Oct 2 19:44:55.789451 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:44:55.789475 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:44:55.789486 kernel: BIOS-provided physical RAM map: Oct 2 19:44:55.789495 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 2 19:44:55.789502 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 2 19:44:55.789510 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 2 19:44:55.789519 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdcfff] usable Oct 2 19:44:55.789527 kernel: BIOS-e820: [mem 0x000000009cfdd000-0x000000009cffffff] reserved Oct 2 19:44:55.789537 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Oct 2 19:44:55.789545 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 2 19:44:55.789553 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Oct 2 19:44:55.789561 kernel: NX (Execute Disable) protection: active Oct 2 19:44:55.789568 kernel: SMBIOS 2.8 present. Oct 2 19:44:55.789576 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Oct 2 19:44:55.789588 kernel: Hypervisor detected: KVM Oct 2 19:44:55.789597 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 2 19:44:55.789605 kernel: kvm-clock: cpu 0, msr 59f8a001, primary cpu clock Oct 2 19:44:55.789613 kernel: kvm-clock: using sched offset of 2127794244 cycles Oct 2 19:44:55.789622 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 2 19:44:55.789630 kernel: tsc: Detected 2794.748 MHz processor Oct 2 19:44:55.789639 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:44:55.789648 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:44:55.789657 kernel: last_pfn = 0x9cfdd max_arch_pfn = 0x400000000 Oct 2 19:44:55.789667 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:44:55.789676 kernel: Using GB pages for direct mapping Oct 2 19:44:55.789685 kernel: ACPI: Early table checksum verification disabled Oct 2 19:44:55.789694 kernel: ACPI: RSDP 0x00000000000F59C0 000014 (v00 BOCHS ) Oct 2 19:44:55.789703 kernel: ACPI: RSDT 0x000000009CFE1BDD 000034 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:44:55.789712 kernel: ACPI: FACP 0x000000009CFE1A79 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:44:55.789721 kernel: ACPI: DSDT 0x000000009CFE0040 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:44:55.789729 kernel: ACPI: FACS 0x000000009CFE0000 000040 Oct 2 19:44:55.789738 kernel: ACPI: APIC 0x000000009CFE1AED 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:44:55.789748 kernel: ACPI: HPET 0x000000009CFE1B7D 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:44:55.789758 kernel: ACPI: WAET 0x000000009CFE1BB5 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:44:55.789766 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe1a79-0x9cfe1aec] Oct 2 19:44:55.789775 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe1a78] Oct 2 19:44:55.789784 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Oct 2 19:44:55.789792 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe1aed-0x9cfe1b7c] Oct 2 19:44:55.789800 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe1b7d-0x9cfe1bb4] Oct 2 19:44:55.789809 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe1bb5-0x9cfe1bdc] Oct 2 19:44:55.789821 kernel: No NUMA configuration found Oct 2 19:44:55.789831 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdcfff] Oct 2 19:44:55.789840 kernel: NODE_DATA(0) allocated [mem 0x9cfd7000-0x9cfdcfff] Oct 2 19:44:55.789849 kernel: Zone ranges: Oct 2 19:44:55.789858 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:44:55.789867 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdcfff] Oct 2 19:44:55.789878 kernel: Normal empty Oct 2 19:44:55.789895 kernel: Movable zone start for each node Oct 2 19:44:55.789904 kernel: Early memory node ranges Oct 2 19:44:55.789913 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 2 19:44:55.789922 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdcfff] Oct 2 19:44:55.789932 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdcfff] Oct 2 19:44:55.789941 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:44:55.789950 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 2 19:44:55.789959 kernel: On node 0, zone DMA32: 12323 pages in unavailable ranges Oct 2 19:44:55.789970 kernel: ACPI: PM-Timer IO Port: 0x608 Oct 2 19:44:55.789980 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 2 19:44:55.789989 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 2 19:44:55.789998 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 2 19:44:55.790007 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 2 19:44:55.790016 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:44:55.790025 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 2 19:44:55.790034 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 2 19:44:55.790043 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:44:55.790054 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Oct 2 19:44:55.790064 kernel: TSC deadline timer available Oct 2 19:44:55.790073 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Oct 2 19:44:55.790082 kernel: kvm-guest: KVM setup pv remote TLB flush Oct 2 19:44:55.790091 kernel: kvm-guest: setup PV sched yield Oct 2 19:44:55.790101 kernel: [mem 0x9d000000-0xfeffbfff] available for PCI devices Oct 2 19:44:55.790110 kernel: Booting paravirtualized kernel on KVM Oct 2 19:44:55.790119 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:44:55.790129 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Oct 2 19:44:55.790140 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u524288 Oct 2 19:44:55.790150 kernel: pcpu-alloc: s185624 r8192 d31464 u524288 alloc=1*2097152 Oct 2 19:44:55.790184 kernel: pcpu-alloc: [0] 0 1 2 3 Oct 2 19:44:55.790193 kernel: kvm-guest: setup async PF for cpu 0 Oct 2 19:44:55.790202 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Oct 2 19:44:55.790210 kernel: kvm-guest: PV spinlocks enabled Oct 2 19:44:55.790219 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 2 19:44:55.790229 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632733 Oct 2 19:44:55.790238 kernel: Policy zone: DMA32 Oct 2 19:44:55.790249 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:44:55.790261 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:44:55.790271 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 2 19:44:55.790280 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 19:44:55.790289 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:44:55.790299 kernel: Memory: 2438768K/2571756K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 132728K reserved, 0K cma-reserved) Oct 2 19:44:55.790309 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Oct 2 19:44:55.790318 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:44:55.790327 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:44:55.790338 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:44:55.790348 kernel: rcu: RCU event tracing is enabled. Oct 2 19:44:55.790358 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Oct 2 19:44:55.790367 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:44:55.790377 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:44:55.790386 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:44:55.790395 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Oct 2 19:44:55.790404 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Oct 2 19:44:55.790412 kernel: random: crng init done Oct 2 19:44:55.790424 kernel: Console: colour VGA+ 80x25 Oct 2 19:44:55.790433 kernel: printk: console [ttyS0] enabled Oct 2 19:44:55.790442 kernel: ACPI: Core revision 20210730 Oct 2 19:44:55.790451 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Oct 2 19:44:55.790461 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:44:55.790470 kernel: x2apic enabled Oct 2 19:44:55.790479 kernel: Switched APIC routing to physical x2apic. Oct 2 19:44:55.790488 kernel: kvm-guest: setup PV IPIs Oct 2 19:44:55.790498 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Oct 2 19:44:55.790509 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Oct 2 19:44:55.790518 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Oct 2 19:44:55.790528 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Oct 2 19:44:55.790537 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Oct 2 19:44:55.790546 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Oct 2 19:44:55.790556 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:44:55.790565 kernel: Spectre V2 : Mitigation: Retpolines Oct 2 19:44:55.790575 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:44:55.790584 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 2 19:44:55.790600 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Oct 2 19:44:55.790609 kernel: RETBleed: Mitigation: untrained return thunk Oct 2 19:44:55.790619 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 2 19:44:55.790630 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 2 19:44:55.790640 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:44:55.790650 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:44:55.790660 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:44:55.790670 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:44:55.790680 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Oct 2 19:44:55.790691 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:44:55.790701 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:44:55.790711 kernel: LSM: Security Framework initializing Oct 2 19:44:55.790720 kernel: SELinux: Initializing. Oct 2 19:44:55.790730 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 19:44:55.790740 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 19:44:55.790750 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Oct 2 19:44:55.790761 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Oct 2 19:44:55.790770 kernel: ... version: 0 Oct 2 19:44:55.790780 kernel: ... bit width: 48 Oct 2 19:44:55.790789 kernel: ... generic registers: 6 Oct 2 19:44:55.790799 kernel: ... value mask: 0000ffffffffffff Oct 2 19:44:55.790808 kernel: ... max period: 00007fffffffffff Oct 2 19:44:55.790818 kernel: ... fixed-purpose events: 0 Oct 2 19:44:55.790828 kernel: ... event mask: 000000000000003f Oct 2 19:44:55.790838 kernel: signal: max sigframe size: 1776 Oct 2 19:44:55.790849 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:44:55.790859 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:44:55.790869 kernel: x86: Booting SMP configuration: Oct 2 19:44:55.790878 kernel: .... node #0, CPUs: #1 Oct 2 19:44:55.790896 kernel: kvm-clock: cpu 1, msr 59f8a041, secondary cpu clock Oct 2 19:44:55.790906 kernel: kvm-guest: setup async PF for cpu 1 Oct 2 19:44:55.790916 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Oct 2 19:44:55.790926 kernel: #2 Oct 2 19:44:55.790936 kernel: kvm-clock: cpu 2, msr 59f8a081, secondary cpu clock Oct 2 19:44:55.790945 kernel: kvm-guest: setup async PF for cpu 2 Oct 2 19:44:55.790957 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Oct 2 19:44:55.790966 kernel: #3 Oct 2 19:44:55.790975 kernel: kvm-clock: cpu 3, msr 59f8a0c1, secondary cpu clock Oct 2 19:44:55.790985 kernel: kvm-guest: setup async PF for cpu 3 Oct 2 19:44:55.790994 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Oct 2 19:44:55.791004 kernel: smp: Brought up 1 node, 4 CPUs Oct 2 19:44:55.791014 kernel: smpboot: Max logical packages: 1 Oct 2 19:44:55.791024 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Oct 2 19:44:55.791034 kernel: devtmpfs: initialized Oct 2 19:44:55.791045 kernel: x86/mm: Memory block size: 128MB Oct 2 19:44:55.791055 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:44:55.791065 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Oct 2 19:44:55.791075 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:44:55.791085 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:44:55.791094 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:44:55.791104 kernel: audit: type=2000 audit(1696275895.234:1): state=initialized audit_enabled=0 res=1 Oct 2 19:44:55.791114 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:44:55.791124 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:44:55.791135 kernel: cpuidle: using governor menu Oct 2 19:44:55.791144 kernel: ACPI: bus type PCI registered Oct 2 19:44:55.791153 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:44:55.791174 kernel: dca service started, version 1.12.1 Oct 2 19:44:55.791183 kernel: PCI: Using configuration type 1 for base access Oct 2 19:44:55.791192 kernel: PCI: Using configuration type 1 for extended access Oct 2 19:44:55.791202 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:44:55.791211 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:44:55.791221 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:44:55.791232 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:44:55.791242 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:44:55.791251 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:44:55.791261 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:44:55.791270 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:44:55.791280 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:44:55.791289 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:44:55.791299 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 2 19:44:55.791308 kernel: ACPI: Interpreter enabled Oct 2 19:44:55.791319 kernel: ACPI: PM: (supports S0 S3 S5) Oct 2 19:44:55.791328 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:44:55.791338 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:44:55.791347 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Oct 2 19:44:55.791357 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 2 19:44:55.791499 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:44:55.791515 kernel: acpiphp: Slot [3] registered Oct 2 19:44:55.791525 kernel: acpiphp: Slot [4] registered Oct 2 19:44:55.791537 kernel: acpiphp: Slot [5] registered Oct 2 19:44:55.791546 kernel: acpiphp: Slot [6] registered Oct 2 19:44:55.791555 kernel: acpiphp: Slot [7] registered Oct 2 19:44:55.791565 kernel: acpiphp: Slot [8] registered Oct 2 19:44:55.791574 kernel: acpiphp: Slot [9] registered Oct 2 19:44:55.791584 kernel: acpiphp: Slot [10] registered Oct 2 19:44:55.791593 kernel: acpiphp: Slot [11] registered Oct 2 19:44:55.791602 kernel: acpiphp: Slot [12] registered Oct 2 19:44:55.791611 kernel: acpiphp: Slot [13] registered Oct 2 19:44:55.791620 kernel: acpiphp: Slot [14] registered Oct 2 19:44:55.791632 kernel: acpiphp: Slot [15] registered Oct 2 19:44:55.791641 kernel: acpiphp: Slot [16] registered Oct 2 19:44:55.791651 kernel: acpiphp: Slot [17] registered Oct 2 19:44:55.791659 kernel: acpiphp: Slot [18] registered Oct 2 19:44:55.791668 kernel: acpiphp: Slot [19] registered Oct 2 19:44:55.791677 kernel: acpiphp: Slot [20] registered Oct 2 19:44:55.791687 kernel: acpiphp: Slot [21] registered Oct 2 19:44:55.791696 kernel: acpiphp: Slot [22] registered Oct 2 19:44:55.791705 kernel: acpiphp: Slot [23] registered Oct 2 19:44:55.791716 kernel: acpiphp: Slot [24] registered Oct 2 19:44:55.791726 kernel: acpiphp: Slot [25] registered Oct 2 19:44:55.791735 kernel: acpiphp: Slot [26] registered Oct 2 19:44:55.791745 kernel: acpiphp: Slot [27] registered Oct 2 19:44:55.791755 kernel: acpiphp: Slot [28] registered Oct 2 19:44:55.791764 kernel: acpiphp: Slot [29] registered Oct 2 19:44:55.791774 kernel: acpiphp: Slot [30] registered Oct 2 19:44:55.791783 kernel: acpiphp: Slot [31] registered Oct 2 19:44:55.791793 kernel: PCI host bridge to bus 0000:00 Oct 2 19:44:55.791910 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 19:44:55.792004 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 2 19:44:55.792090 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 19:44:55.792200 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Oct 2 19:44:55.792289 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Oct 2 19:44:55.792375 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 2 19:44:55.792485 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Oct 2 19:44:55.792594 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Oct 2 19:44:55.792699 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Oct 2 19:44:55.792800 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Oct 2 19:44:55.792905 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Oct 2 19:44:55.793005 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Oct 2 19:44:55.793101 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Oct 2 19:44:55.793230 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Oct 2 19:44:55.793333 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Oct 2 19:44:55.793422 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Oct 2 19:44:55.793508 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Oct 2 19:44:55.793614 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Oct 2 19:44:55.793712 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Oct 2 19:44:55.793802 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Oct 2 19:44:55.793899 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Oct 2 19:44:55.793996 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 2 19:44:55.794100 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Oct 2 19:44:55.794215 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc09f] Oct 2 19:44:55.794317 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Oct 2 19:44:55.794414 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Oct 2 19:44:55.794518 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Oct 2 19:44:55.794622 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Oct 2 19:44:55.794718 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Oct 2 19:44:55.794815 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Oct 2 19:44:55.794928 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Oct 2 19:44:55.795027 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0a0-0xc0bf] Oct 2 19:44:55.795123 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Oct 2 19:44:55.795234 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Oct 2 19:44:55.795335 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Oct 2 19:44:55.795350 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 2 19:44:55.795360 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 2 19:44:55.795370 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 2 19:44:55.795379 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 2 19:44:55.795389 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 2 19:44:55.795399 kernel: iommu: Default domain type: Translated Oct 2 19:44:55.795409 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:44:55.795504 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Oct 2 19:44:55.795604 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 2 19:44:55.795699 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Oct 2 19:44:55.795713 kernel: vgaarb: loaded Oct 2 19:44:55.795722 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:44:55.795732 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:44:55.795742 kernel: PTP clock support registered Oct 2 19:44:55.795752 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:44:55.795761 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 19:44:55.795773 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 2 19:44:55.795784 kernel: e820: reserve RAM buffer [mem 0x9cfdd000-0x9fffffff] Oct 2 19:44:55.795793 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Oct 2 19:44:55.795803 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Oct 2 19:44:55.795812 kernel: clocksource: Switched to clocksource kvm-clock Oct 2 19:44:55.795822 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:44:55.795832 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:44:55.795841 kernel: pnp: PnP ACPI init Oct 2 19:44:55.795952 kernel: pnp 00:02: [dma 2] Oct 2 19:44:55.795971 kernel: pnp: PnP ACPI: found 6 devices Oct 2 19:44:55.795981 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:44:55.795991 kernel: NET: Registered PF_INET protocol family Oct 2 19:44:55.796000 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 19:44:55.796010 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Oct 2 19:44:55.796020 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:44:55.796030 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 19:44:55.796040 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Oct 2 19:44:55.796051 kernel: TCP: Hash tables configured (established 32768 bind 32768) Oct 2 19:44:55.796061 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 19:44:55.796070 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 19:44:55.796079 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:44:55.796089 kernel: NET: Registered PF_XDP protocol family Oct 2 19:44:55.796200 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 2 19:44:55.796286 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 2 19:44:55.796373 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 2 19:44:55.796458 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Oct 2 19:44:55.796542 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Oct 2 19:44:55.796630 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Oct 2 19:44:55.796724 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 2 19:44:55.796820 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Oct 2 19:44:55.796834 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:44:55.796843 kernel: Initialise system trusted keyrings Oct 2 19:44:55.796853 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Oct 2 19:44:55.796862 kernel: Key type asymmetric registered Oct 2 19:44:55.796874 kernel: Asymmetric key parser 'x509' registered Oct 2 19:44:55.796883 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:44:55.796900 kernel: io scheduler mq-deadline registered Oct 2 19:44:55.796909 kernel: io scheduler kyber registered Oct 2 19:44:55.796918 kernel: io scheduler bfq registered Oct 2 19:44:55.796927 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:44:55.796937 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Oct 2 19:44:55.796946 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Oct 2 19:44:55.796956 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Oct 2 19:44:55.796967 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:44:55.796976 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:44:55.796985 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 2 19:44:55.796995 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 2 19:44:55.797004 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 2 19:44:55.797098 kernel: rtc_cmos 00:05: RTC can wake from S4 Oct 2 19:44:55.797114 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 2 19:44:55.797255 kernel: rtc_cmos 00:05: registered as rtc0 Oct 2 19:44:55.797348 kernel: rtc_cmos 00:05: setting system clock to 2023-10-02T19:44:55 UTC (1696275895) Oct 2 19:44:55.797436 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Oct 2 19:44:55.797450 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:44:55.797459 kernel: Segment Routing with IPv6 Oct 2 19:44:55.797469 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:44:55.797478 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:44:55.797488 kernel: Key type dns_resolver registered Oct 2 19:44:55.797497 kernel: IPI shorthand broadcast: enabled Oct 2 19:44:55.797507 kernel: sched_clock: Marking stable (336281262, 71647455)->(432652257, -24723540) Oct 2 19:44:55.797519 kernel: registered taskstats version 1 Oct 2 19:44:55.797529 kernel: Loading compiled-in X.509 certificates Oct 2 19:44:55.797539 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:44:55.797549 kernel: Key type .fscrypt registered Oct 2 19:44:55.797558 kernel: Key type fscrypt-provisioning registered Oct 2 19:44:55.797568 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 19:44:55.797578 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:44:55.797588 kernel: ima: No architecture policies found Oct 2 19:44:55.797599 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:44:55.797608 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:44:55.797618 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:44:55.797628 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:44:55.797638 kernel: Run /init as init process Oct 2 19:44:55.797647 kernel: with arguments: Oct 2 19:44:55.797656 kernel: /init Oct 2 19:44:55.797665 kernel: with environment: Oct 2 19:44:55.797685 kernel: HOME=/ Oct 2 19:44:55.797697 kernel: TERM=linux Oct 2 19:44:55.797706 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:44:55.797720 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:44:55.797733 systemd[1]: Detected virtualization kvm. Oct 2 19:44:55.797744 systemd[1]: Detected architecture x86-64. Oct 2 19:44:55.797754 systemd[1]: Running in initrd. Oct 2 19:44:55.797765 systemd[1]: No hostname configured, using default hostname. Oct 2 19:44:55.797777 systemd[1]: Hostname set to . Oct 2 19:44:55.797788 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:44:55.797799 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:44:55.797810 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:44:55.797820 systemd[1]: Reached target cryptsetup.target. Oct 2 19:44:55.797831 systemd[1]: Reached target paths.target. Oct 2 19:44:55.797841 systemd[1]: Reached target slices.target. Oct 2 19:44:55.797851 systemd[1]: Reached target swap.target. Oct 2 19:44:55.797862 systemd[1]: Reached target timers.target. Oct 2 19:44:55.797874 systemd[1]: Listening on iscsid.socket. Oct 2 19:44:55.797892 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:44:55.797904 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:44:55.797915 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:44:55.797925 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:44:55.797936 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:44:55.797947 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:44:55.797960 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:44:55.797971 systemd[1]: Reached target sockets.target. Oct 2 19:44:55.797982 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:44:55.797992 systemd[1]: Finished network-cleanup.service. Oct 2 19:44:55.798003 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:44:55.798014 systemd[1]: Starting systemd-journald.service... Oct 2 19:44:55.798025 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:44:55.798037 systemd[1]: Starting systemd-resolved.service... Oct 2 19:44:55.798047 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:44:55.798057 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:44:55.798068 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:44:55.798079 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:44:55.798090 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:44:55.798103 systemd-journald[199]: Journal started Oct 2 19:44:55.798164 systemd-journald[199]: Runtime Journal (/run/log/journal/762e8a3bdc5d4b6586656831402564fa) is 6.0M, max 48.5M, 42.5M free. Oct 2 19:44:55.783575 systemd-modules-load[200]: Inserted module 'overlay' Oct 2 19:44:55.808622 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:44:55.808643 kernel: Bridge firewalling registered Oct 2 19:44:55.804327 systemd-modules-load[200]: Inserted module 'br_netfilter' Oct 2 19:44:55.811870 systemd[1]: Started systemd-journald.service. Oct 2 19:44:55.811895 kernel: audit: type=1130 audit(1696275895.808:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:55.