit: BPF prog-id=121 op=LOAD Feb 9 10:06:05.197000 audit[3144]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2529 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:06:05.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062363230383438323861633333623433383861643766306635626330 Feb 9 10:06:05.197000 audit: BPF prog-id=121 op=UNLOAD Feb 9 10:06:05.197000 audit: BPF prog-id=120 op=UNLOAD Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:06:05.197000 audit: BPF prog-id=122 op=LOAD Feb 9 10:06:05.197000 audit[3144]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2529 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:06:05.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062363230383438323861633333623433383861643766306635626330 Feb 9 10:06:05.289810 env[1736]: time="2024-02-09T10:06:05.289719567Z" level=info msg="StartContainer for \"0b62084828ac33b4388ad7f0f5bc02f60b5d22f2cf61f479765336c0b3f0ad9a\" returns successfully" Feb 9 10:06:11.919402 kubelet[2981]: E0209 10:06:11.918871 2981 controller.go:189] failed to update lease, error: Put "https://172.31.25.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-36?timeout=10s": context deadline exceeded Feb 9 10:06:12.047407 kubelet[2981]: E0209 10:06:12.047355 2981 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"ip-172-31-25-36\": Get \"https://172.31.25.36:6443/api/v1/nodes/ip-172-31-25-36?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"