Feb 9 08:55:39.081813 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Feb 8 21:14:17 -00 2024 Feb 9 08:55:39.081837 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 08:55:39.081851 kernel: BIOS-provided physical RAM map: Feb 9 08:55:39.081858 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 9 08:55:39.081865 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 9 08:55:39.081872 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 9 08:55:39.081880 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffd7fff] usable Feb 9 08:55:39.081887 kernel: BIOS-e820: [mem 0x000000007ffd8000-0x000000007fffffff] reserved Feb 9 08:55:39.081897 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 9 08:55:39.081904 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 9 08:55:39.081910 kernel: NX (Execute Disable) protection: active Feb 9 08:55:39.081917 kernel: SMBIOS 2.8 present. Feb 9 08:55:39.081924 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 Feb 9 08:55:39.081932 kernel: Hypervisor detected: KVM Feb 9 08:55:39.081940 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 9 08:55:39.081951 kernel: kvm-clock: cpu 0, msr 7afaa001, primary cpu clock Feb 9 08:55:39.081958 kernel: kvm-clock: using sched offset of 4479363034 cycles Feb 9 08:55:39.081967 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 9 08:55:39.081975 kernel: tsc: Detected 2294.608 MHz processor Feb 9 08:55:39.081982 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 08:55:39.081991 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 08:55:39.081998 kernel: last_pfn = 0x7ffd8 max_arch_pfn = 0x400000000 Feb 9 08:55:39.082006 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 08:55:39.082016 kernel: ACPI: Early table checksum verification disabled Feb 9 08:55:39.082024 kernel: ACPI: RSDP 0x00000000000F5A50 000014 (v00 BOCHS ) Feb 9 08:55:39.082032 kernel: ACPI: RSDT 0x000000007FFE1986 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 08:55:39.082039 kernel: ACPI: FACP 0x000000007FFE176A 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 08:55:39.082047 kernel: ACPI: DSDT 0x000000007FFE0040 00172A (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 08:55:39.082055 kernel: ACPI: FACS 0x000000007FFE0000 000040 Feb 9 08:55:39.082062 kernel: ACPI: APIC 0x000000007FFE17DE 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 08:55:39.082070 kernel: ACPI: HPET 0x000000007FFE185E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 08:55:39.082077 kernel: ACPI: SRAT 0x000000007FFE1896 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 08:55:39.082087 kernel: ACPI: WAET 0x000000007FFE195E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 08:55:39.082095 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe176a-0x7ffe17dd] Feb 9 08:55:39.082102 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe1769] Feb 9 08:55:39.082110 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Feb 9 08:55:39.082117 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17de-0x7ffe185d] Feb 9 08:55:39.082125 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe185e-0x7ffe1895] Feb 9 08:55:39.082132 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe1896-0x7ffe195d] Feb 9 08:55:39.082140 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe195e-0x7ffe1985] Feb 9 08:55:39.082155 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 9 08:55:39.082163 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 9 08:55:39.082171 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Feb 9 08:55:39.082179 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Feb 9 08:55:39.082188 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffd7fff] -> [mem 0x00000000-0x7ffd7fff] Feb 9 08:55:39.082196 kernel: NODE_DATA(0) allocated [mem 0x7ffd2000-0x7ffd7fff] Feb 9 08:55:39.082207 kernel: Zone ranges: Feb 9 08:55:39.082216 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 08:55:39.082224 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffd7fff] Feb 9 08:55:39.082233 kernel: Normal empty Feb 9 08:55:39.082241 kernel: Movable zone start for each node Feb 9 08:55:39.082249 kernel: Early memory node ranges Feb 9 08:55:39.082257 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 9 08:55:39.082265 kernel: node 0: [mem 0x0000000000100000-0x000000007ffd7fff] Feb 9 08:55:39.082273 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffd7fff] Feb 9 08:55:39.082284 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 08:55:39.082293 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 9 08:55:39.082301 kernel: On node 0, zone DMA32: 40 pages in unavailable ranges Feb 9 08:55:39.082310 kernel: ACPI: PM-Timer IO Port: 0x608 Feb 9 08:55:39.082318 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 9 08:55:39.082326 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 9 08:55:39.082335 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 08:55:39.082343 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 9 08:55:39.082351 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 08:55:39.082362 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 9 08:55:39.082371 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 9 08:55:39.082379 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 08:55:39.082387 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 08:55:39.082395 kernel: TSC deadline timer available Feb 9 08:55:39.082404 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 9 08:55:39.082412 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Feb 9 08:55:39.082420 kernel: Booting paravirtualized kernel on KVM Feb 9 08:55:39.082428 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 08:55:39.082439 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 9 08:55:39.082447 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 9 08:55:39.082456 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 9 08:55:39.082464 kernel: pcpu-alloc: [0] 0 1 Feb 9 08:55:39.082472 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Feb 9 08:55:39.082480 kernel: kvm-guest: PV spinlocks disabled, no host support Feb 9 08:55:39.082488 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515800 Feb 9 08:55:39.082496 kernel: Policy zone: DMA32 Feb 9 08:55:39.082506 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 08:55:39.082517 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 08:55:39.082525 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 08:55:39.082534 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 9 08:55:39.082542 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 08:55:39.082550 kernel: Memory: 1975320K/2096600K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121020K reserved, 0K cma-reserved) Feb 9 08:55:39.082559 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 08:55:39.082567 kernel: Kernel/User page tables isolation: enabled Feb 9 08:55:39.082575 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 08:55:39.082586 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 08:55:39.082594 kernel: rcu: Hierarchical RCU implementation. Feb 9 08:55:39.082603 kernel: rcu: RCU event tracing is enabled. Feb 9 08:55:39.082612 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 08:55:39.082620 kernel: Rude variant of Tasks RCU enabled. Feb 9 08:55:39.082629 kernel: Tracing variant of Tasks RCU enabled. Feb 9 08:55:39.082637 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 08:55:39.082645 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 08:55:39.082654 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 9 08:55:39.082665 kernel: random: crng init done Feb 9 08:55:39.082673 kernel: Console: colour VGA+ 80x25 Feb 9 08:55:39.082682 kernel: printk: console [tty0] enabled Feb 9 08:55:39.082690 kernel: printk: console [ttyS0] enabled Feb 9 08:55:39.082698 kernel: ACPI: Core revision 20210730 Feb 9 08:55:39.082730 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Feb 9 08:55:39.082738 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 08:55:39.082747 kernel: x2apic enabled Feb 9 08:55:39.082755 kernel: Switched APIC routing to physical x2apic. Feb 9 08:55:39.082767 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 9 08:55:39.082776 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x21134f58f0d, max_idle_ns: 440795217993 ns Feb 9 08:55:39.082784 kernel: Calibrating delay loop (skipped) preset value.. 