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:55.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:55.812770 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:44:55.815739 kernel: audit: type=1130 audit(1696275895.812:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:55.815757 kernel: audit: type=1130 audit(1696275895.815:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:55.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:55.813530 systemd-resolved[201]: Positive Trust Anchors: Oct 2 19:44:55.813539 systemd-resolved[201]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:44:55.813566 systemd-resolved[201]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:44:55.823389 kernel: audit: type=1130 audit(1696275895.817:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:55.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:55.815722 systemd-resolved[201]: Defaulting to hostname 'linux'. Oct 2 19:44:55.817337 systemd[1]: Started systemd-resolved.service. Oct 2 19:44:55.818241 systemd[1]: Reached target nss-lookup.target. Oct 2 19:44:55.825341 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:44:55.828390 kernel: SCSI subsystem initialized Oct 2 19:44:55.838858 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:44:55.838909 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:44:55.838923 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:44:55.841470 systemd-modules-load[200]: Inserted module 'dm_multipath' Oct 2 19:44:55.841555 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:44:55.845787 kernel: audit: type=1130 audit(1696275895.842:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:55.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:55.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:55.842918 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:44:55.848701 kernel: audit: type=1130 audit(1696275895.845:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:55.846526 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:44:55.849232 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:44:55.853971 dracut-cmdline[220]: dracut-dracut-053 Oct 2 19:44:55.855281 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:44:55.856378 dracut-cmdline[220]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:44:55.861622 kernel: audit: type=1130 audit(1696275895.856:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:55.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:55.901174 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:44:55.911173 kernel: iscsi: registered transport (tcp) Oct 2 19:44:55.929173 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:44:55.929188 kernel: QLogic iSCSI HBA Driver Oct 2 19:44:55.955753 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:44:55.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:55.957467 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:44:55.959512 kernel: audit: type=1130 audit(1696275895.956:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:56.001174 kernel: raid6: avx2x4 gen() 30483 MB/s Oct 2 19:44:56.018174 kernel: raid6: avx2x4 xor() 7697 MB/s Oct 2 19:44:56.035180 kernel: raid6: avx2x2 gen() 32166 MB/s Oct 2 19:44:56.052169 kernel: raid6: avx2x2 xor() 19264 MB/s Oct 2 19:44:56.069170 kernel: raid6: avx2x1 gen() 26689 MB/s Oct 2 19:44:56.086170 kernel: raid6: avx2x1 xor() 15396 MB/s Oct 2 19:44:56.103170 kernel: raid6: sse2x4 gen() 14645 MB/s Oct 2 19:44:56.120171 kernel: raid6: sse2x4 xor() 7182 MB/s Oct 2 19:44:56.137170 kernel: raid6: sse2x2 gen() 16442 MB/s Oct 2 19:44:56.154180 kernel: raid6: sse2x2 xor() 9825 MB/s Oct 2 19:44:56.171178 kernel: raid6: sse2x1 gen() 11970 MB/s Oct 2 19:44:56.188519 kernel: raid6: sse2x1 xor() 7638 MB/s Oct 2 19:44:56.188529 kernel: raid6: using algorithm avx2x2 gen() 32166 MB/s Oct 2 19:44:56.188538 kernel: raid6: .... xor() 19264 MB/s, rmw enabled Oct 2 19:44:56.188550 kernel: raid6: using avx2x2 recovery algorithm Oct 2 19:44:56.200171 kernel: xor: automatically using best checksumming function avx Oct 2 19:44:56.285178 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:44:56.292663 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:44:56.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:56.295000 audit: BPF prog-id=7 op=LOAD Oct 2 19:44:56.295000 audit: BPF prog-id=8 op=LOAD Oct 2 19:44:56.295853 systemd[1]: Starting systemd-udevd.service... Oct 2 19:44:56.296749 kernel: audit: type=1130 audit(1696275896.293:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:56.306438 systemd-udevd[400]: Using default interface naming scheme 'v252'. Oct 2 19:44:56.310083 systemd[1]: Started systemd-udevd.service. Oct 2 19:44:56.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:56.311929 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:44:56.321421 dracut-pre-trigger[410]: rd.md=0: removing MD RAID activation Oct 2 19:44:56.344236 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:44:56.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:56.346029 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:44:56.376224 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:44:56.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:56.400439 kernel: virtio_blk virtio1: [vda] 9289728 512-byte logical blocks (4.76 GB/4.43 GiB) Oct 2 19:44:56.402181 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:44:56.410174 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:44:56.417180 kernel: libata version 3.00 loaded. Oct 2 19:44:56.420203 kernel: ata_piix 0000:00:01.1: version 2.13 Oct 2 19:44:56.421178 kernel: scsi host0: ata_piix Oct 2 19:44:56.425174 kernel: scsi host1: ata_piix Oct 2 19:44:56.425281 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Oct 2 19:44:56.425291 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Oct 2 19:44:56.431011 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:44:56.453268 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:44:56.453289 kernel: AES CTR mode by8 optimization enabled Oct 2 19:44:56.453298 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (459) Oct 2 19:44:56.451416 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:44:56.459081 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:44:56.462644 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:44:56.468453 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:44:56.470067 systemd[1]: Starting disk-uuid.service... Oct 2 19:44:56.478182 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:44:56.483178 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:44:56.485172 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:44:56.582180 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Oct 2 19:44:56.582211 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Oct 2 19:44:56.610180 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Oct 2 19:44:56.610327 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 2 19:44:56.627175 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Oct 2 19:44:57.486067 disk-uuid[519]: The operation has completed successfully. Oct 2 19:44:57.486746 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:44:57.505093 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:44:57.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:57.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:57.505208 systemd[1]: Finished disk-uuid.service. Oct 2 19:44:57.514238 systemd[1]: Starting verity-setup.service... Oct 2 19:44:57.525273 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:44:57.553576 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:44:57.555854 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:44:57.557604 systemd[1]: Finished verity-setup.service. Oct 2 19:44:57.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:57.620988 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:44:57.621831 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:44:57.621457 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:44:57.622057 systemd[1]: Starting ignition-setup.service... Oct 2 19:44:57.623511 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:44:57.629644 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:44:57.629678 kernel: BTRFS info (device vda6): using free space tree Oct 2 19:44:57.629697 kernel: BTRFS info (device vda6): has skinny extents Oct 2 19:44:57.636310 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:44:57.642685 systemd[1]: Finished ignition-setup.service. Oct 2 19:44:57.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:57.643608 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:44:57.681591 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:44:57.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:57.682000 audit: BPF prog-id=9 op=LOAD Oct 2 19:44:57.683150 systemd[1]: Starting systemd-networkd.service... Oct 2 19:44:57.705793 systemd-networkd[702]: lo: Link UP Oct 2 19:44:57.705813 systemd-networkd[702]: lo: Gained carrier Oct 2 19:44:57.706366 systemd-networkd[702]: Enumeration completed Oct 2 19:44:57.706603 systemd-networkd[702]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:44:57.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:57.707306 systemd[1]: Started systemd-networkd.service. Oct 2 19:44:57.707693 systemd[1]: Reached target network.target. Oct 2 19:44:57.708164 systemd-networkd[702]: eth0: Link UP Oct 2 19:44:57.708168 systemd-networkd[702]: eth0: Gained carrier Oct 2 19:44:57.710939 systemd[1]: Starting iscsiuio.service... Oct 2 19:44:57.716264 systemd[1]: Started iscsiuio.service. Oct 2 19:44:57.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:57.717646 systemd[1]: Starting iscsid.service... Oct 2 19:44:57.720109 iscsid[707]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:44:57.720109 iscsid[707]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:44:57.720109 iscsid[707]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:44:57.720109 iscsid[707]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:44:57.720109 iscsid[707]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:44:57.720109 iscsid[707]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:44:57.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:57.721091 systemd[1]: Started iscsid.service. Oct 2 19:44:57.722020 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:44:57.727252 systemd-networkd[702]: eth0: DHCPv4 address 10.0.0.10/16, gateway 10.0.0.1 acquired from 10.0.0.1 Oct 2 19:44:57.732444 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:44:57.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:57.733559 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:44:57.734716 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:44:57.735848 systemd[1]: Reached target remote-fs.target. Oct 2 19:44:57.737532 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:44:57.744434 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:44:57.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:57.745805 ignition[617]: Ignition 2.14.0 Oct 2 19:44:57.745815 ignition[617]: Stage: fetch-offline Oct 2 19:44:57.745863 ignition[617]: no configs at "/usr/lib/ignition/base.d" Oct 2 19:44:57.745872 ignition[617]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:44:57.745955 ignition[617]: parsed url from cmdline: "" Oct 2 19:44:57.745958 ignition[617]: no config URL provided Oct 2 19:44:57.745962 ignition[617]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:44:57.745968 ignition[617]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:44:57.745986 ignition[617]: op(1): [started] loading QEMU firmware config module Oct 2 19:44:57.745990 ignition[617]: op(1): executing: "modprobe" "qemu_fw_cfg" Oct 2 19:44:57.752809 ignition[617]: op(1): [finished] loading QEMU firmware config module Oct 2 19:44:57.777879 ignition[617]: parsing config with SHA512: 249a5211ba031b301afff0ba520127496f1e3d423ecc914ed8456145e9ce08d2c1709f3cbcba6eefdc601e3598a65819fbe05f168ffe20d2cf8c0e25bd39644f Oct 2 19:44:57.803566 unknown[617]: fetched base config from "system" Oct 2 19:44:57.803577 unknown[617]: fetched user config from "qemu" Oct 2 19:44:57.804033 ignition[617]: fetch-offline: fetch-offline passed Oct 2 19:44:57.804460 systemd-resolved[201]: Detected conflict on linux IN A 10.0.0.10 Oct 2 19:44:57.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:57.804085 ignition[617]: Ignition finished successfully Oct 2 19:44:57.804470 systemd-resolved[201]: Hostname conflict, changing published hostname from 'linux' to 'linux2'. Oct 2 19:44:57.805285 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:44:57.806189 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Oct 2 19:44:57.806894 systemd[1]: Starting ignition-kargs.service... Oct 2 19:44:57.815665 ignition[723]: Ignition 2.14.0 Oct 2 19:44:57.815674 ignition[723]: Stage: kargs Oct 2 19:44:57.815760 ignition[723]: no configs at "/usr/lib/ignition/base.d" Oct 2 19:44:57.815769 ignition[723]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:44:57.816623 ignition[723]: kargs: kargs passed Oct 2 19:44:57.818129 systemd[1]: Finished ignition-kargs.service. Oct 2 19:44:57.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:57.816656 ignition[723]: Ignition finished successfully Oct 2 19:44:57.819702 systemd[1]: Starting ignition-disks.service... Oct 2 19:44:57.825084 ignition[729]: Ignition 2.14.0 Oct 2 19:44:57.825679 ignition[729]: Stage: disks Oct 2 19:44:57.825765 ignition[729]: no configs at "/usr/lib/ignition/base.d" Oct 2 19:44:57.825773 ignition[729]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:44:57.828244 ignition[729]: disks: disks passed Oct 2 19:44:57.828280 ignition[729]: Ignition finished successfully Oct 2 19:44:57.829743 systemd[1]: Finished ignition-disks.service. Oct 2 19:44:57.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:57.830821 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:44:57.831020 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:44:57.832064 systemd[1]: Reached target local-fs.target. Oct 2 19:44:57.833119 systemd[1]: Reached target sysinit.target. Oct 2 19:44:57.834001 systemd[1]: Reached target basic.target. Oct 2 19:44:57.835490 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:44:57.845294 systemd-fsck[737]: ROOT: clean, 603/553520 files, 56012/553472 blocks Oct 2 19:44:57.849857 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:44:57.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:57.850714 systemd[1]: Mounting sysroot.mount... Oct 2 19:44:57.855782 systemd[1]: Mounted sysroot.mount. Oct 2 19:44:57.856224 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:44:57.856147 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:44:57.858189 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:44:57.858990 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 19:44:57.859020 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:44:57.859038 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:44:57.860757 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:44:57.862736 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:44:57.866567 initrd-setup-root[747]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:44:57.870192 initrd-setup-root[755]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:44:57.872838 initrd-setup-root[763]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:44:57.876046 initrd-setup-root[771]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:44:57.901514 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:44:57.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:57.903340 systemd[1]: Starting ignition-mount.service... Oct 2 19:44:57.904439 systemd[1]: Starting sysroot-boot.service... Oct 2 19:44:57.908538 bash[788]: umount: /sysroot/usr/share/oem: not mounted. Oct 2 19:44:57.916243 ignition[790]: INFO : Ignition 2.14.0 Oct 2 19:44:57.916243 ignition[790]: INFO : Stage: mount Oct 2 19:44:57.918206 ignition[790]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 2 19:44:57.918206 ignition[790]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:44:57.918206 ignition[790]: INFO : mount: mount passed Oct 2 19:44:57.918206 ignition[790]: INFO : Ignition finished successfully Oct 2 19:44:57.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:57.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:44:57.918338 systemd[1]: Finished ignition-mount.service. Oct 2 19:44:57.919723 systemd[1]: Finished sysroot-boot.service. Oct 2 19:44:58.566248 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:44:58.572176 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (798) Oct 2 19:44:58.572207 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:44:58.572217 kernel: BTRFS info (device vda6): using free space tree Oct 2 19:44:58.573204 kernel: BTRFS info (device vda6): has skinny extents Oct 2 19:44:58.576037 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:44:58.577872 systemd[1]: Starting ignition-files.service... Oct 2 19:44:58.591047 ignition[818]: INFO : Ignition 2.14.0 Oct 2 19:44:58.591047 ignition[818]: INFO : Stage: files Oct 2 19:44:58.592340 ignition[818]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 2 19:44:58.592340 ignition[818]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:44:58.593915 ignition[818]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:44:58.593915 ignition[818]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:44:58.593915 ignition[818]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:44:58.596868 ignition[818]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:44:58.596868 ignition[818]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:44:58.596868 ignition[818]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:44:58.596868 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:44:58.596351 unknown[818]: wrote ssh authorized keys file for user: core Oct 2 19:44:58.601670 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Oct 2 19:44:58.785867 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 2 19:44:59.323753 ignition[818]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Oct 2 19:44:59.326340 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:44:59.326340 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:44:59.326340 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Oct 2 19:44:59.332256 systemd-networkd[702]: eth0: Gained IPv6LL Oct 2 19:44:59.570416 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Oct 2 19:44:59.640196 ignition[818]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Oct 2 19:44:59.640196 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:44:59.643731 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:44:59.643731 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:44:59.838409 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Oct 2 19:45:00.693776 ignition[818]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Oct 2 19:45:00.696078 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:45:00.696078 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:45:00.696078 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:45:00.872654 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 2 19:45:02.752456 ignition[818]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Oct 2 19:45:02.752456 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:45:02.765276 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:45:02.765276 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Oct 2 19:45:02.820764 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Oct 2 19:45:03.710035 ignition[818]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Oct 2 19:45:03.712379 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:45:03.712379 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:45:03.712379 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:45:03.712379 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/bin/cilium.tar.gz" Oct 2 19:45:03.712379 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET https://github.com/cilium/cilium-cli/releases/download/v0.12.12/cilium-linux-amd64.tar.gz: attempt #1 Oct 2 19:45:03.807797 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET result: OK Oct 2 19:45:03.877627 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/bin/cilium.tar.gz" Oct 2 19:45:03.877627 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:45:03.880594 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:45:03.880594 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:45:03.880594 ignition[818]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:45:03.880594 ignition[818]: INFO : files: op(c): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:45:03.880594 ignition[818]: INFO : files: op(c): op(d): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:45:03.880594 ignition[818]: INFO : files: op(c): op(d): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:45:03.880594 ignition[818]: INFO : files: op(c): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:45:03.880594 ignition[818]: INFO : files: op(e): [started] processing unit "prepare-critools.service" Oct 2 19:45:03.880594 ignition[818]: INFO : files: op(e): op(f): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:45:03.880594 ignition[818]: INFO : files: op(e): op(f): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:45:03.880594 ignition[818]: INFO : files: op(e): [finished] processing unit "prepare-critools.service" Oct 2 19:45:03.880594 ignition[818]: INFO : files: op(10): [started] processing unit "coreos-metadata.service" Oct 2 19:45:03.880594 ignition[818]: INFO : files: op(10): op(11): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 2 19:45:03.880594 ignition[818]: INFO : files: op(10): op(11): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Oct 2 19:45:03.880594 ignition[818]: INFO : files: op(10): [finished] processing unit "coreos-metadata.service" Oct 2 19:45:03.880594 ignition[818]: INFO : files: op(12): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:45:03.880594 ignition[818]: INFO : files: op(12): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:45:03.880594 ignition[818]: INFO : files: op(13): [started] setting preset to disabled for "coreos-metadata.service" Oct 2 19:45:03.905055 ignition[818]: INFO : files: op(13): op(14): [started] removing enablement symlink(s) for "coreos-metadata.service" Oct 2 19:45:03.936509 ignition[818]: INFO : files: op(13): op(14): [finished] removing enablement symlink(s) for "coreos-metadata.service" Oct 2 19:45:03.937655 ignition[818]: INFO : files: op(13): [finished] setting preset to disabled for "coreos-metadata.service" Oct 2 19:45:03.937655 ignition[818]: INFO : files: op(15): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:45:03.937655 ignition[818]: INFO : files: op(15): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:45:03.940934 ignition[818]: INFO : files: createResultFile: createFiles: op(16): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:45:03.942270 ignition[818]: INFO : files: createResultFile: createFiles: op(16): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:45:03.943531 ignition[818]: INFO : files: files passed Oct 2 19:45:03.943531 ignition[818]: INFO : Ignition finished successfully Oct 2 19:45:03.944529 systemd[1]: Finished ignition-files.service. Oct 2 19:45:03.948379 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 19:45:03.948406 kernel: audit: type=1130 audit(1696275903.944:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:03.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:03.948487 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:45:03.948816 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:45:03.949309 systemd[1]: Starting ignition-quench.service... Oct 2 19:45:03.951709 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:45:03.956899 kernel: audit: type=1130 audit(1696275903.951:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:03.956917 kernel: audit: type=1131 audit(1696275903.951:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:03.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:03.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:03.951774 systemd[1]: Finished ignition-quench.service. Oct 2 19:45:03.959190 initrd-setup-root-after-ignition[844]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Oct 2 19:45:03.961510 initrd-setup-root-after-ignition[846]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:45:03.962983 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:45:03.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:03.963468 systemd[1]: Reached target ignition-complete.target. Oct 2 19:45:03.967330 kernel: audit: type=1130 audit(1696275903.963:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:03.966500 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:45:03.976793 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:45:03.976864 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:45:03.982144 kernel: audit: type=1130 audit(1696275903.977:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:03.982178 kernel: audit: type=1131 audit(1696275903.977:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:03.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:03.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:03.978084 systemd[1]: Reached target initrd-fs.target. Oct 2 19:45:03.982527 systemd[1]: Reached target initrd.target. Oct 2 19:45:03.982801 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:45:03.983410 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:45:03.991443 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:45:03.994296 kernel: audit: type=1130 audit(1696275903.991:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:03.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:03.994326 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:45:04.002460 systemd[1]: Stopped target network.target. Oct 2 19:45:04.002706 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:45:04.003801 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:45:04.004033 systemd[1]: Stopped target timers.target. Oct 2 19:45:04.004383 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:45:04.