4589.21 BogoMIPS (lpj=2294608) Feb 9 08:55:39.082793 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Feb 9 08:55:39.082801 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Feb 9 08:55:39.082810 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 08:55:39.082818 kernel: Spectre V2 : Mitigation: Retpolines Feb 9 08:55:39.082827 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 08:55:39.082835 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 08:55:39.082847 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Feb 9 08:55:39.082864 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 08:55:39.082873 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 08:55:39.082885 kernel: MDS: Mitigation: Clear CPU buffers Feb 9 08:55:39.082894 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 08:55:39.082903 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 08:55:39.082911 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 08:55:39.082920 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 08:55:39.082929 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 08:55:39.082938 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 9 08:55:39.082949 kernel: Freeing SMP alternatives memory: 32K Feb 9 08:55:39.082958 kernel: pid_max: default: 32768 minimum: 301 Feb 9 08:55:39.082967 kernel: LSM: Security Framework initializing Feb 9 08:55:39.082976 kernel: SELinux: Initializing. Feb 9 08:55:39.082985 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 9 08:55:39.082994 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 9 08:55:39.083005 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x3f, stepping: 0x2) Feb 9 08:55:39.083014 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Feb 9 08:55:39.083023 kernel: signal: max sigframe size: 1776 Feb 9 08:55:39.083032 kernel: rcu: Hierarchical SRCU implementation. Feb 9 08:55:39.083041 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 9 08:55:39.083050 kernel: smp: Bringing up secondary CPUs ... Feb 9 08:55:39.083062 kernel: x86: Booting SMP configuration: Feb 9 08:55:39.083083 kernel: .... node #0, CPUs: #1 Feb 9 08:55:39.083105 kernel: kvm-clock: cpu 1, msr 7afaa041, secondary cpu clock Feb 9 08:55:39.083126 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Feb 9 08:55:39.083153 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 08:55:39.083175 kernel: smpboot: Max logical packages: 1 Feb 9 08:55:39.083196 kernel: smpboot: Total of 2 processors activated (9178.43 BogoMIPS) Feb 9 08:55:39.083218 kernel: devtmpfs: initialized Feb 9 08:55:39.083239 kernel: x86/mm: Memory block size: 128MB Feb 9 08:55:39.083249 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 08:55:39.083258 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 08:55:39.083267 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 08:55:39.083276 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 08:55:39.083289 kernel: audit: initializing netlink subsys (disabled) Feb 9 08:55:39.083298 kernel: audit: type=2000 audit(1707468938.079:1): state=initialized audit_enabled=0 res=1 Feb 9 08:55:39.083307 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 08:55:39.083316 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 08:55:39.083325 kernel: cpuidle: using governor menu Feb 9 08:55:39.083333 kernel: ACPI: bus type PCI registered Feb 9 08:55:39.083342 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 08:55:39.083351 kernel: dca service started, version 1.12.1 Feb 9 08:55:39.083360 kernel: PCI: Using configuration type 1 for base access Feb 9 08:55:39.083372 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 08:55:39.083381 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 08:55:39.083390 kernel: ACPI: Added _OSI(Module Device) Feb 9 08:55:39.083399 kernel: ACPI: Added _OSI(Processor Device) Feb 9 08:55:39.083408 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 08:55:39.083416 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 08:55:39.083425 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 08:55:39.083434 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 08:55:39.083443 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 08:55:39.083454 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 08:55:39.083463 kernel: ACPI: Interpreter enabled Feb 9 08:55:39.083472 kernel: ACPI: PM: (supports S0 S5) Feb 9 08:55:39.083481 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 08:55:39.083490 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 08:55:39.083499 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 9 08:55:39.083508 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 08:55:39.089799 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 9 08:55:39.090021 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 9 08:55:39.090038 kernel: acpiphp: Slot [3] registered Feb 9 08:55:39.090048 kernel: acpiphp: Slot [4] registered Feb 9 08:55:39.090058 kernel: acpiphp: Slot [5] registered Feb 9 08:55:39.090067 kernel: acpiphp: Slot [6] registered Feb 9 08:55:39.090076 kernel: acpiphp: Slot [7] registered Feb 9 08:55:39.090085 kernel: acpiphp: Slot [8] registered Feb 9 08:55:39.090094 kernel: acpiphp: Slot [9] registered Feb 9 08:55:39.090107 kernel: acpiphp: Slot [10] registered Feb 9 08:55:39.090116 kernel: acpiphp: Slot [11] registered Feb 9 08:55:39.090125 kernel: acpiphp: Slot [12] registered Feb 9 08:55:39.090134 kernel: acpiphp: Slot [13] registered Feb 9 08:55:39.090143 kernel: acpiphp: Slot [14] registered Feb 9 08:55:39.090152 kernel: acpiphp: Slot [15] registered Feb 9 08:55:39.090161 kernel: acpiphp: Slot [16] registered Feb 9 08:55:39.090170 kernel: acpiphp: Slot [17] registered Feb 9 08:55:39.090179 kernel: acpiphp: Slot [18] registered Feb 9 08:55:39.090188 kernel: acpiphp: Slot [19] registered Feb 9 08:55:39.090210 kernel: acpiphp: Slot [20] registered Feb 9 08:55:39.090233 kernel: acpiphp: Slot [21] registered Feb 9 08:55:39.090248 kernel: acpiphp: Slot [22] registered Feb 9 08:55:39.090257 kernel: acpiphp: Slot [23] registered Feb 9 08:55:39.090266 kernel: acpiphp: Slot [24] registered Feb 9 08:55:39.090280 kernel: acpiphp: Slot [25] registered Feb 9 08:55:39.090302 kernel: acpiphp: Slot [26] registered Feb 9 08:55:39.090324 kernel: acpiphp: Slot [27] registered Feb 9 08:55:39.090343 kernel: acpiphp: Slot [28] registered Feb 9 08:55:39.090368 kernel: acpiphp: Slot [29] registered Feb 9 08:55:39.090389 kernel: acpiphp: Slot [30] registered Feb 9 08:55:39.090408 kernel: acpiphp: Slot [31] registered Feb 9 08:55:39.090426 kernel: PCI host bridge to bus 0000:00 Feb 9 08:55:39.090576 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 08:55:39.090699 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 08:55:39.090821 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 08:55:39.090901 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 9 08:55:39.091043 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Feb 9 08:55:39.091170 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 08:55:39.091330 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 9 08:55:39.091445 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 9 08:55:39.091552 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 9 08:55:39.091649 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc1e0-0xc1ef] Feb 9 08:55:39.091807 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 9 08:55:39.091906 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 9 08:55:39.092002 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 9 08:55:39.092097 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 9 08:55:39.092200 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Feb 9 08:55:39.092299 kernel: pci 0000:00:01.2: reg 0x20: [io 0xc180-0xc19f] Feb 9 08:55:39.092412 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 9 08:55:39.092512 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 9 08:55:39.092607 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 9 08:55:39.092782 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Feb 9 08:55:39.092882 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Feb 9 08:55:39.092981 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Feb 9 08:55:39.093075 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebf0000-0xfebf0fff] Feb 9 08:55:39.093173 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Feb 9 08:55:39.093266 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 08:55:39.093369 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Feb 9 08:55:39.093466 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc1a0-0xc1bf] Feb 9 08:55:39.093561 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebf1000-0xfebf1fff] Feb 9 08:55:39.093656 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Feb 9 08:55:39.093776 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Feb 9 08:55:39.093876 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc1c0-0xc1df] Feb 9 08:55:39.093971 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebf2000-0xfebf2fff] Feb 9 08:55:39.094067 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Feb 9 08:55:39.094168 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 Feb 9 08:55:39.094264 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc100-0xc13f] Feb 9 08:55:39.094359 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebf3000-0xfebf3fff] Feb 9 08:55:39.094454 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Feb 9 08:55:39.094564 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 Feb 9 08:55:39.094659 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc07f] Feb 9 08:55:39.094827 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfebf4000-0xfebf4fff] Feb 9 08:55:39.094928 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Feb 9 08:55:39.095031 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 Feb 9 08:55:39.095127 kernel: pci 0000:00:07.0: reg 0x10: [io 0xc080-0xc0ff] Feb 9 08:55:39.095220 kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfebf5000-0xfebf5fff] Feb 9 08:55:39.095320 kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfe814000-0xfe817fff 64bit pref] Feb 9 08:55:39.095422 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 Feb 9 08:55:39.095518 kernel: pci 0000:00:08.0: reg 0x10: [io 0xc140-0xc17f] Feb 9 08:55:39.095613 kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfe818000-0xfe81bfff 64bit pref] Feb 9 08:55:39.095625 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 9 08:55:39.095635 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 9 08:55:39.095644 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 08:55:39.095656 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 9 08:55:39.095665 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 9 08:55:39.095674 kernel: iommu: Default domain type: Translated Feb 9 08:55:39.095691 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 08:55:39.095849 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 9 08:55:39.095960 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 08:55:39.096057 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 9 08:55:39.096069 kernel: vgaarb: loaded Feb 9 08:55:39.096082 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 08:55:39.096092 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 08:55:39.096101 kernel: PTP clock support registered Feb 9 08:55:39.096110 kernel: PCI: Using ACPI for IRQ routing Feb 9 08:55:39.096119 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 08:55:39.096144 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 9 08:55:39.096159 kernel: e820: reserve RAM buffer [mem 0x7ffd8000-0x7fffffff] Feb 9 08:55:39.096171 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Feb 9 08:55:39.096184 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Feb 9 08:55:39.096201 kernel: clocksource: Switched to clocksource kvm-clock Feb 9 08:55:39.096213 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 08:55:39.096225 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 08:55:39.096242 kernel: pnp: PnP ACPI init Feb 9 08:55:39.096255 kernel: pnp: PnP ACPI: found 4 devices Feb 9 08:55:39.096274 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 08:55:39.096296 kernel: NET: Registered PF_INET protocol family Feb 9 08:55:39.096318 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 08:55:39.096338 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 9 08:55:39.096360 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 08:55:39.096378 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 08:55:39.096396 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 08:55:39.096414 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 9 08:55:39.096432 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 9 08:55:39.096450 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 9 08:55:39.096467 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 08:55:39.096485 kernel: NET: Registered PF_XDP protocol family Feb 9 08:55:39.096638 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 08:55:39.099876 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 08:55:39.099994 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 08:55:39.100079 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 9 08:55:39.100161 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Feb 9 08:55:39.100266 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 9 08:55:39.100365 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 08:55:39.100460 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 9 08:55:39.100496 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 9 08:55:39.100653 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x730 took 54692 usecs Feb 9 08:55:39.100680 kernel: PCI: CLS 0 bytes, default 64 Feb 9 08:55:39.100690 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 9 08:55:39.100700 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x21134f58f0d, max_idle_ns: 440795217993 ns Feb 9 08:55:39.101756 kernel: Initialise system trusted keyrings Feb 9 08:55:39.101772 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 9 08:55:39.101783 kernel: Key type asymmetric registered Feb 9 08:55:39.101794 kernel: Asymmetric key parser 'x509' registered Feb 9 08:55:39.101811 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 08:55:39.101820 kernel: io scheduler mq-deadline registered Feb 9 08:55:39.101829 kernel: io scheduler kyber registered Feb 9 08:55:39.101838 kernel: io scheduler