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.004457 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:45:04.006996 systemd[1]: Stopped target initrd.target. Oct 2 19:45:04.011076 kernel: audit: type=1131 audit(1696275904.006:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.009059 systemd[1]: Stopped target basic.target. Oct 2 19:45:04.010814 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:45:04.011474 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:45:04.011710 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:45:04.011950 systemd[1]: Stopped target remote-fs.target. Oct 2 19:45:04.012202 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:45:04.015564 systemd[1]: Stopped target sysinit.target. Oct 2 19:45:04.015972 systemd[1]: Stopped target local-fs.target. Oct 2 19:45:04.016223 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:45:04.018258 systemd[1]: Stopped target swap.target. Oct 2 19:45:04.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.018637 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:45:04.023453 kernel: audit: type=1131 audit(1696275904.019:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.018719 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:45:04.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.020035 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:45:04.027212 kernel: audit: type=1131 audit(1696275904.023:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.022085 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:45:04.022173 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:45:04.023810 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:45:04.023884 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:45:04.025977 systemd[1]: Stopped target paths.target. Oct 2 19:45:04.027518 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:45:04.031674 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:45:04.033019 systemd[1]: Stopped target slices.target. Oct 2 19:45:04.034172 systemd[1]: Stopped target sockets.target. Oct 2 19:45:04.035332 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:45:04.036007 systemd[1]: Closed iscsid.socket. Oct 2 19:45:04.037035 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:45:04.037734 systemd[1]: Closed iscsiuio.socket. Oct 2 19:45:04.038835 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:45:04.039768 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:45:04.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.041254 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:45:04.041344 systemd[1]: Stopped ignition-files.service. Oct 2 19:45:04.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.042429 systemd[1]: Stopping ignition-mount.service... Oct 2 19:45:04.043306 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:45:04.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.043392 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:45:04.044691 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:45:04.046985 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:45:04.048228 ignition[859]: INFO : Ignition 2.14.0 Oct 2 19:45:04.048228 ignition[859]: INFO : Stage: umount Oct 2 19:45:04.048228 ignition[859]: INFO : no configs at "/usr/lib/ignition/base.d" Oct 2 19:45:04.048228 ignition[859]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Oct 2 19:45:04.052402 ignition[859]: INFO : umount: umount passed Oct 2 19:45:04.052402 ignition[859]: INFO : Ignition finished successfully Oct 2 19:45:04.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.048899 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:45:04.049981 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:45:04.050114 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:45:04.051202 systemd-networkd[702]: eth0: DHCPv6 lease lost Oct 2 19:45:04.053629 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:45:04.054291 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:45:04.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.060504 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 19:45:04.061762 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:45:04.062469 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:45:04.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.064236 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:45:04.064975 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:45:04.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.066720 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:45:04.067411 systemd[1]: Stopped ignition-mount.service. Oct 2 19:45:04.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.068759 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:45:04.069516 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:45:04.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.070000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:45:04.070000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:45:04.070981 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:45:04.071745 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:45:04.072819 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:45:04.073500 systemd[1]: Stopped ignition-disks.service. Oct 2 19:45:04.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.074639 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:45:04.074688 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:45:04.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.076382 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:45:04.077045 systemd[1]: Stopped ignition-setup.service. Oct 2 19:45:04.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.078131 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:45:04.078181 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:45:04.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.080330 systemd[1]: Stopping network-cleanup.service... Oct 2 19:45:04.081427 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:45:04.082134 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:45:04.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.083358 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:45:04.083400 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:45:04.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.085179 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:45:04.085791 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:45:04.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.086908 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:45:04.088691 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 19:45:04.089855 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:45:04.090490 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:45:04.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.091758 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:45:04.092368 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:45:04.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.094729 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:45:04.095376 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:45:04.096409 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:45:04.096435 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:45:04.097931 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:45:04.098494 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:45:04.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.099428 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:45:04.099455 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:45:04.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.100905 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:45:04.101489 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:45:04.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.102913 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:45:04.104263 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:45:04.105035 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:45:04.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.106677 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:45:04.107454 systemd[1]: Stopped network-cleanup.service. Oct 2 19:45:04.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.108719 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:45:04.109419 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:45:04.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.110573 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:45:04.112067 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:45:04.127081 systemd[1]: Switching root. Oct 2 19:45:04.145605 iscsid[707]: iscsid shutting down. Oct 2 19:45:04.146171 systemd-journald[199]: Received SIGTERM from PID 1 (systemd). Oct 2 19:45:04.146207 systemd-journald[199]: Journal stopped Oct 2 19:45:06.731576 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:45:06.731632 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:45:06.731643 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:45:06.731655 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:45:06.731667 kernel: SELinux: policy capability open_perms=1 Oct 2 19:45:06.731676 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:45:06.731685 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:45:06.731694 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:45:06.731709 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:45:06.731718 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:45:06.731727 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:45:06.731738 systemd[1]: Successfully loaded SELinux policy in 35.399ms. Oct 2 19:45:06.731760 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.775ms. Oct 2 19:45:06.731771 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:45:06.731781 systemd[1]: Detected virtualization kvm. Oct 2 19:45:06.731792 systemd[1]: Detected architecture x86-64. Oct 2 19:45:06.731802 systemd[1]: Detected first boot. Oct 2 19:45:06.731812 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:45:06.731828 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:45:06.731846 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:45:06.731858 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:45:06.731869 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:45:06.731880 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:45:06.731890 systemd[1]: Stopped iscsiuio.service. Oct 2 19:45:06.731900 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:45:06.731911 systemd[1]: Stopped iscsid.service. Oct 2 19:45:06.731920 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:45:06.731931 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:45:06.731943 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:45:06.731953 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:45:06.731963 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:45:06.731973 systemd[1]: Created slice system-getty.slice. Oct 2 19:45:06.731983 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:45:06.731998 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:45:06.732009 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:45:06.732019 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:45:06.732029 systemd[1]: Created slice user.slice. Oct 2 19:45:06.732040 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:45:06.732050 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:45:06.732060 systemd[1]: Set up automount boot.automount. Oct 2 19:45:06.732071 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:45:06.732081 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:45:06.732091 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:45:06.732101 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:45:06.732112 systemd[1]: Reached target integritysetup.target. Oct 2 19:45:06.732122 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:45:06.732132 systemd[1]: Reached target remote-fs.target. Oct 2 19:45:06.732141 systemd[1]: Reached target slices.target. Oct 2 19:45:06.732151 systemd[1]: Reached target swap.target. Oct 2 19:45:06.732185 systemd[1]: Reached target torcx.target. Oct 2 19:45:06.732196 systemd[1]: Reached target veritysetup.target. Oct 2 19:45:06.732205 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:45:06.732219 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:45:06.732229 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:45:06.732241 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:45:06.732251 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:45:06.732262 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:45:06.732272 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:45:06.732282 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:45:06.732292 systemd[1]: Mounting media.mount... Oct 2 19:45:06.732303 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:45:06.732313 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:45:06.732324 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:45:06.732334 systemd[1]: Mounting tmp.mount... Oct 2 19:45:06.732345 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:45:06.732355 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:45:06.732365 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:45:06.732375 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:45:06.732385 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:45:06.732395 systemd[1]: Starting modprobe@drm.service... Oct 2 19:45:06.732405 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:45:06.732415 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:45:06.732427 systemd[1]: Starting modprobe@loop.service... Oct 2 19:45:06.732437 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:45:06.732448 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:45:06.732458 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:45:06.732468 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:45:06.732478 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:45:06.732488 systemd[1]: Stopped systemd-journald.service. Oct 2 19:45:06.732497 kernel: loop: module loaded Oct 2 19:45:06.732507 systemd[1]: Starting systemd-journald.service... Oct 2 19:45:06.732519 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:45:06.732529 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:45:06.732539 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:45:06.732549 kernel: fuse: init (API version 7.34) Oct 2 19:45:06.732559 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:45:06.732569 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:45:06.732586 systemd[1]: Stopped verity-setup.service. Oct 2 19:45:06.732597 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:45:06.732608 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:45:06.732619 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:45:06.732630 systemd[1]: Mounted media.mount. Oct 2 19:45:06.732639 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:45:06.732649 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:45:06.732659 systemd[1]: Mounted tmp.mount. Oct 2 19:45:06.732669 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:45:06.732684 systemd-journald[962]: Journal started Oct 2 19:45:06.732720 systemd-journald[962]: Runtime Journal (/run/log/journal/762e8a3bdc5d4b6586656831402564fa) is 6.0M, max 48.5M, 42.5M free. Oct 2 19:45:04.211000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:45:04.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:45:04.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:45:04.546000 audit: BPF prog-id=10 op=LOAD Oct 2 19:45:04.546000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:45:04.546000 audit: BPF prog-id=11 op=LOAD Oct 2 19:45:04.546000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:45:06.630000 audit: BPF prog-id=12 op=LOAD Oct 2 19:45:06.630000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:45:06.630000 audit: BPF prog-id=13 op=LOAD Oct 2 19:45:06.630000 audit: BPF prog-id=14 op=LOAD Oct 2 19:45:06.630000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:45:06.630000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:45:06.631000 audit: BPF prog-id=15 op=LOAD Oct 2 19:45:06.631000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:45:06.631000 audit: BPF prog-id=16 op=LOAD Oct 2 19:45:06.631000 audit: BPF prog-id=17 op=LOAD Oct 2 19:45:06.631000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:45:06.631000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:45:06.632000 audit: BPF prog-id=18 op=LOAD Oct 2 19:45:06.632000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:45:06.632000 audit: BPF prog-id=19 op=LOAD Oct 2 19:45:06.632000 audit: BPF prog-id=20 op=LOAD Oct 2 19:45:06.632000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:45:06.632000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:45:06.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.647000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:45:06.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.709000 audit: BPF prog-id=21 op=LOAD Oct 2 19:45:06.710000 audit: BPF prog-id=22 op=LOAD Oct 2 19:45:06.710000 audit: BPF prog-id=23 op=LOAD Oct 2 19:45:06.710000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:45:06.710000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:45:06.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.730000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:45:06.730000 audit[962]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7fffe3e41090 a2=4000 a3=7fffe3e4112c items=0 ppid=1 pid=962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:06.730000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:45:06.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.628567 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:45:04.599267 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:45:06.628577 systemd[1]: Unnecessary job was removed for dev-vda6.device. Oct 2 19:45:04.599504 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:04Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:45:06.632708 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:45:04.599519 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:04Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:45:04.599545 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:04Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:45:04.599553 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:04Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:45:04.599577 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:04Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:45:04.599587 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:04Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:45:04.599766 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:04Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:45:06.734354 systemd[1]: Started systemd-journald.service. Oct 2 19:45:04.599796 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:04Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:45:04.599807 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:04Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:45:06.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:04.600090 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:04Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:45:04.600119 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:04Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:45:04.600133 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:04Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:45:04.600146 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:04Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:45:04.600169 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:04Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:45:06.734826 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:45:04.600182 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:04Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:45:06.358854 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:06Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:45:06.359103 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:06Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:45:06.359203 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:06Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:45:06.735132 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:45:06.359345 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:06Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:45:06.359389 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:06Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:45:06.359440 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2023-10-02T19:45:06Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:45:06.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.736027 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:45:06.736355 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:45:06.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.737091 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:45:06.737364 systemd[1]: Finished modprobe@drm.service. Oct 2 19:45:06.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.738071 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:45:06.738250 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:45:06.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.739006 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:45:06.739483 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:45:06.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.740207 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:45:06.740373 systemd[1]: Finished modprobe@loop.service. Oct 2 19:45:06.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.746510 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:45:06.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.747335 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:45:06.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.748262 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:45:06.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.749086 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:45:06.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.750052 systemd[1]: Reached target network-pre.target. Oct 2 19:45:06.751664 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:45:06.753109 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:45:06.753740 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:45:06.754898 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:45:06.756301 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:45:06.756905 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:45:06.757791 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:45:06.758476 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:45:06.761670 systemd-journald[962]: Time spent on flushing to /var/log/journal/762e8a3bdc5d4b6586656831402564fa is 14.144ms for 1100 entries. Oct 2 19:45:06.761670 systemd-journald[962]: System Journal (/var/log/journal/762e8a3bdc5d4b6586656831402564fa) is 8.0M, max 195.6M, 187.6M free. Oct 2 19:45:06.859915 systemd-journald[962]: Received client request to flush runtime journal. Oct 2 19:45:06.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:06.761139 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:45:06.763683 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:45:06.766939 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:45:06.860505 udevadm[996]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 2 19:45:06.767747 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:45:06.777834 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:45:06.779693 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:45:06.831270 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:45:06.835051 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:45:06.846774 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:45:06.847550 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:45:06.860975 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:45:06.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:07.723122 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:45:07.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:07.724000 audit: BPF prog-id=24 op=LOAD Oct 2 19:45:07.724000 audit: BPF prog-id=25 op=LOAD Oct 2 19:45:07.724000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:45:07.724000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:45:07.724886 systemd[1]: Starting systemd-udevd.service... Oct 2 19:45:07.738251 systemd-udevd[999]: Using default interface naming scheme 'v252'. Oct 2 19:45:07.750798 systemd[1]: Started systemd-udevd.service. Oct 2 19:45:07.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:07.752000 audit: BPF prog-id=26 op=LOAD Oct 2 19:45:07.753367 systemd[1]: Starting systemd-networkd.service... Oct 2 19:45:07.760862 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:45:07.760000 audit: BPF prog-id=27 op=LOAD Oct 2 19:45:07.760000 audit: BPF prog-id=28 op=LOAD Oct 2 19:45:07.760000 audit: BPF prog-id=29 op=LOAD Oct 2 19:45:07.783060 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:45:07.785324 systemd[1]: Started systemd-userdbd.service. Oct 2 19:45:07.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:07.810046 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:45:07.812173 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Oct 2 19:45:07.822220 kernel: ACPI: button: Power Button [PWRF] Oct 2 19:45:07.822000 audit[1007]: AVC avc: denied { confidentiality } for pid=1007 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:45:07.822000 audit[1007]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55974c6d0c30 a1=32194 a2=7f5303c8cbc5 a3=5 items=106 ppid=999 pid=1007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:07.822000 audit: CWD cwd="/" Oct 2 19:45:07.822000 audit: PATH item=0 name=(null) inode=14506 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=1 name=(null) inode=14507 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=2 name=(null) inode=14506 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=3 name=(null) inode=14508 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=4 name=(null) inode=14506 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=5 name=(null) inode=14509 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=6 name=(null) inode=14509 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=7 name=(null) inode=14510 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=8 name=(null) inode=14509 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=9 name=(null) inode=14511 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=10 name=(null) inode=14509 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=11 name=(null) inode=14512 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=12 name=(null) inode=14509 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=13 name=(null) inode=14513 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=14 name=(null) inode=14509 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=15 name=(null) inode=14514 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=16 name=(null) inode=14506 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=17 name=(null) inode=14515 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=18 name=(null) inode=14515 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=19 name=(null) inode=14516 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=20 name=(null) inode=14515 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=21 name=(null) inode=14517 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=22 name=(null) inode=14515 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=23 name=(null) inode=14518 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=24 name=(null) inode=14515 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=25 name=(null) inode=14519 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=26 name=(null) inode=14515 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=27 name=(null) inode=14520 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=28 name=(null) inode=14506 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=29 name=(null) inode=14521 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=30 name=(null) inode=14521 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=31 name=(null) inode=14522 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=32 name=(null) inode=14521 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=33 name=(null) inode=14523 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=34 name=(null) inode=14521 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=35 name=(null) inode=14524 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=36 name=(null) inode=14521 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=37 name=(null) inode=14525 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=38 name=(null) inode=14521 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=39 name=(null) inode=14526 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=40 name=(null) inode=14506 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=41 name=(null) inode=14527 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=42 name=(null) inode=14527 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=43 name=(null) inode=14528 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=44 name=(null) inode=14527 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=45 name=(null) inode=14529 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=46 name=(null) inode=14527 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=47 name=(null) inode=14530 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=48 name=(null) inode=14527 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=49 name=(null) inode=14531 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=50 name=(null) inode=14527 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=51 name=(null) inode=14532 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=52 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=53 name=(null) inode=14533 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=54 name=(null) inode=14533 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=55 name=(null) inode=14534 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=56 name=(null) inode=14533 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=57 name=(null) inode=14535 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=58 name=(null) inode=14533 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=59 name=(null) inode=14536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=60 name=(null) inode=14536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=61 name=(null) inode=14537 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=62 name=(null) inode=14536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=63 name=(null) inode=14538 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=64 name=(null) inode=14536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=65 name=(null) inode=14539 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=66 name=(null) inode=14536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=67 name=(null) inode=14540 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=68 name=(null) inode=14536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=69 name=(null) inode=14541 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=70 name=(null) inode=14533 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=71 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=72 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=73 name=(null) inode=14543 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=74 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=75 name=(null) inode=14544 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=76 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=77 name=(null) inode=14545 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=78 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=79 name=(null) inode=14546 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=80 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=81 name=(null) inode=14547 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=82 name=(null) inode=14533 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=83 name=(null) inode=14548 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=84 name=(null) inode=14548 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=85 name=(null) inode=14549 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=86 name=(null) inode=14548 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=87 name=(null) inode=14550 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=88 name=(null) inode=14548 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=89 name=(null) inode=14551 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=90 name=(null) inode=14548 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=91 name=(null) inode=14552 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=92 name=(null) inode=14548 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=93 name=(null) inode=14553 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=94 name=(null) inode=14533 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=95 name=(null) inode=14554 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=96 name=(null) inode=14554 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=97 name=(null) inode=14555 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=98 name=(null) inode=14554 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=99 name=(null) inode=14556 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=100 name=(null) inode=14554 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=101 name=(null) inode=14557 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=102 name=(null) inode=14554 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=103 name=(null) inode=14558 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=104 name=(null) inode=14554 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PATH item=105 name=(null) inode=14559 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:45:07.822000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:45:07.827892 systemd-networkd[1011]: lo: Link UP Oct 2 19:45:07.827897 systemd-networkd[1011]: lo: Gained carrier Oct 2 19:45:07.828228 systemd-networkd[1011]: Enumeration completed Oct 2 19:45:07.828304 systemd[1]: Started systemd-networkd.service. Oct 2 19:45:07.828307 systemd-networkd[1011]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:45:07.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:07.842703 systemd-networkd[1011]: eth0: Link UP Oct 2 19:45:07.842714 systemd-networkd[1011]: eth0: Gained carrier Oct 2 19:45:07.846183 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Oct 2 19:45:07.852259 systemd-networkd[1011]: eth0: DHCPv4 address 10.0.0.10/16, gateway 10.0.0.1 acquired from 10.0.0.1 Oct 2 19:45:07.853201 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Oct 2 19:45:07.867176 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:45:07.925359 kernel: kvm: Nested Virtualization enabled Oct 2 19:45:07.925499 kernel: SVM: kvm: Nested Paging enabled Oct 2 19:45:07.942171 kernel: EDAC MC: Ver: 3.0.0 Oct 2 19:45:07.959439 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:45:07.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:07.973236 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:45:07.986279 lvm[1034]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:45:08.010702 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:45:08.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:08.011358 systemd[1]: Reached target cryptsetup.target. Oct 2 19:45:08.012661 systemd[1]: Starting lvm2-activation.service... Oct 2 19:45:08.016014 lvm[1035]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:45:08.041026 systemd[1]: Finished lvm2-activation.service. Oct 2 19:45:08.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:08.057903 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:45:08.058468 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:45:08.058493 systemd[1]: Reached target local-fs.target. Oct 2 19:45:08.059006 systemd[1]: Reached target machines.target. Oct 2 19:45:08.060601 systemd[1]: Starting ldconfig.service... Oct 2 19:45:08.061329 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:45:08.061367 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:45:08.062143 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:45:08.063342 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:45:08.065311 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:45:08.066062 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:45:08.066096 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:45:08.067151 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:45:08.073606 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1037 (bootctl) Oct 2 19:45:08.075120 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:45:08.080888 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:45:08.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:08.126588 systemd-tmpfiles[1040]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:45:08.128573 systemd-tmpfiles[1040]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:45:08.132489 systemd-tmpfiles[1040]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:45:08.145972 systemd-fsck[1045]: fsck.fat 4.2 (2021-01-31) Oct 2 19:45:08.145972 systemd-fsck[1045]: /dev/vda1: 789 files, 115069/258078 clusters Oct 2 19:45:08.147360 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:45:08.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:08.150114 systemd[1]: Mounting boot.mount... Oct 2 19:45:08.174626 systemd[1]: Mounted boot.mount. Oct 2 19:45:08.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:08.532350 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:45:08.575642 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:45:08.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:08.577517 systemd[1]: Starting audit-rules.service... Oct 2 19:45:08.579191 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:45:08.581000 audit: BPF prog-id=30 op=LOAD Oct 2 19:45:08.580513 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:45:08.582414 systemd[1]: Starting systemd-resolved.service... Oct 2 19:45:08.584000 audit: BPF prog-id=31 op=LOAD Oct 2 19:45:08.585040 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:45:08.586289 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:45:08.587177 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:45:08.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:08.587966 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:45:08.590000 audit[1060]: SYSTEM_BOOT pid=1060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:45:08.593202 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:45:08.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:08.602906 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:45:08.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:08.619047 augenrules[1069]: No rules Oct 2 19:45:08.618000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:45:08.618000 audit[1069]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdc310d4d0 a2=420 a3=0 items=0 ppid=1049 pid=1069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:08.618000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:45:08.620202 systemd[1]: Finished audit-rules.service. Oct 2 19:45:08.629040 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:45:08.629717 systemd[1]: Reached target time-set.target. Oct 2 19:45:08.630626 systemd-timesyncd[1056]: Contacted time server 10.0.0.1:123 (10.0.0.1). Oct 2 19:45:08.630854 systemd-timesyncd[1056]: Initial clock synchronization to Mon 2023-10-02 19:45:08.717961 UTC. Oct 2 19:45:08.633960 systemd-resolved[1053]: Positive Trust Anchors: Oct 2 19:45:08.633972 systemd-resolved[1053]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:45:08.633999 systemd-resolved[1053]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:45:08.670358 systemd-resolved[1053]: Defaulting to hostname 'linux'. Oct 2 19:45:08.671743 systemd[1]: Started systemd-resolved.service. Oct 2 19:45:08.672455 systemd[1]: Reached target network.target. Oct 2 19:45:08.673018 systemd[1]: Reached target nss-lookup.target. Oct 2 19:45:08.686717 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:45:08.686959 ldconfig[1036]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:45:08.687198 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:45:08.692563 systemd[1]: Finished ldconfig.service. Oct 2 19:45:08.694131 systemd[1]: Starting systemd-update-done.service... Oct 2 19:45:08.699594 systemd[1]: Finished systemd-update-done.service. Oct 2 19:45:08.700295 systemd[1]: Reached target sysinit.target. Oct 2 19:45:08.700911 systemd[1]: Started motdgen.path. Oct 2 19:45:08.701405 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:45:08.702265 systemd[1]: Started logrotate.timer. Oct 2 19:45:08.702871 systemd[1]: Started mdadm.timer. Oct 2 19:45:08.703436 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:45:08.704048 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:45:08.704081 systemd[1]: Reached target paths.target. Oct 2 19:45:08.704648 systemd[1]: Reached target timers.target. Oct 2 19:45:08.705581 systemd[1]: Listening on dbus.socket. Oct 2 19:45:08.707644 systemd[1]: Starting docker.socket... Oct 2 19:45:08.710482 systemd[1]: Listening on sshd.socket. Oct 2 19:45:08.711091 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:45:08.711439 systemd[1]: Listening on docker.socket. Oct 2 19:45:08.711999 systemd[1]: Reached target sockets.target. Oct 2 19:45:08.712531 systemd[1]: Reached target basic.target. Oct 2 19:45:08.713062 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:45:08.713081 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:45:08.713880 systemd[1]: Starting containerd.service... Oct 2 19:45:08.715042 systemd[1]: Starting dbus.service... Oct 2 19:45:08.716178 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:45:08.717584 systemd[1]: Starting extend-filesystems.service... Oct 2 19:45:08.718278 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:45:08.718984 systemd[1]: Starting motdgen.service... Oct 2 19:45:08.720491 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:45:08.722216 systemd[1]: Starting prepare-critools.service... Oct 2 19:45:08.724225 jq[1081]: false Oct 2 19:45:08.724410 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:45:08.727389 systemd[1]: Starting sshd-keygen.service... Oct 2 19:45:08.729853 systemd[1]: Starting systemd-logind.service... Oct 2 19:45:08.730557 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:45:08.730605 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 19:45:08.730944 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:45:08.731473 systemd[1]: Starting update-engine.service... Oct 2 19:45:08.732811 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:45:08.734610 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:45:08.741334 jq[1096]: true Oct 2 19:45:08.734733 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:45:08.736122 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:45:08.736286 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:45:08.749193 tar[1102]: ./ Oct 2 19:45:08.749193 tar[1102]: ./loopback Oct 2 19:45:08.749568 jq[1105]: true Oct 2 19:45:08.752879 tar[1103]: crictl Oct 2 19:45:08.754226 dbus-daemon[1080]: [system] SELinux support is enabled Oct 2 19:45:08.754354 systemd[1]: Started dbus.service. Oct 2 19:45:08.756636 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:45:08.756658 systemd[1]: Reached target system-config.target. Oct 2 19:45:08.757264 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:45:08.757276 systemd[1]: Reached target user-config.target. Oct 2 19:45:08.757837 extend-filesystems[1082]: Found sr0 Oct 2 19:45:08.758419 extend-filesystems[1082]: Found vda Oct 2 19:45:08.758419 extend-filesystems[1082]: Found vda1 Oct 2 19:45:08.758419 extend-filesystems[1082]: Found vda2 Oct 2 19:45:08.758419 extend-filesystems[1082]: Found vda3 Oct 2 19:45:08.758419 extend-filesystems[1082]: Found usr Oct 2 19:45:08.758419 extend-filesystems[1082]: Found vda4 Oct 2 19:45:08.758419 extend-filesystems[1082]: Found vda6 Oct 2 19:45:08.758419 extend-filesystems[1082]: Found vda7 Oct 2 19:45:08.758419 extend-filesystems[1082]: Found vda9 Oct 2 19:45:08.758419 extend-filesystems[1082]: Checking size of /dev/vda9 Oct 2 19:45:08.771062 env[1106]: time="2023-10-02T19:45:08.759116266Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:45:08.775460 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:45:08.775602 systemd[1]: Finished motdgen.service. Oct 2 19:45:08.780516 extend-filesystems[1082]: Old size kept for /dev/vda9 Oct 2 19:45:08.781009 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:45:08.781148 systemd[1]: Finished extend-filesystems.service. Oct 2 19:45:08.792488 bash[1133]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:45:08.793717 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:45:08.804365 update_engine[1095]: I1002 19:45:08.803970 1095 main.cc:92] Flatcar Update Engine starting Oct 2 19:45:08.805808 tar[1102]: ./bandwidth Oct 2 19:45:08.807380 systemd[1]: Started update-engine.service. Oct 2 19:45:08.809477 systemd[1]: Started locksmithd.service. Oct 2 19:45:08.810201 update_engine[1095]: I1002 19:45:08.807411 1095 update_check_scheduler.cc:74] Next update check in 6m47s Oct 2 19:45:08.811581 systemd-logind[1092]: Watching system buttons on /dev/input/event1 (Power Button) Oct 2 19:45:08.811604 systemd-logind[1092]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:45:08.811750 systemd-logind[1092]: New seat seat0. Oct 2 19:45:08.812733 systemd[1]: Started systemd-logind.service. Oct 2 19:45:08.822860 env[1106]: time="2023-10-02T19:45:08.822821787Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:45:08.827255 env[1106]: time="2023-10-02T19:45:08.827238319Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:45:08.836615 env[1106]: time="2023-10-02T19:45:08.836565631Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:45:08.836696 env[1106]: time="2023-10-02T19:45:08.836678303Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:45:08.836933 env[1106]: time="2023-10-02T19:45:08.836913343Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:45:08.837011 env[1106]: time="2023-10-02T19:45:08.836993313Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:45:08.837089 env[1106]: time="2023-10-02T19:45:08.837070087Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:45:08.837170 env[1106]: time="2023-10-02T19:45:08.837140059Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:45:08.837291 env[1106]: time="2023-10-02T19:45:08.837275142Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:45:08.837545 env[1106]: time="2023-10-02T19:45:08.837520632Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:45:08.837709 env[1106]: time="2023-10-02T19:45:08.837690080Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:45:08.837781 env[1106]: time="2023-10-02T19:45:08.837762085Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:45:08.837890 env[1106]: time="2023-10-02T19:45:08.837872382Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:45:08.837960 env[1106]: time="2023-10-02T19:45:08.837942303Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:45:08.841201 tar[1102]: ./ptp Oct 2 19:45:08.846176 env[1106]: time="2023-10-02T19:45:08.845085729Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:45:08.846176 env[1106]: time="2023-10-02T19:45:08.845115636Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:45:08.846176 env[1106]: time="2023-10-02T19:45:08.845126887Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:45:08.846176 env[1106]: time="2023-10-02T19:45:08.845152865Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:45:08.846176 env[1106]: time="2023-10-02T19:45:08.845183743Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:45:08.846176 env[1106]: time="2023-10-02T19:45:08.845196137Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:45:08.846176 env[1106]: time="2023-10-02T19:45:08.845208540Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:45:08.846176 env[1106]: time="2023-10-02T19:45:08.845222766Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:45:08.846176 env[1106]: time="2023-10-02T19:45:08.845235591Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:45:08.846176 env[1106]: time="2023-10-02T19:45:08.845247944Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:45:08.846176 env[1106]: time="2023-10-02T19:45:08.845258634Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:45:08.846176 env[1106]: time="2023-10-02T19:45:08.845270205Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:45:08.846176 env[1106]: time="2023-10-02T19:45:08.845349695Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:45:08.846176 env[1106]: time="2023-10-02T19:45:08.845407713Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:45:08.846460 env[1106]: time="2023-10-02T19:45:08.845615273Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:45:08.846460 env[1106]: time="2023-10-02T19:45:08.845636172Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:45:08.846460 env[1106]: time="2023-10-02T19:45:08.845648014Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:45:08.846460 env[1106]: time="2023-10-02T19:45:08.845682549Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:45:08.846460 env[1106]: time="2023-10-02T19:45:08.845693499Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:45:08.846460 env[1106]: time="2023-10-02T19:45:08.845704009Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:45:08.846460 env[1106]: time="2023-10-02T19:45:08.845713296Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:45:08.846460 env[1106]: time="2023-10-02T19:45:08.845723706Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:45:08.846460 env[1106]: time="2023-10-02T19:45:08.845736630Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:45:08.846460 env[1106]: time="2023-10-02T19:45:08.845746098Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:45:08.846460 env[1106]: time="2023-10-02T19:45:08.845756397Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:45:08.846460 env[1106]: time="2023-10-02T19:45:08.845769562Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:45:08.846460 env[1106]: time="2023-10-02T19:45:08.845854311Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:45:08.846460 env[1106]: time="2023-10-02T19:45:08.845866894Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:45:08.846460 env[1106]: time="2023-10-02T19:45:08.845876843Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:45:08.846726 env[1106]: time="2023-10-02T19:45:08.845886652Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:45:08.846726 env[1106]: time="2023-10-02T19:45:08.845900177Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:45:08.846726 env[1106]: time="2023-10-02T19:45:08.845909164Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:45:08.846726 env[1106]: time="2023-10-02T19:45:08.845925174Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:45:08.846726 env[1106]: time="2023-10-02T19:45:08.845955951Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:45:08.846820 env[1106]: time="2023-10-02T19:45:08.846112285Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:45:08.848194 env[1106]: time="2023-10-02T19:45:08.846900062Z" level=info msg="Connect containerd service" Oct 2 19:45:08.848194 env[1106]: time="2023-10-02T19:45:08.846937733Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:45:08.849763 env[1106]: time="2023-10-02T19:45:08.848588539Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:45:08.849763 env[1106]: time="2023-10-02T19:45:08.848764939Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:45:08.849763 env[1106]: time="2023-10-02T19:45:08.848791659Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:45:08.849763 env[1106]: time="2023-10-02T19:45:08.848824852Z" level=info msg="containerd successfully booted in 0.090203s" Oct 2 19:45:08.848876 systemd[1]: Started containerd.service. Oct 2 19:45:08.855390 env[1106]: time="2023-10-02T19:45:08.855359837Z" level=info msg="Start subscribing containerd event" Oct 2 19:45:08.856018 env[1106]: time="2023-10-02T19:45:08.856002212Z" level=info msg="Start recovering state" Oct 2 19:45:08.863244 env[1106]: time="2023-10-02T19:45:08.863229365Z" level=info msg="Start event monitor" Oct 2 19:45:08.863334 env[1106]: time="2023-10-02T19:45:08.863318603Z" level=info msg="Start snapshots syncer" Oct 2 19:45:08.863436 env[1106]: time="2023-10-02T19:45:08.863421035Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:45:08.863571 env[1106]: time="2023-10-02T19:45:08.863556629Z" level=info msg="Start streaming server" Oct 2 19:45:08.881592 tar[1102]: ./vlan Oct 2 19:45:08.915635 tar[1102]: ./host-device Oct 2 19:45:08.922313 locksmithd[1137]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:45:08.948141 tar[1102]: ./tuning Oct 2 19:45:08.976290 tar[1102]: ./vrf Oct 2 19:45:09.005825 tar[1102]: ./sbr Oct 2 19:45:09.035006 tar[1102]: ./tap Oct 2 19:45:09.068383 tar[1102]: ./dhcp Oct 2 19:45:09.152732 tar[1102]: ./static Oct 2 19:45:09.173253 systemd[1]: Finished prepare-critools.service. Oct 2 19:45:09.177064 tar[1102]: ./firewall Oct 2 19:45:09.209848 tar[1102]: ./macvlan Oct 2 19:45:09.239329 tar[1102]: ./dummy Oct 2 19:45:09.268291 tar[1102]: ./bridge Oct 2 19:45:09.299718 tar[1102]: ./ipvlan Oct 2 19:45:09.328700 tar[1102]: ./portmap Oct 2 19:45:09.356194 tar[1102]: ./host-local Oct 2 19:45:09.388462 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:45:09.395483 sshd_keygen[1104]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:45:09.411786 systemd[1]: Finished sshd-keygen.service. Oct 2 19:45:09.413498 systemd[1]: Starting issuegen.service... Oct 2 19:45:09.417484 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:45:09.417595 systemd[1]: Finished issuegen.service. Oct 2 19:45:09.419118 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:45:09.423253 