bfq registered Feb 9 08:55:39.101848 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 08:55:39.101858 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Feb 9 08:55:39.101867 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 9 08:55:39.101876 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 9 08:55:39.101886 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 08:55:39.101895 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 08:55:39.101907 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 9 08:55:39.101916 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 08:55:39.101925 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 08:55:39.102098 kernel: rtc_cmos 00:03: RTC can wake from S4 Feb 9 08:55:39.102112 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 08:55:39.102196 kernel: rtc_cmos 00:03: registered as rtc0 Feb 9 08:55:39.102280 kernel: rtc_cmos 00:03: setting system clock to 2024-02-09T08:55:38 UTC (1707468938) Feb 9 08:55:39.102367 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Feb 9 08:55:39.102378 kernel: intel_pstate: CPU model not supported Feb 9 08:55:39.102387 kernel: NET: Registered PF_INET6 protocol family Feb 9 08:55:39.102397 kernel: Segment Routing with IPv6 Feb 9 08:55:39.102406 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 08:55:39.102415 kernel: NET: Registered PF_PACKET protocol family Feb 9 08:55:39.102424 kernel: Key type dns_resolver registered Feb 9 08:55:39.102433 kernel: IPI shorthand broadcast: enabled Feb 9 08:55:39.102442 kernel: sched_clock: Marking stable (918852551, 215120944)->(1465929002, -331955507) Feb 9 08:55:39.102454 kernel: registered taskstats version 1 Feb 9 08:55:39.102463 kernel: Loading compiled-in X.509 certificates Feb 9 08:55:39.102472 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: e9d857ae0e8100c174221878afd1046acbb054a6' Feb 9 08:55:39.102481 kernel: Key type .fscrypt registered Feb 9 08:55:39.102490 kernel: Key type fscrypt-provisioning registered Feb 9 08:55:39.102499 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 08:55:39.102508 kernel: ima: Allocated hash algorithm: sha1 Feb 9 08:55:39.102517 kernel: ima: No architecture policies found Feb 9 08:55:39.102526 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 08:55:39.102537 kernel: Write protecting the kernel read-only data: 28672k Feb 9 08:55:39.102546 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 08:55:39.102555 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 08:55:39.102564 kernel: Run /init as init process Feb 9 08:55:39.102573 kernel: with arguments: Feb 9 08:55:39.102583 kernel: /init Feb 9 08:55:39.102612 kernel: with environment: Feb 9 08:55:39.102625 kernel: HOME=/ Feb 9 08:55:39.102634 kernel: TERM=linux Feb 9 08:55:39.102646 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 08:55:39.102659 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 08:55:39.102674 systemd[1]: Detected virtualization kvm. Feb 9 08:55:39.102685 systemd[1]: Detected architecture x86-64. Feb 9 08:55:39.102695 systemd[1]: Running in initrd. Feb 9 08:55:39.102785 systemd[1]: No hostname configured, using default hostname. Feb 9 08:55:39.102796 systemd[1]: Hostname set to . Feb 9 08:55:39.102810 systemd[1]: Initializing machine ID from VM UUID. Feb 9 08:55:39.102820 systemd[1]: Queued start job for default target initrd.target. Feb 9 08:55:39.102830 systemd[1]: Started systemd-ask-password-console.path. Feb 9 08:55:39.102840 systemd[1]: Reached target cryptsetup.target. Feb 9 08:55:39.102850 systemd[1]: Reached target paths.target. Feb 9 08:55:39.102859 systemd[1]: Reached target slices.target. Feb 9 08:55:39.102869 systemd[1]: Reached target swap.target. Feb 9 08:55:39.102878 systemd[1]: Reached target timers.target. Feb 9 08:55:39.102892 systemd[1]: Listening on iscsid.socket. Feb 9 08:55:39.102901 systemd[1]: Listening on iscsiuio.socket. Feb 9 08:55:39.102911 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 08:55:39.102921 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 08:55:39.102931 systemd[1]: Listening on systemd-journald.socket. Feb 9 08:55:39.102941 systemd[1]: Listening on systemd-networkd.socket. Feb 9 08:55:39.102951 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 08:55:39.102961 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 08:55:39.102974 systemd[1]: Reached target sockets.target. Feb 9 08:55:39.102983 systemd[1]: Starting kmod-static-nodes.service... Feb 9 08:55:39.102993 systemd[1]: Finished network-cleanup.service. Feb 9 08:55:39.103006 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 08:55:39.103016 systemd[1]: Starting systemd-journald.service... Feb 9 08:55:39.103026 systemd[1]: Starting systemd-modules-load.service... Feb 9 08:55:39.103039 systemd[1]: Starting systemd-resolved.service... Feb 9 08:55:39.103049 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 08:55:39.103058 systemd[1]: Finished kmod-static-nodes.service. Feb 9 08:55:39.103074 systemd-journald[184]: Journal started Feb 9 08:55:39.103137 systemd-journald[184]: Runtime Journal (/run/log/journal/c242a2fe184b4cd990038a0b06eff199) is 4.9M, max 39.5M, 34.5M free. Feb 9 08:55:39.096910 systemd-modules-load[185]: Inserted module 'overlay' Feb 9 08:55:39.155902 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 08:55:39.155942 kernel: Bridge firewalling registered Feb 9 08:55:39.113164 systemd-resolved[186]: Positive Trust Anchors: Feb 9 08:55:39.163947 systemd[1]: Started systemd-journald.service. Feb 9 08:55:39.163993 kernel: audit: type=1130 audit(1707468939.155:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:39.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:39.113179 systemd-resolved[186]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 08:55:39.170463 kernel: audit: type=1130 audit(1707468939.163:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:39.170505 kernel: SCSI subsystem initialized Feb 9 08:55:39.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:39.113271 systemd-resolved[186]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 08:55:39.199225 kernel: audit: type=1130 audit(1707468939.171:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:39.199264 kernel: audit: type=1130 audit(1707468939.172:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:39.199296 kernel: audit: type=1130 audit(1707468939.173:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:39.199319 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 08:55:39.199342 kernel: device-mapper: uevent: version 1.0.3 Feb 9 08:55:39.199365 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 08:55:39.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:39.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:39.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:39.118517 systemd-resolved[186]: Defaulting to hostname 'linux'. Feb 9 08:55:39.135533 systemd-modules-load[185]: Inserted module 'br_netfilter' Feb 9 08:55:39.164747 systemd[1]: Started systemd-resolved.service. Feb 9 08:55:39.172888 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 08:55:39.173684 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 08:55:39.174525 systemd[1]: Reached target nss-lookup.target. Feb 9 08:55:39.196121 systemd-modules-load[185]: Inserted module 'dm_multipath' Feb 9 08:55:39.198360 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 08:55:39.200729 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 08:55:39.