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:45:09.424773 systemd[1]: Started getty@tty1.service. Oct 2 19:45:09.426195 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:45:09.426878 systemd[1]: Reached target getty.target. Oct 2 19:45:09.427531 systemd[1]: Reached target multi-user.target. Oct 2 19:45:09.428869 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:45:09.434755 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:45:09.434862 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:45:09.435576 systemd[1]: Startup finished in 500ms (kernel) + 8.498s (initrd) + 5.266s (userspace) = 14.265s. Oct 2 19:45:09.636689 systemd-networkd[1011]: eth0: Gained IPv6LL Oct 2 19:45:12.955546 systemd[1]: Created slice system-sshd.slice. Oct 2 19:45:12.956506 systemd[1]: Started sshd@0-10.0.0.10:22-10.0.0.1:54206.service. Oct 2 19:45:12.994768 sshd[1163]: Accepted publickey for core from 10.0.0.1 port 54206 ssh2: RSA SHA256:+DuZ6jeJ+85lrS0QTsE47nySPANyTUNJwedXcdEfg68 Oct 2 19:45:12.996033 sshd[1163]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:45:13.004098 systemd-logind[1092]: New session 1 of user core. Oct 2 19:45:13.004910 systemd[1]: Created slice user-500.slice. Oct 2 19:45:13.005756 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:45:13.012117 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:45:13.013320 systemd[1]: Starting user@500.service... Oct 2 19:45:13.015600 (systemd)[1166]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:45:13.075185 systemd[1166]: Queued start job for default target default.target. Oct 2 19:45:13.075637 systemd[1166]: Reached target paths.target. Oct 2 19:45:13.075661 systemd[1166]: Reached target sockets.target. Oct 2 19:45:13.075677 systemd[1166]: Reached target timers.target. Oct 2 19:45:13.075692 systemd[1166]: Reached target basic.target. Oct 2 19:45:13.075744 systemd[1166]: Reached target default.target. Oct 2 19:45:13.075775 systemd[1166]: Startup finished in 56ms. Oct 2 19:45:13.075813 systemd[1]: Started user@500.service. Oct 2 19:45:13.076596 systemd[1]: Started session-1.scope. Oct 2 19:45:13.125870 systemd[1]: Started sshd@1-10.0.0.10:22-10.0.0.1:54218.service. Oct 2 19:45:13.156764 sshd[1175]: Accepted publickey for core from 10.0.0.1 port 54218 ssh2: RSA SHA256:+DuZ6jeJ+85lrS0QTsE47nySPANyTUNJwedXcdEfg68 Oct 2 19:45:13.157338 sshd[1175]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:45:13.160463 systemd-logind[1092]: New session 2 of user core. Oct 2 19:45:13.161410 systemd[1]: Started session-2.scope. Oct 2 19:45:13.214042 sshd[1175]: pam_unix(sshd:session): session closed for user core Oct 2 19:45:13.216487 systemd[1]: sshd@1-10.0.0.10:22-10.0.0.1:54218.service: Deactivated successfully. Oct 2 19:45:13.216988 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 19:45:13.217506 systemd-logind[1092]: Session 2 logged out. Waiting for processes to exit. Oct 2 19:45:13.218489 systemd[1]: Started sshd@2-10.0.0.10:22-10.0.0.1:54224.service. Oct 2 19:45:13.219101 systemd-logind[1092]: Removed session 2. Oct 2 19:45:13.249775 sshd[1181]: Accepted publickey for core from 10.0.0.1 port 54224 ssh2: RSA SHA256:+DuZ6jeJ+85lrS0QTsE47nySPANyTUNJwedXcdEfg68 Oct 2 19:45:13.250787 sshd[1181]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:45:13.253698 systemd-logind[1092]: New session 3 of user core. Oct 2 19:45:13.254375 systemd[1]: Started session-3.scope. Oct 2 19:45:13.304381 sshd[1181]: pam_unix(sshd:session): session closed for user core Oct 2 19:45:13.306858 systemd[1]: sshd@2-10.0.0.10:22-10.0.0.1:54224.service: Deactivated successfully. Oct 2 19:45:13.307370 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 19:45:13.307787 systemd-logind[1092]: Session 3 logged out. Waiting for processes to exit. Oct 2 19:45:13.308670 systemd[1]: Started sshd@3-10.0.0.10:22-10.0.0.1:54240.service. Oct 2 19:45:13.309418 systemd-logind[1092]: Removed session 3. Oct 2 19:45:13.339734 sshd[1188]: Accepted publickey for core from 10.0.0.1 port 54240 ssh2: RSA SHA256:+DuZ6jeJ+85lrS0QTsE47nySPANyTUNJwedXcdEfg68 Oct 2 19:45:13.340878 sshd[1188]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:45:13.344282 systemd-logind[1092]: New session 4 of user core. Oct 2 19:45:13.345140 systemd[1]: Started session-4.scope. Oct 2 19:45:13.398388 sshd[1188]: pam_unix(sshd:session): session closed for user core Oct 2 19:45:13.400667 systemd[1]: sshd@3-10.0.0.10:22-10.0.0.1:54240.service: Deactivated successfully. Oct 2 19:45:13.401116 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:45:13.401577 systemd-logind[1092]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:45:13.402374 systemd[1]: Started sshd@4-10.0.0.10:22-10.0.0.1:54254.service. Oct 2 19:45:13.403109 systemd-logind[1092]: Removed session 4. Oct 2 19:45:13.435223 sshd[1194]: Accepted publickey for core from 10.0.0.1 port 54254 ssh2: RSA SHA256:+DuZ6jeJ+85lrS0QTsE47nySPANyTUNJwedXcdEfg68 Oct 2 19:45:13.436338 sshd[1194]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:45:13.439818 systemd-logind[1092]: New session 5 of user core. Oct 2 19:45:13.440535 systemd[1]: Started session-5.scope. Oct 2 19:45:13.498991 sudo[1197]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:45:13.499206 sudo[1197]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:45:13.508354 dbus-daemon[1080]: \xd0\u000d\x9d\x9c\u0018V: received setenforce notice (enforcing=-900661504) Oct 2 19:45:13.510248 sudo[1197]: pam_unix(sudo:session): session closed for user root Oct 2 19:45:13.512052 sshd[1194]: pam_unix(sshd:session): session closed for user core Oct 2 19:45:13.514782 systemd[1]: sshd@4-10.0.0.10:22-10.0.0.1:54254.service: Deactivated successfully. Oct 2 19:45:13.515305 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:45:13.515713 systemd-logind[1092]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:45:13.516547 systemd[1]: Started sshd@5-10.0.0.10:22-10.0.0.1:54268.service. Oct 2 19:45:13.517119 systemd-logind[1092]: Removed session 5. Oct 2 19:45:13.547635 sshd[1201]: Accepted publickey for core from 10.0.0.1 port 54268 ssh2: RSA SHA256:+DuZ6jeJ+85lrS0QTsE47nySPANyTUNJwedXcdEfg68 Oct 2 19:45:13.548765 sshd[1201]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:45:13.551501 systemd-logind[1092]: New session 6 of user core. Oct 2 19:45:13.552245 systemd[1]: Started session-6.scope. Oct 2 19:45:13.603159 sudo[1205]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:45:13.603326 sudo[1205]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:45:13.605585 sudo[1205]: pam_unix(sudo:session): session closed for user root Oct 2 19:45:13.608676 sudo[1204]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:45:13.608827 sudo[1204]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:45:13.615648 systemd[1]: Stopping audit-rules.service... Oct 2 19:45:13.615000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:45:13.616479 auditctl[1208]: No rules Oct 2 19:45:13.616789 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:45:13.616901 systemd[1]: Stopped audit-rules.service. Oct 2 19:45:13.617912 systemd[1]: Starting audit-rules.service... Oct 2 19:45:13.626142 kernel: kauditd_printk_skb: 234 callbacks suppressed Oct 2 19:45:13.626213 kernel: audit: type=1305 audit(1696275913.615:165): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:45:13.615000 audit[1208]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff6be1ed90 a2=420 a3=0 items=0 ppid=1 pid=1208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:13.630260 kernel: audit: type=1300 audit(1696275913.615:165): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff6be1ed90 a2=420 a3=0 items=0 ppid=1 pid=1208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:13.630294 kernel: audit: type=1327 audit(1696275913.615:165): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:45:13.615000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:45:13.631109 augenrules[1225]: No rules Oct 2 19:45:13.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:13.631557 systemd[1]: Finished audit-rules.service. Oct 2 19:45:13.632371 sudo[1204]: pam_unix(sudo:session): session closed for user root Oct 2 19:45:13.633131 kernel: audit: type=1131 audit(1696275913.615:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:13.633176 kernel: audit: type=1130 audit(1696275913.630:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:13.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:13.633653 sshd[1201]: pam_unix(sshd:session): session closed for user core Oct 2 19:45:13.631000 audit[1204]: USER_END pid=1204 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:45:13.636119 systemd[1]: sshd@5-10.0.0.10:22-10.0.0.1:54268.service: Deactivated successfully. Oct 2 19:45:13.636658 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:45:13.637156 systemd-logind[1092]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:45:13.637603 kernel: audit: type=1106 audit(1696275913.631:168): pid=1204 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:45:13.637638 kernel: audit: type=1104 audit(1696275913.631:169): pid=1204 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:45:13.631000 audit[1204]: CRED_DISP pid=1204 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:45:13.638074 systemd[1]: Started sshd@6-10.0.0.10:22-10.0.0.1:54284.service. Oct 2 19:45:13.638846 systemd-logind[1092]: Removed session 6. Oct 2 19:45:13.633000 audit[1201]: USER_END pid=1201 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:45:13.642270 kernel: audit: type=1106 audit(1696275913.633:170): pid=1201 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:45:13.642296 kernel: audit: type=1104 audit(1696275913.633:171): pid=1201 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:45:13.633000 audit[1201]: CRED_DISP pid=1201 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:45:13.644374 kernel: audit: type=1131 audit(1696275913.635:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.10:22-10.0.0.1:54268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:13.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.10:22-10.0.0.1:54268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:13.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.10:22-10.0.0.1:54284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:13.670000 audit[1231]: USER_ACCT pid=1231 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:45:13.670802 sshd[1231]: Accepted publickey for core from 10.0.0.1 port 54284 ssh2: RSA SHA256:+DuZ6jeJ+85lrS0QTsE47nySPANyTUNJwedXcdEfg68 Oct 2 19:45:13.671000 audit[1231]: CRED_ACQ pid=1231 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:45:13.671000 audit[1231]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf360a9a0 a2=3 a3=0 items=0 ppid=1 pid=1231 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:13.671000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:45:13.671667 sshd[1231]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:45:13.674496 systemd-logind[1092]: New session 7 of user core. Oct 2 19:45:13.675333 systemd[1]: Started session-7.scope. Oct 2 19:45:13.678000 audit[1231]: USER_START pid=1231 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:45:13.678000 audit[1233]: CRED_ACQ pid=1233 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:45:13.724000 audit[1234]: USER_ACCT pid=1234 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:45:13.724000 audit[1234]: CRED_REFR pid=1234 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:45:13.726015 sudo[1234]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:45:13.726177 sudo[1234]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:45:13.726000 audit[1234]: USER_START pid=1234 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:45:14.306582 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:45:14.312524 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:45:14.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:14.312855 systemd[1]: Reached target network-online.target. Oct 2 19:45:14.314373 systemd[1]: Starting docker.service... Oct 2 19:45:14.349277 env[1252]: time="2023-10-02T19:45:14.349231165Z" level=info msg="Starting up" Oct 2 19:45:14.350822 env[1252]: time="2023-10-02T19:45:14.350805734Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:45:14.350893 env[1252]: time="2023-10-02T19:45:14.350873579Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:45:14.350985 env[1252]: time="2023-10-02T19:45:14.350965038Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:45:14.351051 env[1252]: time="2023-10-02T19:45:14.351034535Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:45:14.352458 env[1252]: time="2023-10-02T19:45:14.352419857Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:45:14.352458 env[1252]: time="2023-10-02T19:45:14.352449628Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:45:14.352606 env[1252]: time="2023-10-02T19:45:14.352474786Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:45:14.352606 env[1252]: time="2023-10-02T19:45:14.352485152Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:45:14.751009 env[1252]: time="2023-10-02T19:45:14.750906501Z" level=info msg="Loading containers: start." Oct 2 19:45:14.790000 audit[1286]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1286 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.790000 audit[1286]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffdc1aa2970 a2=0 a3=7ffdc1aa295c items=0 ppid=1252 pid=1286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.790000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 19:45:14.791000 audit[1288]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1288 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.791000 audit[1288]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffef87b6440 a2=0 a3=7ffef87b642c items=0 ppid=1252 pid=1288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.791000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 19:45:14.793000 audit[1290]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1290 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.793000 audit[1290]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffc95c1d20 a2=0 a3=7fffc95c1d0c items=0 ppid=1252 pid=1290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.793000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:45:14.794000 audit[1292]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1292 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.794000 audit[1292]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffbc61b480 a2=0 a3=7fffbc61b46c items=0 ppid=1252 pid=1292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.794000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:45:14.796000 audit[1294]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1294 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.796000 audit[1294]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcdc65fbd0 a2=0 a3=7ffcdc65fbbc items=0 ppid=1252 pid=1294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.796000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 19:45:14.809000 audit[1299]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1299 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.809000 audit[1299]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffb6dac850 a2=0 a3=7fffb6dac83c items=0 ppid=1252 pid=1299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.809000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 19:45:14.819000 audit[1301]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1301 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.819000 audit[1301]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff4d638670 a2=0 a3=7fff4d63865c items=0 ppid=1252 pid=1301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.819000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 19:45:14.820000 audit[1303]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1303 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.820000 audit[1303]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fffb12aee00 a2=0 a3=7fffb12aedec items=0 ppid=1252 pid=1303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.820000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 19:45:14.821000 audit[1305]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1305 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.821000 audit[1305]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe3adbb3e0 a2=0 a3=7ffe3adbb3cc items=0 ppid=1252 pid=1305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.821000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:45:14.829000 audit[1309]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1309 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.829000 audit[1309]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd9f5031a0 a2=0 a3=7ffd9f50318c items=0 ppid=1252 pid=1309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.829000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:45:14.830000 audit[1310]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.830000 audit[1310]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc6765d530 a2=0 a3=7ffc6765d51c items=0 ppid=1252 pid=1310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.830000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:45:14.838183 kernel: Initializing XFRM netlink socket Oct 2 19:45:14.868964 env[1252]: time="2023-10-02T19:45:14.868907380Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 19:45:14.887000 audit[1318]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.887000 audit[1318]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffcabd07c00 a2=0 a3=7ffcabd07bec items=0 ppid=1252 pid=1318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.887000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 19:45:14.897000 audit[1321]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.897000 audit[1321]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc833d80c0 a2=0 a3=7ffc833d80ac items=0 ppid=1252 pid=1321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.897000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 19:45:14.899000 audit[1324]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.899000 audit[1324]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd5ddfffb0 a2=0 a3=7ffd5ddfff9c items=0 ppid=1252 pid=1324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.899000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 19:45:14.900000 audit[1326]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.900000 audit[1326]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc17190f30 a2=0 a3=7ffc17190f1c items=0 ppid=1252 pid=1326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.900000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 19:45:14.902000 audit[1328]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.902000 audit[1328]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc6f1866a0 a2=0 a3=7ffc6f18668c items=0 ppid=1252 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.902000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 19:45:14.903000 audit[1330]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.903000 audit[1330]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff1842aa60 a2=0 a3=7fff1842aa4c items=0 ppid=1252 pid=1330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.903000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 19:45:14.905000 audit[1332]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.905000 audit[1332]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff96ededc0 a2=0 a3=7fff96ededac items=0 ppid=1252 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.905000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 19:45:14.911000 audit[1335]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1335 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.911000 audit[1335]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffdf433f3b0 a2=0 a3=7ffdf433f39c items=0 ppid=1252 pid=1335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.911000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 19:45:14.912000 audit[1337]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.912000 audit[1337]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff73129040 a2=0 a3=7fff7312902c items=0 ppid=1252 pid=1337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.912000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:45:14.914000 audit[1339]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.914000 audit[1339]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fffea73b110 a2=0 a3=7fffea73b0fc items=0 ppid=1252 pid=1339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.914000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:45:14.915000 audit[1341]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.915000 audit[1341]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe2df1b320 a2=0 a3=7ffe2df1b30c items=0 ppid=1252 pid=1341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.915000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 19:45:14.916936 systemd-networkd[1011]: docker0: Link UP Oct 2 19:45:14.925000 audit[1345]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.925000 audit[1345]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcf9e2e280 a2=0 a3=7ffcf9e2e26c items=0 ppid=1252 pid=1345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.925000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:45:14.925000 audit[1346]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:14.925000 audit[1346]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc51b7d6b0 a2=0 a3=7ffc51b7d69c items=0 ppid=1252 pid=1346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:14.925000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:45:14.927349 env[1252]: time="2023-10-02T19:45:14.927312809Z" level=info msg="Loading containers: done." Oct 2 19:45:14.940223 env[1252]: time="2023-10-02T19:45:14.940139996Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 19:45:14.940432 env[1252]: time="2023-10-02T19:45:14.940401913Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 19:45:14.940570 env[1252]: time="2023-10-02T19:45:14.940543568Z" level=info msg="Daemon has completed initialization" Oct 2 19:45:14.958289 systemd[1]: Started docker.service. Oct 2 19:45:14.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:14.963680 env[1252]: time="2023-10-02T19:45:14.963626217Z" level=info msg="API listen on /run/docker.sock" Oct 2 19:45:14.978452 systemd[1]: Reloading. Oct 2 19:45:15.030425 /usr/lib/systemd/system-generators/torcx-generator[1393]: time="2023-10-02T19:45:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:45:15.030451 /usr/lib/systemd/system-generators/torcx-generator[1393]: time="2023-10-02T19:45:15Z" level=info msg="torcx already run" Oct 2 19:45:15.081563 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:45:15.081580 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:45:15.098265 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:45:15.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.154000 audit: BPF prog-id=37 op=LOAD Oct 2 19:45:15.154000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:45:15.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit: BPF prog-id=38 op=LOAD Oct 2 19:45:15.155000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit: BPF prog-id=39 op=LOAD Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit: BPF prog-id=40 op=LOAD Oct 2 19:45:15.155000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:45:15.155000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit: BPF prog-id=41 op=LOAD Oct 2 19:45:15.155000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit: BPF prog-id=42 op=LOAD Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit: BPF prog-id=43 op=LOAD Oct 2 19:45:15.156000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:45:15.156000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit: BPF prog-id=44 op=LOAD Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.156000 audit: BPF prog-id=45 op=LOAD Oct 2 19:45:15.156000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:45:15.156000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:45:15.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.158000 audit: BPF prog-id=46 op=LOAD Oct 2 19:45:15.158000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit: BPF prog-id=47 op=LOAD Oct 2 19:45:15.159000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit: BPF prog-id=48 op=LOAD Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.159000 audit: BPF prog-id=49 op=LOAD Oct 2 19:45:15.159000 audit: BPF prog-id=33 op=UNLOAD Oct 2 19:45:15.159000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:45:15.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.161000 audit: BPF prog-id=50 op=LOAD Oct 2 19:45:15.161000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:45:15.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:15.161000 audit: BPF prog-id=51 op=LOAD Oct 2 19:45:15.161000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:45:15.170532 systemd[1]: Started kubelet.service. Oct 2 19:45:15.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:15.215522 kubelet[1434]: E1002 19:45:15.215470 1434 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:45:15.217655 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:45:15.217761 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:45:15.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:45:15.538554 env[1106]: time="2023-10-02T19:45:15.538505393Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.6\"" Oct 2 19:45:16.214709 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1638980670.mount: Deactivated successfully. Oct 2 19:45:17.795924 env[1106]: time="2023-10-02T19:45:17.795811063Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:17.797885 env[1106]: time="2023-10-02T19:45:17.797855759Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:19b9246d37c8b8c754a8af86facf1975604cfc709fc0ff736531917402189d9c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:17.801718 env[1106]: time="2023-10-02T19:45:17.801673960Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:17.803283 env[1106]: time="2023-10-02T19:45:17.803249737Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5e7a0196a7908cb49bcbf751d2546a008c329ff1e70c26c1cd542e0ada4b623c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:17.804068 env[1106]: time="2023-10-02T19:45:17.804043608Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.6\" returns image reference \"sha256:19b9246d37c8b8c754a8af86facf1975604cfc709fc0ff736531917402189d9c\"" Oct 2 19:45:17.812123 env[1106]: time="2023-10-02T19:45:17.812078122Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.6\"" Oct 2 19:45:24.735230 env[1106]: time="2023-10-02T19:45:24.735141170Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:24.864007 env[1106]: time="2023-10-02T19:45:24.863945635Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7810e6aed9778a5f84fc93f48b0c52edfc55333d7b8de7c71972df8c5b925988,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:25.069327 env[1106]: time="2023-10-02T19:45:25.069183505Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:25.145175 env[1106]: time="2023-10-02T19:45:25.145094305Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:c76ca5b0cf607f82c54d51c3c6766da30c9a9f684065e1cac761ea9b07b74e97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:25.146013 env[1106]: time="2023-10-02T19:45:25.145967175Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.6\" returns image reference \"sha256:7810e6aed9778a5f84fc93f48b0c52edfc55333d7b8de7c71972df8c5b925988\"" Oct 2 19:45:25.157399 env[1106]: time="2023-10-02T19:45:25.157369337Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.6\"" Oct 2 19:45:25.468484 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 19:45:25.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:25.468709 systemd[1]: Stopped kubelet.service. Oct 2 19:45:25.469373 kernel: kauditd_printk_skb: 259 callbacks suppressed Oct 2 19:45:25.469454 kernel: audit: type=1130 audit(1696275925.467:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:25.470257 systemd[1]: Started kubelet.service. Oct 2 19:45:25.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:25.473533 kernel: audit: type=1131 audit(1696275925.467:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:25.473583 kernel: audit: type=1130 audit(1696275925.469:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:25.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:25.509885 kubelet[1472]: E1002 19:45:25.509834 1472 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:45:25.512799 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:45:25.512907 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:45:25.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:45:25.515184 kernel: audit: type=1131 audit(1696275925.511:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:45:29.078787 env[1106]: time="2023-10-02T19:45:29.078732422Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:29.081368 env[1106]: time="2023-10-02T19:45:29.081346928Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:993d768b9b96e874c4a171298200661de0d28e52f4d8764e6b2ed1c42470851d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:29.083734 env[1106]: time="2023-10-02T19:45:29.083710762Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:29.085410 env[1106]: time="2023-10-02T19:45:29.085384935Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:bb227512d96e93dd3fe356cef552cc3f78905f36330b762adde23c3f0943d57b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:29.085992 env[1106]: time="2023-10-02T19:45:29.085959395Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.6\" returns image reference \"sha256:993d768b9b96e874c4a171298200661de0d28e52f4d8764e6b2ed1c42470851d\"" Oct 2 19:45:29.094302 env[1106]: time="2023-10-02T19:45:29.094272363Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\"" Oct 2 19:45:30.283479 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount451328899.mount: Deactivated successfully. Oct 2 19:45:30.915526 env[1106]: time="2023-10-02T19:45:30.915378850Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:30.960284 env[1106]: time="2023-10-02T19:45:30.956436899Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ec57bbfaaae73ecc3c12f05d5ae974468cc0ef356dee588cd15fd471815c7985,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:30.981031 env[1106]: time="2023-10-02T19:45:30.980942815Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:30.998325 env[1106]: time="2023-10-02T19:45:30.998245290Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8e9eff2f6d0b398f9ac5f5a15c1cb7d5f468f28d64a78d593d57f72a969a54ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:30.999996 env[1106]: time="2023-10-02T19:45:30.998954939Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\" returns image reference \"sha256:ec57bbfaaae73ecc3c12f05d5ae974468cc0ef356dee588cd15fd471815c7985\"" Oct 2 19:45:31.031257 env[1106]: time="2023-10-02T19:45:31.031148002Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 19:45:31.623332 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount983239232.mount: Deactivated successfully. Oct 2 19:45:31.629144 env[1106]: time="2023-10-02T19:45:31.629095077Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:31.630797 env[1106]: time="2023-10-02T19:45:31.630756141Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:31.632612 env[1106]: time="2023-10-02T19:45:31.632582050Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:31.634094 env[1106]: time="2023-10-02T19:45:31.634066881Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:31.634680 env[1106]: time="2023-10-02T19:45:31.634647005Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Oct 2 19:45:31.643911 env[1106]: time="2023-10-02T19:45:31.643865244Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Oct 2 19:45:32.861200 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3656679979.mount: Deactivated successfully. Oct 2 19:45:35.669552 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 2 19:45:35.675915 kernel: audit: type=1130 audit(1696275935.668:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:35.675955 kernel: audit: type=1131 audit(1696275935.668:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:35.675972 kernel: audit: type=1130 audit(1696275935.670:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:35.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:35.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:35.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:35.669790 systemd[1]: Stopped kubelet.service. Oct 2 19:45:35.671109 systemd[1]: Started kubelet.service. Oct 2 19:45:35.718633 kubelet[1499]: E1002 19:45:35.718575 1499 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:45:35.720669 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:45:35.720825 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:45:35.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:45:35.723178 kernel: audit: type=1131 audit(1696275935.719:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:45:39.994995 env[1106]: time="2023-10-02T19:45:39.994928108Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:39.997302 env[1106]: time="2023-10-02T19:45:39.997242087Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:39.999071 env[1106]: time="2023-10-02T19:45:39.999029493Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:40.000765 env[1106]: time="2023-10-02T19:45:40.000720680Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:40.001397 env[1106]: time="2023-10-02T19:45:40.001362657Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Oct 2 19:45:40.014373 env[1106]: time="2023-10-02T19:45:40.014319666Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Oct 2 19:45:40.576899 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1393122305.mount: Deactivated successfully. Oct 2 19:45:42.631056 env[1106]: time="2023-10-02T19:45:42.631011284Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:42.632746 env[1106]: time="2023-10-02T19:45:42.632722637Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:42.634303 env[1106]: time="2023-10-02T19:45:42.634280584Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:42.635626 env[1106]: time="2023-10-02T19:45:42.635602650Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:42.635994 env[1106]: time="2023-10-02T19:45:42.635972757Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Oct 2 19:45:45.919498 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Oct 2 19:45:45.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:45.919674 systemd[1]: Stopped kubelet.service. Oct 2 19:45:45.920990 systemd[1]: Started kubelet.service. Oct 2 19:45:45.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:45.923515 kernel: audit: type=1130 audit(1696275945.918:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:45.923577 kernel: audit: type=1131 audit(1696275945.918:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:45.923596 kernel: audit: type=1130 audit(1696275945.919:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:45.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:45.955281 kubelet[1541]: E1002 19:45:45.955223 1541 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:45:45.956973 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:45:45.957126 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:45:45.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:45:45.960173 kernel: audit: type=1131 audit(1696275945.956:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:45:54.209321 update_engine[1095]: I1002 19:45:54.209249 1095 update_attempter.cc:505] Updating boot flags... Oct 2 19:45:54.826693 systemd[1]: Stopped kubelet.service. Oct 2 19:45:54.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:54.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:54.829177 kernel: audit: type=1130 audit(1696275954.825:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:54.829237 kernel: audit: type=1131 audit(1696275954.827:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:54.842184 systemd[1]: Reloading. Oct 2 19:45:54.900135 /usr/lib/systemd/system-generators/torcx-generator[1634]: time="2023-10-02T19:45:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:45:54.900192 /usr/lib/systemd/system-generators/torcx-generator[1634]: time="2023-10-02T19:45:54Z" level=info msg="torcx already run" Oct 2 19:45:54.955582 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:45:54.955598 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:45:54.972050 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:45:55.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.033524 kernel: audit: type=1400 audit(1696275955.028:396): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.033576 kernel: audit: type=1400 audit(1696275955.028:397): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.033614 kernel: audit: type=1400 audit(1696275955.028:398): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.037177 kernel: audit: type=1400 audit(1696275955.028:399): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.037205 kernel: audit: type=1400 audit(1696275955.028:400): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.038999 kernel: audit: type=1400 audit(1696275955.028:401): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.040795 kernel: audit: type=1400 audit(1696275955.028:402): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.042618 kernel: audit: type=1400 audit(1696275955.028:403): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.032000 audit: BPF prog-id=52 op=LOAD Oct 2 19:45:55.032000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:45:55.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.034000 audit: BPF prog-id=53 op=LOAD Oct 2 19:45:55.034000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:45:55.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.036000 audit: BPF prog-id=54 op=LOAD Oct 2 19:45:55.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.039000 audit: BPF prog-id=55 op=LOAD Oct 2 19:45:55.039000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:45:55.039000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:45:55.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.041000 audit: BPF prog-id=56 op=LOAD Oct 2 19:45:55.041000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:45:55.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.043000 audit: BPF prog-id=57 op=LOAD Oct 2 19:45:55.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.043000 audit: BPF prog-id=58 op=LOAD Oct 2 19:45:55.043000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:45:55.043000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:45:55.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.044000 audit: BPF prog-id=59 op=LOAD Oct 2 19:45:55.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.044000 audit: BPF prog-id=60 op=LOAD Oct 2 19:45:55.044000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:45:55.044000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:45:55.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.045000 audit: BPF prog-id=61 op=LOAD Oct 2 19:45:55.045000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:45:55.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.046000 audit: BPF prog-id=62 op=LOAD Oct 2 19:45:55.046000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:45:55.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.047000 audit: BPF prog-id=63 op=LOAD Oct 2 19:45:55.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.047000 audit: BPF prog-id=64 op=LOAD Oct 2 19:45:55.047000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:45:55.047000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:45:55.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.048000 audit: BPF prog-id=65 op=LOAD Oct 2 19:45:55.048000 audit: BPF prog-id=50 op=UNLOAD Oct 2 19:45:55.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.048000 audit: BPF prog-id=66 op=LOAD Oct 2 19:45:55.049000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:45:55.061002 systemd[1]: Started kubelet.service. Oct 2 19:45:55.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:45:55.100097 kubelet[1675]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:45:55.100097 kubelet[1675]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:45:55.100097 kubelet[1675]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:45:55.100494 kubelet[1675]: I1002 19:45:55.100093 1675 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:45:55.577634 kubelet[1675]: I1002 19:45:55.577602 1675 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Oct 2 19:45:55.577634 kubelet[1675]: I1002 19:45:55.577628 1675 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:45:55.577858 kubelet[1675]: I1002 19:45:55.577844 1675 server.go:837] "Client rotation is on, will bootstrap in background" Oct 2 19:45:55.580636 kubelet[1675]: I1002 19:45:55.580597 1675 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:45:55.581305 kubelet[1675]: E1002 19:45:55.581286 1675 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.10:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.10:6443: connect: connection refused Oct 2 19:45:55.583476 kubelet[1675]: I1002 19:45:55.583455 1675 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:45:55.583622 kubelet[1675]: I1002 19:45:55.583603 1675 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:45:55.583673 kubelet[1675]: I1002 19:45:55.583663 1675 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 19:45:55.583760 kubelet[1675]: I1002 19:45:55.583680 1675 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:45:55.583760 kubelet[1675]: I1002 19:45:55.583689 1675 container_manager_linux.go:302] "Creating device plugin manager" Oct 2 19:45:55.583760 kubelet[1675]: I1002 19:45:55.583758 1675 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:45:55.585956 kubelet[1675]: I1002 19:45:55.585941 1675 kubelet.go:405] "Attempting to sync node with API server" Oct 2 19:45:55.585999 kubelet[1675]: I1002 19:45:55.585963 1675 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:45:55.585999 kubelet[1675]: I1002 19:45:55.585984 1675 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:45:55.585999 kubelet[1675]: I1002 19:45:55.585998 1675 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:45:55.586645 kubelet[1675]: I1002 19:45:55.586625 1675 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:45:55.586645 kubelet[1675]: W1002 19:45:55.586623 1675 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.10:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.10:6443: connect: connection refused Oct 2 19:45:55.586707 kubelet[1675]: E1002 19:45:55.586666 1675 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.10:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.10:6443: connect: connection refused Oct 2 19:45:55.586801 kubelet[1675]: W1002 19:45:55.586746 1675 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.10:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.10:6443: connect: connection refused Oct 2 19:45:55.586801 kubelet[1675]: E1002 19:45:55.586794 1675 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.10:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.10:6443: connect: connection refused Oct 2 19:45:55.586922 kubelet[1675]: W1002 19:45:55.586834 1675 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:45:55.587186 kubelet[1675]: I1002 19:45:55.587172 1675 server.go:1168] "Started kubelet" Oct 2 19:45:55.587265 kubelet[1675]: I1002 19:45:55.587251 1675 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:45:55.587354 kubelet[1675]: I1002 19:45:55.587344 1675 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:45:55.588406 kubelet[1675]: E1002 19:45:55.588319 1675 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.178a61fe8dced2bc", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 45, 55, 587142332, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 45, 55, 587142332, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.0.0.10:6443/api/v1/namespaces/default/events": dial tcp 10.0.0.10:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:45:55.588490 kubelet[1675]: E1002 19:45:55.588473 1675 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:45:55.588559 kubelet[1675]: E1002 19:45:55.588541 1675 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:45:55.590203 kubelet[1675]: I1002 19:45:55.590088 1675 server.go:461] "Adding debug handlers to kubelet server" Oct 2 19:45:55.589000 audit[1675]: AVC avc: denied { mac_admin } for pid=1675 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.589000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:45:55.589000 audit[1675]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cd2480 a1=c000529380 a2=c000cd2450 a3=25 items=0 ppid=1 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:55.589000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:45:55.589000 audit[1675]: AVC avc: denied { mac_admin } for pid=1675 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.589000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:45:55.589000 audit[1675]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00007e440 a1=c000529398 a2=c000cd2510 a3=25 items=0 ppid=1 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:55.589000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:45:55.591418 kubelet[1675]: I1002 19:45:55.591097 1675 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:45:55.591418 kubelet[1675]: I1002 19:45:55.591128 1675 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:45:55.591418 kubelet[1675]: I1002 19:45:55.591194 1675 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:45:55.591709 kubelet[1675]: I1002 19:45:55.591698 1675 volume_manager.go:284] "Starting Kubelet Volume Manager" Oct 2 19:45:55.591858 kubelet[1675]: I1002 19:45:55.591838 1675 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Oct 2 19:45:55.592085 kubelet[1675]: W1002 19:45:55.592052 1675 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.10:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.10:6443: connect: connection refused Oct 2 19:45:55.592133 kubelet[1675]: E1002 19:45:55.592089 1675 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.10:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.10:6443: connect: connection refused Oct 2 19:45:55.592423 kubelet[1675]: E1002 19:45:55.592407 1675 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.10:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.10:6443: connect: connection refused" interval="200ms" Oct 2 19:45:55.593000 audit[1687]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:55.593000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff12aabee0 a2=0 a3=7fff12aabecc items=0 ppid=1675 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:55.593000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:45:55.594000 audit[1688]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:55.594000 audit[1688]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe264cfdc0 a2=0 a3=7ffe264cfdac items=0 ppid=1675 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:55.594000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:45:55.595000 audit[1690]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:55.595000 audit[1690]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff2ece5010 a2=0 a3=7fff2ece4ffc items=0 ppid=1675 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:55.595000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:45:55.596000 audit[1692]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:55.596000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffb6f84a70 a2=0 a3=7fffb6f84a5c items=0 ppid=1675 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:55.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:45:55.600000 audit[1695]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:55.600000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcfe720640 a2=0 a3=7ffcfe72062c items=0 ppid=1675 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:55.600000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:45:55.602132 kubelet[1675]: I1002 19:45:55.602122 1675 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:45:55.601000 audit[1696]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:45:55.601000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffefd46b070 a2=0 a3=7ffefd46b05c items=0 ppid=1675 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:55.601000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:45:55.602822 kubelet[1675]: I1002 19:45:55.602810 1675 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:45:55.602855 kubelet[1675]: I1002 19:45:55.602832 1675 status_manager.go:207] "Starting to sync pod status with apiserver" Oct 2 19:45:55.602855 kubelet[1675]: I1002 19:45:55.602845 1675 kubelet.go:2257] "Starting kubelet main sync loop" Oct 2 19:45:55.602897 kubelet[1675]: E1002 19:45:55.602879 1675 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:45:55.602000 audit[1697]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:55.602000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8d5b8c80 a2=0 a3=7ffc8d5b8c6c items=0 ppid=1675 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:55.602000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:45:55.603000 audit[1698]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:55.603000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd228a5ac0 a2=0 a3=7ffd228a5aac items=0 ppid=1675 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:55.603000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:45:55.603000 audit[1700]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:45:55.603000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffecad9b910 a2=0 a3=7ffecad9b8fc items=0 ppid=1675 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:55.603000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:45:55.604000 audit[1702]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:45:55.604000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9896d010 a2=0 a3=7ffe9896cffc items=0 ppid=1675 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:55.604000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:45:55.604000 audit[1703]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1703 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:45:55.604000 audit[1703]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffce7d97bf0 a2=0 a3=7ffce7d97bdc items=0 ppid=1675 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:55.604000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:45:55.606320 kubelet[1675]: W1002 19:45:55.606296 1675 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.10:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.10:6443: connect: connection refused Oct 2 19:45:55.606320 kubelet[1675]: E1002 19:45:55.606318 1675 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.10:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.10:6443: connect: connection refused Oct 2 19:45:55.605000 audit[1704]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:45:55.605000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc9a0757f0 a2=0 a3=7ffc9a0757dc items=0 ppid=1675 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:55.605000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:45:55.606950 kubelet[1675]: I1002 19:45:55.606932 1675 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:45:55.606950 kubelet[1675]: I1002 19:45:55.606942 1675 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:45:55.606950 kubelet[1675]: I1002 19:45:55.606952 1675 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:45:55.610403 kubelet[1675]: I1002 19:45:55.610375 1675 policy_none.go:49] "None policy: Start" Oct 2 19:45:55.610832 kubelet[1675]: I1002 19:45:55.610805 1675 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:45:55.610832 kubelet[1675]: I1002 19:45:55.610830 1675 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:45:55.615647 systemd[1]: Created slice kubepods.slice. Oct 2 19:45:55.618578 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:45:55.620627 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:45:55.628717 kubelet[1675]: I1002 19:45:55.628691 1675 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:45:55.627000 audit[1675]: AVC avc: denied { mac_admin } for pid=1675 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:55.627000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:45:55.627000 audit[1675]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bf17a0 a1=c000d81b60 a2=c000bf1770 a3=25 items=0 ppid=1 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:55.627000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:45:55.628935 kubelet[1675]: I1002 19:45:55.628745 1675 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:45:55.628935 kubelet[1675]: I1002 19:45:55.628867 1675 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:45:55.629699 kubelet[1675]: E1002 19:45:55.629683 1675 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Oct 2 19:45:55.693670 kubelet[1675]: I1002 19:45:55.693639 1675 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:45:55.693962 kubelet[1675]: E1002 19:45:55.693948 1675 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.10:6443/api/v1/nodes\": dial tcp 10.0.0.10:6443: connect: connection refused" node="localhost" Oct 2 19:45:55.703124 kubelet[1675]: I1002 19:45:55.703087 1675 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:45:55.703746 kubelet[1675]: I1002 19:45:55.703728 1675 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:45:55.704508 kubelet[1675]: I1002 19:45:55.704493 1675 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:45:55.708471 systemd[1]: Created slice kubepods-burstable-pod5b10122baf4331187bc39c630bea4e03.slice. Oct 2 19:45:55.714983 systemd[1]: Created slice kubepods-burstable-pod80b8b8966aa7d1c422f3be2bfac9c13f.slice. Oct 2 19:45:55.722817 systemd[1]: Created slice kubepods-burstable-pod24fef87020af50fba838138f9686fc61.slice. Oct 2 19:45:55.793318 kubelet[1675]: I1002 19:45:55.793280 1675 