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:39.214769 kernel: audit: type=1130 audit(1707468939.208:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:39.208921 systemd[1]: Finished systemd-modules-load.service. Feb 9 08:55:39.216587 systemd[1]: Starting systemd-sysctl.service... Feb 9 08:55:39.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:39.228757 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 08:55:39.236083 kernel: audit: type=1130 audit(1707468939.228:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:39.237391 systemd[1]: Finished systemd-sysctl.service. Feb 9 08:55:39.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:39.256315 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 08:55:39.261573 kernel: audit: type=1130 audit(1707468939.255:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:39.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:39.263882 systemd[1]: Starting dracut-cmdline.service... Feb 9 08:55:39.270262 kernel: audit: type=1130 audit(1707468939.261:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:39.285124 dracut-cmdline[207]: dracut-dracut-053 Feb 9 08:55:39.290666 dracut-cmdline[207]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 08:55:39.390856 kernel: Loading iSCSI transport class v2.0-870. Feb 9 08:55:39.409744 kernel: iscsi: registered transport (tcp) Feb 9 08:55:39.445729 kernel: iscsi: registered transport (qla4xxx) Feb 9 08:55:39.445820 kernel: QLogic iSCSI HBA Driver Feb 9 08:55:39.507237 systemd[1]: Finished dracut-cmdline.service. Feb 9 08:55:39.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:39.509525 systemd[1]: Starting dracut-pre-udev.service... Feb 9 08:55:39.576794 kernel: raid6: avx2x4 gen() 16562 MB/s Feb 9 08:55:39.594862 kernel: raid6: avx2x4 xor() 7475 MB/s Feb 9 08:55:39.612781 kernel: raid6: avx2x2 gen() 15051 MB/s Feb 9 08:55:39.630867 kernel: raid6: avx2x2 xor() 15949 MB/s Feb 9 08:55:39.648790 kernel: raid6: avx2x1 gen() 11334 MB/s Feb 9 08:55:39.666849 kernel: raid6: avx2x1 xor() 12487 MB/s Feb 9 08:55:39.684825 kernel: raid6: sse2x4 gen() 9744 MB/s Feb 9 08:55:39.702827 kernel: raid6: sse2x4 xor() 5781 MB/s Feb 9 08:55:39.720799 kernel: raid6: sse2x2 gen() 11167 MB/s Feb 9 08:55:39.738871 kernel: raid6: sse2x2 xor() 6490 MB/s Feb 9 08:55:39.756798 kernel: raid6: sse2x1 gen() 8840 MB/s Feb 9 08:55:39.775826 kernel: raid6: sse2x1 xor() 4705 MB/s Feb 9 08:55:39.775923 kernel: raid6: using algorithm avx2x4 gen() 16562 MB/s Feb 9 08:55:39.775946 kernel: raid6: .... xor() 7475 MB/s, rmw enabled Feb 9 08:55:39.777276 kernel: raid6: using avx2x2 recovery algorithm Feb 9 08:55:39.796773 kernel: xor: automatically using best checksumming function avx Feb 9 08:55:39.934883 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 08:55:39.948879 systemd[1]: Finished dracut-pre-udev.service. Feb 9 08:55:39.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:39.949000 audit: BPF prog-id=7 op=LOAD Feb 9 08:55:39.949000 audit: BPF prog-id=8 op=LOAD Feb 9 08:55:39.952256 systemd[1]: Starting systemd-udevd.service... Feb 9 08:55:39.970072 systemd-udevd[384]: Using default interface naming scheme 'v252'. Feb 9 08:55:39.979336 systemd[1]: Started systemd-udevd.service. Feb 9 08:55:39.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:39.985472 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 08:55:40.007973 dracut-pre-trigger[399]: rd.md=0: removing MD RAID activation Feb 9 08:55:40.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:40.055848 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 08:55:40.059051 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 08:55:40.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:40.122578 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 08:55:40.199072 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Feb 9 08:55:40.199501 kernel: scsi host0: Virtio SCSI HBA Feb 9 08:55:40.213737 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 08:55:40.246766 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 08:55:40.255739 kernel: AES CTR mode by8 optimization enabled Feb 9 08:55:40.259739 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 08:55:40.259802 kernel: GPT:9289727 != 125829119 Feb 9 08:55:40.259826 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 08:55:40.259849 kernel: GPT:9289727 != 125829119 Feb 9 08:55:40.259871 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 08:55:40.259903 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 08:55:40.260769 kernel: virtio_blk virtio5: [vdb] 1000 512-byte logical blocks (512 kB/500 KiB) Feb 9 08:55:40.296764 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (444) Feb 9 08:55:40.299264 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 08:55:40.408083 kernel: libata version 3.00 loaded. Feb 9 08:55:40.408130 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 9 08:55:40.408377 kernel: scsi host1: ata_piix Feb 9 08:55:40.408602 kernel: ACPI: bus type USB registered Feb 9 08:55:40.408623 kernel: usbcore: registered new interface driver usbfs Feb 9 08:55:40.408643 kernel: usbcore: registered new interface driver hub Feb 9 08:55:40.408663 kernel: usbcore: registered new device driver usb Feb 9 08:55:40.408682 kernel: scsi host2: ata_piix Feb 9 08:55:40.408869 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 Feb 9 08:55:40.408890 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 Feb 9 08:55:40.408910 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Feb 9 08:55:40.423994 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 08:55:40.424769 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 08:55:40.432885 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 08:55:40.446481 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 08:55:40.448683 systemd[1]: Starting disk-uuid.service... Feb 9 08:55:40.460739 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 08:55:40.462834 disk-uuid[504]: Primary Header is updated. Feb 9 08:55:40.462834 disk-uuid[504]: Secondary Entries is updated. Feb 9 08:55:40.462834 disk-uuid[504]: Secondary Header is updated. Feb 9 08:55:40.508749 kernel: ehci-pci: EHCI PCI platform driver Feb 9 08:55:40.525743 kernel: uhci_hcd: USB Universal Host Controller Interface driver Feb 9 08:55:40.582993 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Feb 9 08:55:40.583308 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Feb 9 08:55:40.583463 kernel: uhci_hcd 0000:00:01.2: detected 2 ports Feb 9 08:55:40.586346 kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c180 Feb 9 08:55:40.589491 kernel: hub 1-0:1.0: USB hub found Feb 9 08:55:40.589827 kernel: hub 1-0:1.0: 2 ports detected Feb 9 08:55:41.484485 disk-uuid[505]: The operation has completed successfully. Feb 9 08:55:41.485603 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 08:55:41.546643 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 08:55:41.547804 systemd[1]: Finished disk-uuid.service. Feb 9 08:55:41.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:41.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:41.556922 systemd[1]: Starting verity-setup.service... Feb 9 08:55:41.582564 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 08:55:41.641821 systemd[1]: Found device dev-mapper-usr.device. Feb 9 08:55:41.644349 systemd[1]: Mounting sysusr-usr.mount... Feb 9 08:55:41.646410 systemd[1]: Finished verity-setup.service. Feb 9 08:55:41.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:41.740745 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 08:55:41.741451 systemd[1]: Mounted sysusr-usr.mount. Feb 9 08:55:41.742368 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 08:55:41.743623 systemd[1]: Starting ignition-setup.service... Feb 9 08:55:41.745876 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 08:55:41.763747 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 08:55:41.763823 kernel: BTRFS info (device vda6): using free space tree Feb 9 08:55:41.763848 kernel: BTRFS info (device vda6): has skinny extents Feb 9 08:55:41.784211 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 08:55:41.794851 systemd[1]: Finished ignition-setup.service. Feb 9 08:55:41.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:41.796982 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 08:55:41.944667 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 08:55:41.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:41.945000 audit: BPF prog-id=9 op=LOAD Feb 9 08:55:41.947556 systemd[1]: Starting systemd-networkd.service... Feb 9 08:55:41.992615 systemd-networkd[688]: lo: Link UP Feb 9 08:55:41.993946 systemd-networkd[688]: lo: Gained carrier Feb 9 08:55:41.995751 systemd-networkd[688]: Enumeration completed Feb 9 08:55:41.996837 systemd[1]: Started systemd-networkd.service. Feb 9 08:55:41.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:41.997321 systemd-networkd[688]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 08:55:41.997918 systemd[1]: Reached target network.target. Feb 9 08:55:41.999595 systemd-networkd[688]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. Feb 9 08:55:42.001076 systemd[1]: Starting iscsiuio.service... Feb 9 08:55:42.007362 systemd-networkd[688]: eth1: Link UP Feb 9 08:55:42.008188 systemd-networkd[688]: eth1: Gained carrier Feb 9 08:55:42.013220 systemd-networkd[688]: eth0: Link UP Feb 9 08:55:42.013232 systemd-networkd[688]: eth0: Gained carrier Feb 9 08:55:42.027761 ignition[610]: Ignition 2.14.0 Feb 9 08:55:42.027777 ignition[610]: Stage: fetch-offline Feb 9 08:55:42.027880 ignition[610]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 08:55:42.029994 systemd-networkd[688]: eth1: DHCPv4 address 10.124.0.11/20 acquired from 169.254.169.253 Feb 9 08:55:42.027917 ignition[610]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 9 08:55:42.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:42.032741 systemd[1]: Started iscsiuio.service. Feb 9 08:55:42.035601 systemd[1]: Starting iscsid.service... Feb 9 08:55:42.038203 systemd-networkd[688]: eth0: DHCPv4 address 164.92.86.105/20, gateway 164.92.80.1 acquired from 169.254.169.253 Feb 9 08:55:42.046365 iscsid[693]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 08:55:42.046365 iscsid[693]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 08:55:42.046365 iscsid[693]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 08:55:42.046365 iscsid[693]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 08:55:42.046365 iscsid[693]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 08:55:42.046365 iscsid[693]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 08:55:42.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:42.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:42.046170 ignition[610]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 9 08:55:42.047909 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 08:55:42.046376 ignition[610]: parsed url from cmdline: "" Feb 9 08:55:42.069457 systemd[1]: Started iscsid.service. Feb 9 08:55:42.046382 ignition[610]: no config URL provided Feb 9 08:55:42.072138 systemd[1]: Starting dracut-initqueue.service... Feb 9 08:55:42.046391 ignition[610]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 08:55:42.076530 systemd[1]: Starting ignition-fetch.service... Feb 9 08:55:42.046405 ignition[610]: no config at "/usr/lib/ignition/user.ign" Feb 9 08:55:42.046414 ignition[610]: failed to fetch config: resource requires networking Feb 9 08:55:42.046579 ignition[610]: Ignition finished successfully Feb 9 08:55:42.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:42.099627 ignition[695]: Ignition 2.14.0 Feb 9 08:55:42.097437 systemd[1]: Finished dracut-initqueue.service. Feb 9 08:55:42.099638 ignition[695]: Stage: fetch Feb 9 08:55:42.098334 systemd[1]: Reached target remote-fs-pre.target. Feb 9 08:55:42.099896 ignition[695]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 08:55:42.099058 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 08:55:42.099944 ignition[695]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 9 08:55:42.099570 systemd[1]: Reached target remote-fs.target. Feb 9 08:55:42.101576 systemd[1]: Starting dracut-pre-mount.service... Feb 9 08:55:42.113500 ignition[695]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 9 08:55:42.113724 ignition[695]: parsed url from cmdline: "" Feb 9 08:55:42.114939 ignition[695]: no config URL provided Feb 9 08:55:42.114956 ignition[695]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 08:55:42.114978 ignition[695]: no config at "/usr/lib/ignition/user.ign" Feb 9 08:55:42.115031 ignition[695]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 Feb 9 08:55:42.119509 systemd[1]: Finished dracut-pre-mount.service. Feb 9 08:55:42.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:42.154368 ignition[695]: GET result: OK Feb 9 08:55:42.154592 ignition[695]: parsing config with SHA512: c35159784464bcb896211a69a08f809047d2d086a689cf1c24fd617b53d7c72aaa7d32499d2b3645bd2fd3263bc7524e7b3e7fc62278e65ed2388fbc6ddc4402 Feb 9 08:55:42.221057 unknown[695]: fetched base config from "system" Feb 9 08:55:42.221931 unknown[695]: fetched base config from "system" Feb 9 08:55:42.222828 unknown[695]: fetched user config from "digitalocean" Feb 9 08:55:42.224396 ignition[695]: fetch: fetch complete Feb 9 08:55:42.225180 ignition[695]: fetch: fetch passed Feb 9 08:55:42.225877 ignition[695]: Ignition finished successfully Feb 9 08:55:42.228075 systemd[1]: Finished ignition-fetch.service. Feb 9 08:55:42.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:42.230129 systemd[1]: Starting ignition-kargs.service... Feb 9 08:55:42.248000 ignition[713]: Ignition 2.14.0 Feb 9 08:55:42.248019 ignition[713]: Stage: kargs Feb 9 08:55:42.248169 ignition[713]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 08:55:42.248192 ignition[713]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 9 08:55:42.252764 ignition[713]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 9 08:55:42.254656 ignition[713]: kargs: kargs passed Feb 9 08:55:42.256107 systemd[1]: Finished ignition-kargs.service. Feb 9 08:55:42.254775 ignition[713]: Ignition finished successfully Feb 9 08:55:42.258581 systemd[1]: Starting ignition-disks.service... Feb 9 08:55:42.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:42.270285 ignition[718]: Ignition 2.14.0 Feb 9 08:55:42.270299 ignition[718]: Stage: disks Feb 9 08:55:42.270472 ignition[718]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 08:55:42.270495 ignition[718]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 9 08:55:42.273337 ignition[718]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 9 08:55:42.275383 ignition[718]: disks: disks passed Feb 9 08:55:42.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:42.276657 systemd[1]: Finished ignition-disks.service. Feb 9 08:55:42.275466 ignition[718]: Ignition finished successfully Feb 9 08:55:42.277516 systemd[1]: Reached target initrd-root-device.target. Feb 9 08:55:42.278209 systemd[1]: Reached target local-fs-pre.target. Feb 9 08:55:42.279632 systemd[1]: Reached target local-fs.target. Feb 9 08:55:42.280993 systemd[1]: Reached target sysinit.target. Feb 9 08:55:42.282130 systemd[1]: Reached target basic.target. Feb 9 08:55:42.284939 systemd[1]: Starting systemd-fsck-root.service... Feb 9 08:55:42.309463 systemd-fsck[726]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 08:55:42.314019 systemd[1]: Finished systemd-fsck-root.service. Feb 9 08:55:42.