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5b10122baf4331187bc39c630bea4e03-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"5b10122baf4331187bc39c630bea4e03\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:45:55.793454 kubelet[1675]: I1002 19:45:55.793344 1675 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5b10122baf4331187bc39c630bea4e03-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"5b10122baf4331187bc39c630bea4e03\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:45:55.793454 kubelet[1675]: I1002 19:45:55.793367 1675 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:45:55.793454 kubelet[1675]: I1002 19:45:55.793383 1675 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5b10122baf4331187bc39c630bea4e03-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"5b10122baf4331187bc39c630bea4e03\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:45:55.793454 kubelet[1675]: I1002 19:45:55.793400 1675 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:45:55.793454 kubelet[1675]: I1002 19:45:55.793419 1675 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:45:55.793610 kubelet[1675]: I1002 19:45:55.793439 1675 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:45:55.793610 kubelet[1675]: I1002 19:45:55.793457 1675 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:45:55.793610 kubelet[1675]: I1002 19:45:55.793501 1675 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/24fef87020af50fba838138f9686fc61-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"24fef87020af50fba838138f9686fc61\") " pod="kube-system/kube-scheduler-localhost" Oct 2 19:45:55.793610 kubelet[1675]: E1002 19:45:55.793517 1675 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.10:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.10:6443: connect: connection refused" interval="400ms" Oct 2 19:45:55.895022 kubelet[1675]: I1002 19:45:55.894925 1675 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:45:55.895300 kubelet[1675]: E1002 19:45:55.895278 1675 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.10:6443/api/v1/nodes\": dial tcp 10.0.0.10:6443: connect: connection refused" node="localhost" Oct 2 19:45:56.014936 kubelet[1675]: E1002 19:45:56.014897 1675 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:45:56.015628 env[1106]: time="2023-10-02T19:45:56.015579790Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:5b10122baf4331187bc39c630bea4e03,Namespace:kube-system,Attempt:0,}" Oct 2 19:45:56.021706 kubelet[1675]: E1002 19:45:56.021679 1675 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:45:56.022206 env[1106]: time="2023-10-02T19:45:56.022140396Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:80b8b8966aa7d1c422f3be2bfac9c13f,Namespace:kube-system,Attempt:0,}" Oct 2 19:45:56.024347 kubelet[1675]: E1002 19:45:56.024328 1675 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:45:56.024624 env[1106]: time="2023-10-02T19:45:56.024597273Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:24fef87020af50fba838138f9686fc61,Namespace:kube-system,Attempt:0,}" Oct 2 19:45:56.193909 kubelet[1675]: E1002 19:45:56.193874 1675 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.10:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.10:6443: connect: connection refused" interval="800ms" Oct 2 19:45:56.297310 kubelet[1675]: I1002 19:45:56.297283 1675 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:45:56.297650 kubelet[1675]: E1002 19:45:56.297624 1675 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.10:6443/api/v1/nodes\": dial tcp 10.0.0.10:6443: connect: connection refused" node="localhost" Oct 2 19:45:56.409683 kubelet[1675]: W1002 19:45:56.409624 1675 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.10:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.10:6443: connect: connection refused Oct 2 19:45:56.409683 kubelet[1675]: E1002 19:45:56.409668 1675 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.10:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.10:6443: connect: connection refused Oct 2 19:45:56.529379 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2594786356.mount: Deactivated successfully. Oct 2 19:45:56.534738 env[1106]: time="2023-10-02T19:45:56.534688913Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:56.535631 env[1106]: time="2023-10-02T19:45:56.535608924Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:56.537149 env[1106]: time="2023-10-02T19:45:56.537103078Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:56.538790 env[1106]: time="2023-10-02T19:45:56.538761552Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:56.540454 env[1106]: time="2023-10-02T19:45:56.540430187Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:56.541663 env[1106]: time="2023-10-02T19:45:56.541629423Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:56.543124 env[1106]: time="2023-10-02T19:45:56.543084410Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:56.544958 env[1106]: time="2023-10-02T19:45:56.544914170Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:56.545639 env[1106]: time="2023-10-02T19:45:56.545608820Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:56.547995 env[1106]: time="2023-10-02T19:45:56.547969188Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:56.548705 env[1106]: time="2023-10-02T19:45:56.548676793Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:56.550022 env[1106]: time="2023-10-02T19:45:56.550001003Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:45:56.566444 env[1106]: time="2023-10-02T19:45:56.566378337Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:45:56.566444 env[1106]: time="2023-10-02T19:45:56.566415389Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:45:56.566582 env[1106]: time="2023-10-02T19:45:56.566431131Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:45:56.566687 env[1106]: time="2023-10-02T19:45:56.566636131Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/71d7e8c45080b795850eb86461416e9c7eeea4278f8c9d4ccfc19721a8c895ec pid=1714 runtime=io.containerd.runc.v2 Oct 2 19:45:56.572682 env[1106]: time="2023-10-02T19:45:56.572523039Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:45:56.572682 env[1106]: time="2023-10-02T19:45:56.572558539Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:45:56.572682 env[1106]: time="2023-10-02T19:45:56.572567887Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:45:56.572817 env[1106]: time="2023-10-02T19:45:56.572680447Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/22a42996060e86652f6826e798f8ffe29df3f8103f150f534685ad8b0489fc65 pid=1737 runtime=io.containerd.runc.v2 Oct 2 19:45:56.573599 env[1106]: time="2023-10-02T19:45:56.573479811Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:45:56.573599 env[1106]: time="2023-10-02T19:45:56.573509420Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:45:56.573599 env[1106]: time="2023-10-02T19:45:56.573518327Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:45:56.573780 env[1106]: time="2023-10-02T19:45:56.573728548Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6a662ee84b61753e8e4482773d9e515770b1d47d61a203f02538be4ec1504239 pid=1739 runtime=io.containerd.runc.v2 Oct 2 19:45:56.580525 systemd[1]: Started cri-containerd-71d7e8c45080b795850eb86461416e9c7eeea4278f8c9d4ccfc19721a8c895ec.scope. Oct 2 19:45:56.591245 systemd[1]: Started cri-containerd-22a42996060e86652f6826e798f8ffe29df3f8103f150f534685ad8b0489fc65.scope. Oct 2 19:45:56.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.593000 audit: BPF prog-id=67 op=LOAD Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1714 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731643765386334353038306237393538353065623836343631343136 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1714 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731643765386334353038306237393538353065623836343631343136 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit: BPF prog-id=68 op=LOAD Oct 2 19:45:56.594000 audit[1729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000288510 items=0 ppid=1714 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731643765386334353038306237393538353065623836343631343136 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit: BPF prog-id=69 op=LOAD Oct 2 19:45:56.594000 audit[1729]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000288558 items=0 ppid=1714 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731643765386334353038306237393538353065623836343631343136 Oct 2 19:45:56.594000 audit: BPF prog-id=69 op=UNLOAD Oct 2 19:45:56.594000 audit: BPF prog-id=68 op=UNLOAD Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.594000 audit: BPF prog-id=70 op=LOAD Oct 2 19:45:56.594000 audit[1729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000288968 items=0 ppid=1714 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731643765386334353038306237393538353065623836343631343136 Oct 2 19:45:56.596395 systemd[1]: Started cri-containerd-6a662ee84b61753e8e4482773d9e515770b1d47d61a203f02538be4ec1504239.scope. Oct 2 19:45:56.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit: BPF prog-id=71 op=LOAD Oct 2 19:45:56.603000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1758]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1737 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232613432393936303630653836363532663638323665373938663866 Oct 2 19:45:56.603000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1758]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1737 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232613432393936303630653836363532663638323665373938663866 Oct 2 19:45:56.603000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit: BPF prog-id=72 op=LOAD Oct 2 19:45:56.603000 audit[1758]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ca8e0 items=0 ppid=1737 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232613432393936303630653836363532663638323665373938663866 Oct 2 19:45:56.603000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.603000 audit: BPF prog-id=73 op=LOAD Oct 2 19:45:56.603000 audit[1758]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ca928 items=0 ppid=1737 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232613432393936303630653836363532663638323665373938663866 Oct 2 19:45:56.604000 audit: BPF prog-id=73 op=UNLOAD Oct 2 19:45:56.604000 audit: BPF prog-id=72 op=UNLOAD Oct 2 19:45:56.604000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.604000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.604000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.604000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.604000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.604000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.604000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.604000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.604000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.604000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.604000 audit: BPF prog-id=74 op=LOAD Oct 2 19:45:56.604000 audit[1758]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003cad38 items=0 ppid=1737 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232613432393936303630653836363532663638323665373938663866 Oct 2 19:45:56.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit: BPF prog-id=75 op=LOAD Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1739 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661363632656538346236313735336538653434383237373364396535 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1739 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661363632656538346236313735336538653434383237373364396535 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit: BPF prog-id=76 op=LOAD Oct 2 19:45:56.606000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001a48d0 items=0 ppid=1739 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661363632656538346236313735336538653434383237373364396535 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit: BPF prog-id=77 op=LOAD Oct 2 19:45:56.606000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001a4918 items=0 ppid=1739 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661363632656538346236313735336538653434383237373364396535 Oct 2 19:45:56.606000 audit: BPF prog-id=77 op=UNLOAD Oct 2 19:45:56.606000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.606000 audit: BPF prog-id=78 op=LOAD Oct 2 19:45:56.606000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001a4d28 items=0 ppid=1739 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661363632656538346236313735336538653434383237373364396535 Oct 2 19:45:56.624828 env[1106]: time="2023-10-02T19:45:56.624783703Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:80b8b8966aa7d1c422f3be2bfac9c13f,Namespace:kube-system,Attempt:0,} returns sandbox id \"71d7e8c45080b795850eb86461416e9c7eeea4278f8c9d4ccfc19721a8c895ec\"" Oct 2 19:45:56.627508 kubelet[1675]: E1002 19:45:56.627357 1675 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:45:56.629588 env[1106]: time="2023-10-02T19:45:56.629559045Z" level=info msg="CreateContainer within sandbox \"71d7e8c45080b795850eb86461416e9c7eeea4278f8c9d4ccfc19721a8c895ec\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 19:45:56.636295 env[1106]: time="2023-10-02T19:45:56.636263614Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:24fef87020af50fba838138f9686fc61,Namespace:kube-system,Attempt:0,} returns sandbox id \"6a662ee84b61753e8e4482773d9e515770b1d47d61a203f02538be4ec1504239\"" Oct 2 19:45:56.636659 env[1106]: time="2023-10-02T19:45:56.636630021Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:5b10122baf4331187bc39c630bea4e03,Namespace:kube-system,Attempt:0,} returns sandbox id \"22a42996060e86652f6826e798f8ffe29df3f8103f150f534685ad8b0489fc65\"" Oct 2 19:45:56.637151 kubelet[1675]: E1002 19:45:56.637124 1675 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:45:56.637583 kubelet[1675]: E1002 19:45:56.637565 1675 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:45:56.640382 env[1106]: time="2023-10-02T19:45:56.640355239Z" level=info msg="CreateContainer within sandbox \"6a662ee84b61753e8e4482773d9e515770b1d47d61a203f02538be4ec1504239\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 19:45:56.640495 env[1106]: time="2023-10-02T19:45:56.640443823Z" level=info msg="CreateContainer within sandbox \"22a42996060e86652f6826e798f8ffe29df3f8103f150f534685ad8b0489fc65\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 19:45:56.708831 env[1106]: time="2023-10-02T19:45:56.708763556Z" level=info msg="CreateContainer within sandbox \"71d7e8c45080b795850eb86461416e9c7eeea4278f8c9d4ccfc19721a8c895ec\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"cd9e79ad7cb014af1deeac02594633cb6f700b7cd18d7ded9ce59dd9f654aefd\"" Oct 2 19:45:56.709505 env[1106]: time="2023-10-02T19:45:56.709470379Z" level=info msg="StartContainer for \"cd9e79ad7cb014af1deeac02594633cb6f700b7cd18d7ded9ce59dd9f654aefd\"" Oct 2 19:45:56.717442 env[1106]: time="2023-10-02T19:45:56.717403240Z" level=info msg="CreateContainer within sandbox \"6a662ee84b61753e8e4482773d9e515770b1d47d61a203f02538be4ec1504239\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"bcc1185fdc208fac15c1f4f263ca71f0659c6de90cdf612ba18df70260be441d\"" Oct 2 19:45:56.717920 env[1106]: time="2023-10-02T19:45:56.717872478Z" level=info msg="StartContainer for \"bcc1185fdc208fac15c1f4f263ca71f0659c6de90cdf612ba18df70260be441d\"" Oct 2 19:45:56.718812 env[1106]: time="2023-10-02T19:45:56.717965210Z" level=info msg="CreateContainer within sandbox \"22a42996060e86652f6826e798f8ffe29df3f8103f150f534685ad8b0489fc65\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"d36da2f5f73234c4ebbf4c23ec7c91f879544c731a8f675f54f9ba22388beffd\"" Oct 2 19:45:56.719121 env[1106]: time="2023-10-02T19:45:56.719099719Z" level=info msg="StartContainer for \"d36da2f5f73234c4ebbf4c23ec7c91f879544c731a8f675f54f9ba22388beffd\"" Oct 2 19:45:56.723637 systemd[1]: Started cri-containerd-cd9e79ad7cb014af1deeac02594633cb6f700b7cd18d7ded9ce59dd9f654aefd.scope. Oct 2 19:45:56.737151 systemd[1]: Started cri-containerd-bcc1185fdc208fac15c1f4f263ca71f0659c6de90cdf612ba18df70260be441d.scope. Oct 2 19:45:56.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit: BPF prog-id=79 op=LOAD Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1714 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364396537396164376362303134616631646565616330323539343633 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1714 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364396537396164376362303134616631646565616330323539343633 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit: BPF prog-id=80 op=LOAD Oct 2 19:45:56.738000 audit[1843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021b860 items=0 ppid=1714 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364396537396164376362303134616631646565616330323539343633 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit: BPF prog-id=81 op=LOAD Oct 2 19:45:56.738000 audit[1843]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021b8a8 items=0 ppid=1714 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364396537396164376362303134616631646565616330323539343633 Oct 2 19:45:56.738000 audit: BPF prog-id=81 op=UNLOAD Oct 2 19:45:56.738000 audit: BPF prog-id=80 op=UNLOAD Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { perfmon } for pid=1843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit[1843]: AVC avc: denied { bpf } for pid=1843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.738000 audit: BPF prog-id=82 op=LOAD Oct 2 19:45:56.738000 audit[1843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021bcb8 items=0 ppid=1714 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364396537396164376362303134616631646565616330323539343633 Oct 2 19:45:56.741754 systemd[1]: Started cri-containerd-d36da2f5f73234c4ebbf4c23ec7c91f879544c731a8f675f54f9ba22388beffd.scope. Oct 2 19:45:56.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.749000 audit: BPF prog-id=83 op=LOAD Oct 2 19:45:56.750000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.750000 audit[1868]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1739 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263633131383566646332303866616331356331663466323633636137 Oct 2 19:45:56.750000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.750000 audit[1868]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1739 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263633131383566646332303866616331356331663466323633636137 Oct 2 19:45:56.750000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.750000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.750000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.750000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.750000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.750000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.750000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.750000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.750000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.750000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.750000 audit: BPF prog-id=84 op=LOAD Oct 2 19:45:56.750000 audit[1868]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000261730 items=0 ppid=1739 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263633131383566646332303866616331356331663466323633636137 Oct 2 19:45:56.751000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.751000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.751000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.751000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.751000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.751000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.751000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.751000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.751000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.751000 audit: BPF prog-id=85 op=LOAD Oct 2 19:45:56.751000 audit[1868]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000261778 items=0 ppid=1739 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263633131383566646332303866616331356331663466323633636137 Oct 2 19:45:56.752000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:45:56.752000 audit: BPF prog-id=84 op=UNLOAD Oct 2 19:45:56.752000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.752000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.752000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.752000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.752000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.752000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.752000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.752000 audit[1868]: AVC avc: denied { perfmon } for pid=1868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.752000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.752000 audit[1868]: AVC avc: denied { bpf } for pid=1868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.752000 audit: BPF prog-id=86 op=LOAD Oct 2 19:45:56.752000 audit[1868]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000261b88 items=0 ppid=1739 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263633131383566646332303866616331356331663466323633636137 Oct 2 19:45:56.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.754000 audit: BPF prog-id=87 op=LOAD Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1737 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433366461326635663733323334633465626266346332336563376339 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1737 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433366461326635663733323334633465626266346332336563376339 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit: BPF prog-id=88 op=LOAD Oct 2 19:45:56.755000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000285070 items=0 ppid=1737 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433366461326635663733323334633465626266346332336563376339 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit: BPF prog-id=89 op=LOAD Oct 2 19:45:56.755000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002850b8 items=0 ppid=1737 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433366461326635663733323334633465626266346332336563376339 Oct 2 19:45:56.755000 audit: BPF prog-id=89 op=UNLOAD Oct 2 19:45:56.755000 audit: BPF prog-id=88 op=UNLOAD Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:45:56.755000 audit: BPF prog-id=90 op=LOAD Oct 2 19:45:56.755000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002854c8 items=0 ppid=1737 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:45:56.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433366461326635663733323334633465626266346332336563376339 Oct 2 19:45:56.760575 kubelet[1675]: W1002 19:45:56.760528 1675 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.10:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.10:6443: connect: connection refused Oct 2 19:45:56.760650 kubelet[1675]: E1002 19:45:56.760582 1675 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.10:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.10:6443: connect: connection refused Oct 2 19:45:56.773499 env[1106]: time="2023-10-02T19:45:56.773456233Z" level=info msg="StartContainer for \"cd9e79ad7cb014af1deeac02594633cb6f700b7cd18d7ded9ce59dd9f654aefd\" returns successfully" Oct 2 19:45:56.788670 env[1106]: time="2023-10-02T19:45:56.788561588Z" level=info msg="StartContainer for \"bcc1185fdc208fac15c1f4f263ca71f0659c6de90cdf612ba18df70260be441d\" returns successfully" Oct 2 19:45:56.797298 env[1106]: time="2023-10-02T19:45:56.797222754Z" level=info msg="StartContainer for \"d36da2f5f73234c4ebbf4c23ec7c91f879544c731a8f675f54f9ba22388beffd\" returns successfully" Oct 2 19:45:57.099644 kubelet[1675]: I1002 19:45:57.099528 1675 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:45:57.611584 kubelet[1675]: E1002 19:45:57.611555 1675 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:45:57.613140 kubelet[1675]: E1002 19:45:57.613120 1675 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:45:57.614454 kubelet[1675]: E1002 19:45:57.614436 1675 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:45:58.328000 audit[1902]: AVC avc: denied { watch } for pid=1902 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6786 scontext=system_u:system_r:svirt_lxc_net_t:s0:c427,c960 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:58.328000 audit[1902]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c0064a6020 a2=fc6 a3=0 items=0 ppid=1737 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c427,c960 key=(null) Oct 2 19:45:58.328000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Oct 2 19:45:58.328000 audit[1902]: AVC avc: denied { watch } for pid=1902 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6798 scontext=system_u:system_r:svirt_lxc_net_t:s0:c427,c960 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:58.328000 audit[1902]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c003738000 a2=fc6 a3=0 items=0 ppid=1737 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c427,c960 key=(null) Oct 2 19:45:58.328000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Oct 2 19:45:58.329000 audit[1902]: AVC avc: denied { watch } for pid=1902 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=6793 scontext=system_u:system_r:svirt_lxc_net_t:s0:c427,c960 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:58.329000 audit[1902]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c0037388d0 a2=fc6 a3=0 items=0 ppid=1737 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c427,c960 key=(null) Oct 2 19:45:58.329000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Oct 2 19:45:58.336000 audit[1902]: AVC avc: denied { watch } for pid=1902 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=6800 scontext=system_u:system_r:svirt_lxc_net_t:s0:c427,c960 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:58.339000 audit[1902]: AVC avc: denied { watch } for pid=1902 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6786 scontext=system_u:system_r:svirt_lxc_net_t:s0:c427,c960 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:58.336000 audit[1902]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c00403d890 a2=fc6 a3=0 items=0 ppid=1737 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c427,c960 key=(null) Oct 2 19:45:58.336000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Oct 2 19:45:58.339000 audit[1902]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c009fbb480 a2=fc6 a3=0 items=0 ppid=1737 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c427,c960 key=(null) Oct 2 19:45:58.339000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Oct 2 19:45:58.349000 audit[1902]: AVC avc: denied { watch } for pid=1902 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6798 scontext=system_u:system_r:svirt_lxc_net_t:s0:c427,c960 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:58.349000 audit[1902]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0034aaba0 a2=fc6 a3=0 items=0 ppid=1737 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c427,c960 key=(null) Oct 2 19:45:58.349000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Oct 2 19:45:58.392000 audit[1880]: AVC avc: denied { watch } for pid=1880 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=6798 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:58.392000 audit[1880]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0006c4cf0 a2=fc6 a3=0 items=0 ppid=1714 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c113 key=(null) Oct 2 19:45:58.392000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:45:58.393000 audit[1880]: AVC avc: denied { watch } for pid=1880 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=6786 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c113 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:45:58.393000 audit[1880]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c842a0 a2=fc6 a3=0 items=0 ppid=1714 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c113 key=(null) Oct 2 19:45:58.393000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:45:58.403068 kubelet[1675]: I1002 19:45:58.403045 1675 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Oct 2 19:45:58.403247 kubelet[1675]: I1002 19:45:58.403235 1675 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Oct 2 19:45:58.589016 kubelet[1675]: I1002 19:45:58.588847 1675 apiserver.go:52] "Watching apiserver" Oct 2 19:45:58.592702 kubelet[1675]: I1002 19:45:58.592668 1675 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Oct 2 19:45:58.609040 kubelet[1675]: I1002 19:45:58.608996 1675 reconciler.go:41] "Reconciler: start to sync state" Oct 2 19:45:58.621560 kubelet[1675]: E1002 19:45:58.621535 1675 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Oct 2 19:45:58.621988 kubelet[1675]: E1002 19:45:58.621963 1675 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:45:59.616586 kubelet[1675]: I1002 19:45:59.616548 1675 kubelet.go:1838] "Trying to delete pod" pod="kube-system/kube-apiserver-localhost" podUID=6f782d8b-05d2-4bdd-b5b9-99d3420dc7cb Oct 2 19:45:59.620929 kubelet[1675]: I1002 19:45:59.620884 1675 kubelet.go:1843] "Deleted mirror pod because it is outdated" pod="kube-system/kube-apiserver-localhost" Oct 2 19:45:59.623902 kubelet[1675]: E1002 19:45:59.623871 1675 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:46:00.035294 kubelet[1675]: E1002 19:46:00.035260 1675 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:46:00.215822 kubelet[1675]: I1002 19:46:00.215777 1675 kubelet.go:1838] "Trying to delete pod" pod="kube-system/kube-controller-manager-localhost" podUID=dc18e3a0-53d3-45ac-a8a1-453e8e93f4b8 Oct 2 19:46:00.220370 kubelet[1675]: I1002 19:46:00.220327 1675 kubelet.go:1843] "Deleted mirror pod because it is outdated" pod="kube-system/kube-controller-manager-localhost" Oct 2 19:46:00.224554 kubelet[1675]: E1002 19:46:00.224520 1675 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:46:00.234738 kubelet[1675]: I1002 19:46:00.234692 1675 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.234635489 podCreationTimestamp="2023-10-02 19:45:59 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:46:00.22957114 +0000 UTC m=+5.165228071" watchObservedRunningTime="2023-10-02 19:46:00.234635489 +0000 UTC m=+5.170292420" Oct 2 19:46:00.240013 kubelet[1675]: I1002 19:46:00.239976 1675 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=0.239944101 podCreationTimestamp="2023-10-02 19:46:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:46:00.239826393 +0000 UTC m=+5.175483334" watchObservedRunningTime="2023-10-02 19:46:00.239944101 +0000 UTC m=+5.175601063" Oct 2 19:46:00.240097 kubelet[1675]: I1002 19:46:00.240061 1675 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=0.240028485 podCreationTimestamp="2023-10-02 19:46:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:46:00.234812732 +0000 UTC m=+5.170469663" watchObservedRunningTime="2023-10-02 19:46:00.240028485 +0000 UTC m=+5.175685436" Oct 2 19:46:00.618714 kubelet[1675]: E1002 19:46:00.618683 1675 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:46:00.618947 kubelet[1675]: E1002 19:46:00.618749 1675 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:46:00.618947 kubelet[1675]: E1002 19:46:00.618749 1675 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:46:01.619177 kubelet[1675]: I1002 19:46:01.619137 1675 kubelet.go:1838] "Trying to delete pod" pod="kube-system/kube-controller-manager-localhost" podUID=7f653a14-495b-45c5-84c2-5442011192b8 Oct 2 19:46:01.637313 kubelet[1675]: E1002 19:46:01.637264 1675 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:46:01.991626 systemd[1]: Reloading. Oct 2 19:46:02.064723 /usr/lib/systemd/system-generators/torcx-generator[1972]: time="2023-10-02T19:46:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:46:02.064758 /usr/lib/systemd/system-generators/torcx-generator[1972]: time="2023-10-02T19:46:02Z" level=info msg="torcx already run" Oct 2 19:46:02.136940 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:46:02.136959 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:46:02.158748 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:46:02.250413 kernel: kauditd_printk_skb: 579 callbacks suppressed Oct 2 19:46:02.250665 kernel: audit: type=1400 audit(1696275962.239:700): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250723 kernel: audit: type=1400 audit(1696275962.239:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250774 kernel: audit: type=1400 audit(1696275962.239:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.251262 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:46:02.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.254633 kernel: audit: type=1400 audit(1696275962.239:703): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.254671 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:46:02.254687 kernel: audit: type=1400 audit(1696275962.239:704): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.254707 kernel: audit: type=1400 audit(1696275962.239:705): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.255266 kernel: audit: backlog limit exceeded Oct 2 19:46:02.255289 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:46:02.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.243000 audit: BPF prog-id=91 op=LOAD Oct 2 19:46:02.243000 audit: BPF prog-id=52 op=UNLOAD Oct 2 19:46:02.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.247000 audit: BPF prog-id=92 op=LOAD Oct 2 19:46:02.247000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:46:02.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit: BPF prog-id=93 op=LOAD Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit: BPF prog-id=94 op=LOAD Oct 2 19:46:02.250000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:46:02.250000 audit: BPF prog-id=55 op=UNLOAD Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit: BPF prog-id=95 op=LOAD Oct 2 19:46:02.250000 audit: BPF prog-id=56 op=UNLOAD Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.250000 audit: BPF prog-id=96 op=LOAD Oct 2 19:46:02.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.260000 audit: BPF prog-id=97 op=LOAD Oct 2 19:46:02.260000 audit: BPF prog-id=57 op=UNLOAD Oct 2 19:46:02.260000 audit: BPF prog-id=58 op=UNLOAD Oct 2 19:46:02.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.260000 audit: BPF prog-id=98 op=LOAD Oct 2 19:46:02.260000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:46:02.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.261000 audit: BPF prog-id=99 op=LOAD Oct 2 19:46:02.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.261000 audit: BPF prog-id=100 op=LOAD Oct 2 19:46:02.261000 audit: BPF prog-id=59 op=UNLOAD Oct 2 19:46:02.261000 audit: BPF prog-id=60 op=UNLOAD Oct 2 19:46:02.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.262000 audit: BPF prog-id=101 op=LOAD Oct 2 19:46:02.262000 audit: BPF prog-id=61 op=UNLOAD Oct 2 19:46:02.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.263000 audit: BPF prog-id=102 op=LOAD Oct 2 19:46:02.263000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit: BPF prog-id=103 op=LOAD Oct 2 19:46:02.264000 audit: BPF prog-id=62 op=UNLOAD Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit: BPF prog-id=104 op=LOAD Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.264000 audit: BPF prog-id=105 op=LOAD Oct 2 19:46:02.264000 audit: BPF prog-id=63 op=UNLOAD Oct 2 19:46:02.264000 audit: BPF prog-id=64 op=UNLOAD Oct 2 19:46:02.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.265000 audit: BPF prog-id=106 op=LOAD Oct 2 19:46:02.265000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:46:02.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.266000 audit: BPF prog-id=107 op=LOAD Oct 2 19:46:02.266000 audit: BPF prog-id=67 op=UNLOAD Oct 2 19:46:02.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.267000 audit: BPF prog-id=108 op=LOAD Oct 2 19:46:02.267000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:46:02.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.268000 audit: BPF prog-id=109 op=LOAD Oct 2 19:46:02.268000 audit: BPF prog-id=65 op=UNLOAD Oct 2 19:46:02.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.268000 audit: BPF prog-id=110 op=LOAD Oct 2 19:46:02.268000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:46:02.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.269000 audit: BPF prog-id=111 op=LOAD Oct 2 19:46:02.269000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:46:02.279707 kubelet[1675]: I1002 19:46:02.279657 1675 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:46:02.279759 systemd[1]: Stopping kubelet.service... Oct 2 19:46:02.302400 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 19:46:02.302579 systemd[1]: Stopped kubelet.service. Oct 2 19:46:02.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:02.304214 systemd[1]: Started kubelet.service. Oct 2 19:46:02.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:02.345271 kubelet[2014]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:46:02.345271 kubelet[2014]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:46:02.345271 kubelet[2014]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:46:02.345651 kubelet[2014]: I1002 19:46:02.345341 2014 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:46:02.349648 kubelet[2014]: I1002 19:46:02.349616 2014 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Oct 2 19:46:02.349648 kubelet[2014]: I1002 19:46:02.349643 2014 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:46:02.349891 kubelet[2014]: I1002 19:46:02.349876 2014 server.go:837] "Client rotation is on, will bootstrap in background" Oct 2 19:46:02.351357 kubelet[2014]: I1002 19:46:02.351334 2014 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 19:46:02.352316 kubelet[2014]: I1002 19:46:02.352273 2014 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:46:02.355562 kubelet[2014]: I1002 19:46:02.355541 2014 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:46:02.355703 kubelet[2014]: I1002 19:46:02.355680 2014 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:46:02.355757 kubelet[2014]: I1002 19:46:02.355736 2014 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 19:46:02.355757 kubelet[2014]: I1002 19:46:02.355753 2014 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:46:02.355862 kubelet[2014]: I1002 19:46:02.355768 2014 container_manager_linux.go:302] "Creating device plugin manager" Oct 2 19:46:02.355862 kubelet[2014]: I1002 19:46:02.355791 2014 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:46:02.358735 kubelet[2014]: I1002 19:46:02.358720 2014 kubelet.go:405] "Attempting to sync node with API server" Oct 2 19:46:02.358807 kubelet[2014]: I1002 19:46:02.358746 2014 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:46:02.358807 kubelet[2014]: I1002 19:46:02.358766 2014 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:46:02.358807 kubelet[2014]: I1002 19:46:02.358783 2014 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:46:02.359420 kubelet[2014]: I1002 19:46:02.359367 2014 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:46:02.361117 kubelet[2014]: I1002 19:46:02.361086 2014 server.go:1168] "Started kubelet" Oct 2 19:46:02.363000 audit[2014]: AVC avc: denied { mac_admin } for pid=2014 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.363000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:46:02.363000 audit[2014]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e3cf60 a1=c000921098 a2=c000e3cf30 a3=25 items=0 ppid=1 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:02.363000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:46:02.363000 audit[2014]: AVC avc: denied { mac_admin } for pid=2014 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.363000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:46:02.363000 audit[2014]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007a9f40 a1=c0009210b0 a2=c000e3cff0 a3=25 items=0 ppid=1 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:02.363000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:46:02.364215 kubelet[2014]: I1002 19:46:02.363382 2014 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:46:02.364215 kubelet[2014]: I1002 19:46:02.363415 2014 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:46:02.364215 kubelet[2014]: I1002 19:46:02.363433 2014 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:46:02.366527 kubelet[2014]: I1002 19:46:02.366488 2014 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:46:02.367507 kubelet[2014]: I1002 19:46:02.367482 2014 server.go:461] "Adding debug handlers to kubelet server" Oct 2 19:46:02.368972 kubelet[2014]: I1002 19:46:02.368947 2014 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:46:02.371293 kubelet[2014]: E1002 19:46:02.371264 2014 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:46:02.371358 kubelet[2014]: E1002 19:46:02.371298 2014 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:46:02.376324 kubelet[2014]: I1002 19:46:02.376295 2014 volume_manager.go:284] "Starting Kubelet Volume Manager" Oct 2 19:46:02.376807 kubelet[2014]: I1002 19:46:02.376775 2014 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Oct 2 19:46:02.384657 kubelet[2014]: I1002 19:46:02.384624 2014 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:46:02.385605 kubelet[2014]: I1002 19:46:02.385585 2014 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:46:02.385659 kubelet[2014]: I1002 19:46:02.385613 2014 status_manager.go:207] "Starting to sync pod status with apiserver" Oct 2 19:46:02.385659 kubelet[2014]: I1002 19:46:02.385637 2014 kubelet.go:2257] "Starting kubelet main sync loop" Oct 2 19:46:02.385722 kubelet[2014]: E1002 19:46:02.385704 2014 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:46:02.425135 kubelet[2014]: I1002 19:46:02.425083 2014 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:46:02.425135 kubelet[2014]: I1002 19:46:02.425107 2014 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:46:02.425135 kubelet[2014]: I1002 19:46:02.425136 2014 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:46:02.425373 kubelet[2014]: I1002 19:46:02.425307 2014 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 19:46:02.425373 kubelet[2014]: I1002 19:46:02.425321 2014 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Oct 2 19:46:02.425373 kubelet[2014]: I1002 19:46:02.425328 2014 policy_none.go:49] "None policy: Start" Oct 2 19:46:02.425934 kubelet[2014]: I1002 19:46:02.425910 2014 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:46:02.425934 kubelet[2014]: I1002 19:46:02.425931 2014 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:46:02.426068 kubelet[2014]: I1002 19:46:02.426048 2014 state_mem.go:75] "Updated machine memory state" Oct 2 19:46:02.432450 kubelet[2014]: I1002 19:46:02.432429 2014 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:46:02.432000 audit[2014]: AVC avc: denied { mac_admin } for pid=2014 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:02.432000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:46:02.432000 audit[2014]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fee180 a1=c0014983f0 a2=c000fee150 a3=25 items=0 ppid=1 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:02.432000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:46:02.432953 kubelet[2014]: I1002 19:46:02.432799 2014 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:46:02.433048 kubelet[2014]: I1002 19:46:02.433030 2014 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:46:02.480193 kubelet[2014]: I1002 19:46:02.480168 2014 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Oct 2 19:46:02.486447 kubelet[2014]: I1002 19:46:02.486409 2014 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:46:02.486547 kubelet[2014]: I1002 19:46:02.486489 2014 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:46:02.486547 kubelet[2014]: I1002 19:46:02.486528 2014 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:46:02.577657 kubelet[2014]: I1002 19:46:02.577528 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5b10122baf4331187bc39c630bea4e03-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"5b10122baf4331187bc39c630bea4e03\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:46:02.577657 kubelet[2014]: I1002 19:46:02.577579 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5b10122baf4331187bc39c630bea4e03-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"5b10122baf4331187bc39c630bea4e03\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:46:02.577657 kubelet[2014]: I1002 19:46:02.577608 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:46:02.577657 kubelet[2014]: I1002 19:46:02.577636 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:46:02.577657 kubelet[2014]: I1002 19:46:02.577661 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5b10122baf4331187bc39c630bea4e03-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"5b10122baf4331187bc39c630bea4e03\") " pod="kube-system/kube-apiserver-localhost" Oct 2 19:46:02.577942 kubelet[2014]: I1002 19:46:02.577683 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:46:02.577942 kubelet[2014]: I1002 19:46:02.577709 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:46:02.577942 kubelet[2014]: I1002 19:46:02.577793 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/80b8b8966aa7d1c422f3be2bfac9c13f-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"80b8b8966aa7d1c422f3be2bfac9c13f\") " pod="kube-system/kube-controller-manager-localhost" Oct 2 19:46:02.577942 kubelet[2014]: I1002 19:46:02.577831 2014 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/24fef87020af50fba838138f9686fc61-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"24fef87020af50fba838138f9686fc61\") " pod="kube-system/kube-scheduler-localhost" Oct 2 19:46:02.605936 kubelet[2014]: E1002 19:46:02.605897 2014 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" Oct 2 19:46:02.606303 kubelet[2014]: E1002 19:46:02.606267 2014 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Oct 2 19:46:02.606467 kubelet[2014]: E1002 19:46:02.606344 2014 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Oct 2 19:46:02.607060 kubelet[2014]: I1002 19:46:02.607014 2014 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Oct 2 19:46:02.607171 kubelet[2014]: I1002 19:46:02.607112 2014 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Oct 2 19:46:02.907528 kubelet[2014]: E1002 19:46:02.907408 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:46:02.907528 kubelet[2014]: E1002 19:46:02.907491 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:46:02.907850 kubelet[2014]: E1002 19:46:02.907808 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:46:03.359832 kubelet[2014]: I1002 19:46:03.359797 2014 apiserver.go:52] "Watching apiserver" Oct 2 19:46:03.377444 kubelet[2014]: I1002 19:46:03.377419 2014 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Oct 2 19:46:03.384563 kubelet[2014]: I1002 19:46:03.384540 2014 reconciler.go:41] "Reconciler: start to sync state" Oct 2 19:46:03.397971 kubelet[2014]: I1002 19:46:03.397933 2014 kubelet.go:1838] "Trying to delete pod" pod="kube-system/kube-controller-manager-localhost" podUID=729fab53-7208-435a-9168-536f20b1d696 Oct 2 19:46:03.398388 kubelet[2014]: I1002 19:46:03.398365 2014 kubelet.go:1838] "Trying to delete pod" pod="kube-system/kube-scheduler-localhost" podUID=3cfec92e-206f-44af-90ef-3c8fa14634c2 Oct 2 19:46:03.402381 kubelet[2014]: E1002 19:46:03.402327 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:46:03.403869 kubelet[2014]: I1002 19:46:03.403844 2014 kubelet.go:1843] "Deleted mirror pod because it is outdated" pod="kube-system/kube-controller-manager-localhost" Oct 2 19:46:03.404589 kubelet[2014]: I1002 19:46:03.404560 2014 kubelet.go:1843] "Deleted mirror pod because it is outdated" pod="kube-system/kube-scheduler-localhost" Oct 2 19:46:03.404818 kubelet[2014]: I1002 19:46:03.404798 2014 status_manager.go:833] "Failed to update status for pod" pod="kube-system/kube-controller-manager-localhost" err="failed to patch status \"{\\\"metadata\\\":{\\\"uid\\\":\\\"729fab53-7208-435a-9168-536f20b1d696\\\"},\\\"status\\\":{\\\"conditions\\\":[{\\\"lastProbeTime\\\":null,\\\"lastTransitionTime\\\":\\\"2023-10-02T19:46:02Z\\\",\\\"status\\\":\\\"True\\\",\\\"type\\\":\\\"Initialized\\\"},{\\\"lastProbeTime\\\":null,\\\"lastTransitionTime\\\":\\\"2023-10-02T19:46:02Z\\\",\\\"status\\\":\\\"True\\\",\\\"type\\\":\\\"Ready\\\"},{\\\"lastProbeTime\\\":null,\\\"lastTransitionTime\\\":\\\"2023-10-02T19:46:02Z\\\",\\\"status\\\":\\\"True\\\",\\\"type\\\":\\\"ContainersReady\\\"},{\\\"lastProbeTime\\\":null,\\\"lastTransitionTime\\\":\\\"2023-10-02T19:46:02Z\\\",\\\"status\\\":\\\"True\\\",\\\"type\\\":\\\"PodScheduled\\\"}],\\\"containerStatuses\\\":[{\\\"containerID\\\":\\\"containerd://cd9e79ad7cb014af1deeac02594633cb6f700b7cd18d7ded9ce59dd9f654aefd\\\",\\\"image\\\":\\\"registry.k8s.io/kube-controller-manager:v1.27.6\\\",\\\"imageID\\\":\\\"registry.k8s.io/kube-controller-manager@sha256:c76ca5b0cf607f82c54d51c3c6766da30c9a9f684065e1cac761ea9b07b74e97\\\",\\\"lastState\\\":{},\\\"name\\\":\\\"kube-controller-manager\\\",\\\"ready\\\":true,\\\"restartCount\\\":0,\\\"started\\\":true,\\\"state\\\":{\\\"running\\\":{\\\"startedAt\\\":\\\"2023-10-02T19:45:56Z\\\"}}}],\\\"hostIP\\\":\\\"10.0.0.9\\\",\\\"phase\\\":\\\"Running\\\",\\\"podIP\\\":\\\"10.0.0.9\\\",\\\"podIPs\\\":[{\\\"ip\\\":\\\"10.0.0.9\\\"}],\\\"startTime\\\":\\\"2023-10-02T19:46:02Z\\\"}}\" for pod \"kube-system\"/\"kube-controller-manager-localhost\": pods \"kube-controller-manager-localhost\" not found" Oct 2 19:46:03.407705 kubelet[2014]: E1002 19:46:03.407679 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:46:03.408571 kubelet[2014]: E1002 19:46:03.408533 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:46:03.415795 kubelet[2014]: I1002 19:46:03.415750 2014 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=0.415696565 podCreationTimestamp="2023-10-02 19:46:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:46:03.415687658 +0000 UTC m=+1.108245068" watchObservedRunningTime="2023-10-02 19:46:03.415696565 +0000 UTC m=+1.108253985" Oct 2 19:46:03.989000 audit[2046]: USER_ACCT pid=2046 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:46:03.991179 sudo[2046]: root : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/tar -xf /opt/bin/cilium.tar.gz -C /opt/bin Oct 2 19:46:03.990000 audit[2046]: CRED_REFR pid=2046 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:46:03.991499 sudo[2046]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 2 19:46:03.991000 audit[2046]: USER_START pid=2046 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:46:04.399528 kubelet[2014]: E1002 19:46:04.399434 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:46:04.399983 kubelet[2014]: E1002 19:46:04.399960 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:46:04.400392 kubelet[2014]: E1002 19:46:04.400348 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:46:04.457960 sudo[2046]: pam_unix(sudo:session): session closed for user root Oct 2 19:46:04.456000 audit[2046]: USER_END pid=2046 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:46:04.456000 audit[2046]: CRED_DISP pid=2046 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:46:05.006195 sudo[1234]: pam_unix(sudo:session): session closed for user root Oct 2 19:46:05.005000 audit[1234]: USER_END pid=1234 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:46:05.005000 audit[1234]: CRED_DISP pid=1234 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:46:05.007558 sshd[1231]: pam_unix(sshd:session): session closed for user core Oct 2 19:46:05.007000 audit[1231]: USER_END pid=1231 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:46:05.007000 audit[1231]: CRED_DISP pid=1231 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Oct 2 19:46:05.009792 systemd[1]: sshd@6-10.0.0.10:22-10.0.0.1:54284.service: Deactivated successfully. Oct 2 19:46:05.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.10:22-10.0.0.1:54284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:05.010572 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:46:05.010714 systemd[1]: session-7.scope: Consumed 3.632s CPU time. Oct 2 19:46:05.011168 systemd-logind[1092]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:46:05.011979 systemd-logind[1092]: Removed session 7. Oct 2 19:46:05.400776 kubelet[2014]: E1002 19:46:05.400676 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:46:05.416331 kubelet[2014]: I1002 19:46:05.416293 2014 kubelet.go:1838] "Trying to delete pod" pod="kube-system/kube-scheduler-localhost" podUID=2e50c654-e31c-4bad-b1bb-708c91bb777f Oct 2 19:46:05.418476 kubelet[2014]: E1002 19:46:05.418456 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:46:05.616553 kubelet[2014]: I1002 19:46:05.616524 2014 kubelet.go:1838] "Trying to delete pod" pod="kube-system/kube-controller-manager-localhost" podUID=6f06c254-3f34-47b5-b19b-e3aa82593689 Oct 2 19:46:05.619672 kubelet[2014]: E1002 19:46:05.619647 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:46:06.402256 kubelet[2014]: I1002 19:46:06.402210 2014 kubelet.go:1838] "Trying to delete pod" pod="kube-system/kube-scheduler-localhost" podUID=2e50c654-e31c-4bad-b1bb-708c91bb777f Oct 2 19:46:06.402256 kubelet[2014]: I1002 19:46:06.402260 2014 kubelet.go:1838] "Trying to delete pod" pod="kube-system/kube-apiserver-localhost" podUID=96ce9f2c-29b5-42d9-83d0-12460fe02321 Oct 2 19:46:06.402615 kubelet[2014]: I1002 19:46:06.402210 2014 kubelet.go:1838] "Trying to delete pod" pod="kube-system/kube-controller-manager-localhost" podUID=6f06c254-3f34-47b5-b19b-e3aa82593689 Oct 2 19:46:06.404654 kubelet[2014]: E1002 19:46:06.404583 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Oct 2 19:46:06.405377 kubelet[2014]: E1002 19:46:06.405341 2014 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"