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:42.316392 systemd[1]: Mounting sysroot.mount... Feb 9 08:55:42.328746 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 08:55:42.329356 systemd[1]: Mounted sysroot.mount. Feb 9 08:55:42.331076 systemd[1]: Reached target initrd-root-fs.target. Feb 9 08:55:42.335147 systemd[1]: Mounting sysroot-usr.mount... Feb 9 08:55:42.338063 systemd[1]: Starting flatcar-digitalocean-network.service... Feb 9 08:55:42.341924 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 08:55:42.345137 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 08:55:42.346232 systemd[1]: Reached target ignition-diskful.target. Feb 9 08:55:42.351520 systemd[1]: Mounted sysroot-usr.mount. Feb 9 08:55:42.356006 systemd[1]: Starting initrd-setup-root.service... Feb 9 08:55:42.375558 initrd-setup-root[738]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 08:55:42.391646 initrd-setup-root[746]: cut: /sysroot/etc/group: No such file or directory Feb 9 08:55:42.402572 initrd-setup-root[756]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 08:55:42.413740 initrd-setup-root[766]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 08:55:42.503989 systemd[1]: Finished initrd-setup-root.service. Feb 9 08:55:42.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:42.506049 systemd[1]: Starting ignition-mount.service... Feb 9 08:55:42.512323 systemd[1]: Starting sysroot-boot.service... Feb 9 08:55:42.519008 coreos-metadata[732]: Feb 09 08:55:42.518 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 9 08:55:42.537042 coreos-metadata[732]: Feb 09 08:55:42.534 INFO Fetch successful Feb 9 08:55:42.537900 bash[783]: umount: /sysroot/usr/share/oem: not mounted. Feb 9 08:55:42.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:42.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:42.548018 systemd[1]: flatcar-digitalocean-network.service: Deactivated successfully. Feb 9 08:55:42.548161 systemd[1]: Finished flatcar-digitalocean-network.service. Feb 9 08:55:42.556042 ignition[785]: INFO : Ignition 2.14.0 Feb 9 08:55:42.556042 ignition[785]: INFO : Stage: mount Feb 9 08:55:42.558635 ignition[785]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 08:55:42.558635 ignition[785]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 9 08:55:42.566526 ignition[785]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 9 08:55:42.566526 ignition[785]: INFO : mount: mount passed Feb 9 08:55:42.566526 ignition[785]: INFO : Ignition finished successfully Feb 9 08:55:42.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:42.567877 systemd[1]: Finished ignition-mount.service. Feb 9 08:55:42.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:42.570251 systemd[1]: Finished sysroot-boot.service. Feb 9 08:55:42.580654 coreos-metadata[733]: Feb 09 08:55:42.580 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 9 08:55:42.596351 coreos-metadata[733]: Feb 09 08:55:42.596 INFO Fetch successful Feb 9 08:55:42.603036 coreos-metadata[733]: Feb 09 08:55:42.602 INFO wrote hostname ci-3510.3.2-b-854bdc2340 to /sysroot/etc/hostname Feb 9 08:55:42.605919 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 08:55:42.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:42.665845 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 08:55:42.675764 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (792) Feb 9 08:55:42.680229 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 08:55:42.680310 kernel: BTRFS info (device vda6): using free space tree Feb 9 08:55:42.680343 kernel: BTRFS info (device vda6): has skinny extents Feb 9 08:55:42.688378 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 08:55:42.708331 systemd[1]: Starting ignition-files.service... Feb 9 08:55:42.736840 ignition[812]: INFO : Ignition 2.14.0 Feb 9 08:55:42.736840 ignition[812]: INFO : Stage: files Feb 9 08:55:42.738457 ignition[812]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 08:55:42.738457 ignition[812]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 9 08:55:42.741168 ignition[812]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 9 08:55:42.746360 ignition[812]: DEBUG : files: compiled without relabeling support, skipping Feb 9 08:55:42.748065 ignition[812]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 08:55:42.748065 ignition[812]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 08:55:42.753746 ignition[812]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 08:55:42.755278 ignition[812]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 08:55:42.755278 ignition[812]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 08:55:42.755237 unknown[812]: wrote ssh authorized keys file for user: core Feb 9 08:55:42.759021 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 08:55:42.759021 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 9 08:55:43.208094 systemd-networkd[688]: eth0: Gained IPv6LL Feb 9 08:55:43.208519 systemd-networkd[688]: eth1: Gained IPv6LL Feb 9 08:55:43.255539 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 08:55:43.461530 ignition[812]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 9 08:55:43.463683 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 08:55:43.463683 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 08:55:43.463683 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 9 08:55:43.866297 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 08:55:44.009626 ignition[812]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 9 08:55:44.009626 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 08:55:44.013206 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 08:55:44.013206 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 9 08:55:44.019124 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 08:55:44.091357 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 08:55:44.093007 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 08:55:44.093007 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 9 08:55:44.155990 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 08:55:44.403562 ignition[812]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 9 08:55:44.405218 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 08:55:44.406400 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 08:55:44.407576 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 9 08:55:44.455988 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 08:55:45.172875 ignition[812]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 9 08:55:45.172875 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 08:55:45.172875 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 08:55:45.177742 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1 Feb 9 08:55:45.218378 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 08:55:45.509890 ignition[812]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628 Feb 9 08:55:45.509890 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 08:55:45.513815 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 08:55:45.513815 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 08:55:45.513815 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 9 08:55:45.513815 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 08:55:45.513815 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 08:55:45.513815 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 08:55:45.513815 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 08:55:45.513815 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 08:55:45.513815 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 08:55:45.513815 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 08:55:45.513815 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 08:55:45.513815 ignition[812]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 08:55:45.513815 ignition[812]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 08:55:45.513815 ignition[812]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 08:55:45.513815 ignition[812]: INFO : files: op(10): [started] processing unit "prepare-cni-plugins.service" Feb 9 08:55:45.513815 ignition[812]: INFO : files: op(10): op(11): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 08:55:45.513815 ignition[812]: INFO : files: op(10): op(11): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 08:55:45.551301 kernel: kauditd_printk_skb: 29 callbacks suppressed Feb 9 08:55:45.551342 kernel: audit: type=1130 audit(1707468945.529:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.527011 systemd[1]: Finished ignition-files.service. Feb 9 08:55:45.558969 kernel: audit: type=1130 audit(1707468945.551:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.559123 ignition[812]: INFO : files: op(10): [finished] processing unit "prepare-cni-plugins.service" Feb 9 08:55:45.559123 ignition[812]: INFO : files: op(12): [started] processing unit "prepare-critools.service" Feb 9 08:55:45.559123 ignition[812]: INFO : files: op(12): op(13): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 08:55:45.559123 ignition[812]: INFO : files: op(12): op(13): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 08:55:45.559123 ignition[812]: INFO : files: op(12): [finished] processing unit "prepare-critools.service" Feb 9 08:55:45.559123 ignition[812]: INFO : files: op(14): [started] processing unit "prepare-helm.service" Feb 9 08:55:45.559123 ignition[812]: INFO : files: op(14): op(15): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 08:55:45.559123 ignition[812]: INFO : files: op(14): op(15): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 08:55:45.559123 ignition[812]: INFO : files: op(14): [finished] processing unit "prepare-helm.service" Feb 9 08:55:45.559123 ignition[812]: INFO : files: op(16): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 08:55:45.559123 ignition[812]: INFO : files: op(16): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 08:55:45.559123 ignition[812]: INFO : files: op(17): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 08:55:45.559123 ignition[812]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 08:55:45.559123 ignition[812]: INFO : files: op(18): [started] setting preset to enabled for "prepare-critools.service" Feb 9 08:55:45.559123 ignition[812]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 08:55:45.559123 ignition[812]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" Feb 9 08:55:45.559123 ignition[812]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 08:55:45.559123 ignition[812]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 08:55:45.559123 ignition[812]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 08:55:45.559123 ignition[812]: INFO : files: files passed Feb 9 08:55:45.559123 ignition[812]: INFO : Ignition finished successfully Feb 9 08:55:45.622245 kernel: audit: type=1130 audit(1707468945.568:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.622284 kernel: audit: type=1131 audit(1707468945.568:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.622308 kernel: audit: type=1130 audit(1707468945.596:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.622330 kernel: audit: type=1131 audit(1707468945.596:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.533720 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 08:55:45.542848 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 08:55:45.626458 initrd-setup-root-after-ignition[837]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 08:55:45.544512 systemd[1]: Starting ignition-quench.service... Feb 9 08:55:45.551345 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 08:55:45.552355 systemd[1]: Reached target ignition-complete.target. Feb 9 08:55:45.560916 systemd[1]: Starting initrd-parse-etc.service... Feb 9 08:55:45.568274 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 08:55:45.568453 systemd[1]: Finished ignition-quench.service. Feb 9 08:55:45.587001 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 08:55:45.640287 kernel: audit: type=1130 audit(1707468945.632:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.587187 systemd[1]: Finished initrd-parse-etc.service. Feb 9 08:55:45.597409 systemd[1]: Reached target initrd-fs.target. Feb 9 08:55:45.608475 systemd[1]: Reached target initrd.target. Feb 9 08:55:45.609940 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 08:55:45.611494 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 08:55:45.632300 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 08:55:45.634602 systemd[1]: Starting initrd-cleanup.service... Feb 9 08:55:45.653479 systemd[1]: Stopped target nss-lookup.target. Feb 9 08:55:45.654374 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 08:55:45.655999 systemd[1]: Stopped target timers.target. Feb 9 08:55:45.657363 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 08:55:45.664151 kernel: audit: type=1131 audit(1707468945.658:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.657575 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 08:55:45.659020 systemd[1]: Stopped target initrd.target. Feb 9 08:55:45.664928 systemd[1]: Stopped target basic.target. Feb 9 08:55:45.666126 systemd[1]: Stopped target ignition-complete.target. Feb 9 08:55:45.667509 systemd[1]: Stopped target ignition-diskful.target. Feb 9 08:55:45.668896 systemd[1]: Stopped target initrd-root-device.target. Feb 9 08:55:45.670277 systemd[1]: Stopped target remote-fs.target. Feb 9 08:55:45.671840 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 08:55:45.673273 systemd[1]: Stopped target sysinit.target. Feb 9 08:55:45.674826 systemd[1]: Stopped target local-fs.target. Feb 9 08:55:45.676098 systemd[1]: Stopped target local-fs-pre.target. Feb 9 08:55:45.686166 kernel: audit: type=1131 audit(1707468945.678:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.676900 systemd[1]: Stopped target swap.target. Feb 9 08:55:45.678095 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 08:55:45.694572 kernel: audit: type=1131 audit(1707468945.687:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.678298 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 08:55:45.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.679671 systemd[1]: Stopped target cryptsetup.target. Feb 9 08:55:45.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.687003 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 08:55:45.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.687218 systemd[1]: Stopped dracut-initqueue.service. Feb 9 08:55:45.688500 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 08:55:45.688679 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 08:55:45.695676 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 08:55:45.695964 systemd[1]: Stopped ignition-files.service. Feb 9 08:55:45.697104 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 08:55:45.697301 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 08:55:45.700214 systemd[1]: Stopping ignition-mount.service... Feb 9 08:55:45.710945 systemd[1]: Stopping iscsid.service... Feb 9 08:55:45.723632 iscsid[693]: iscsid shutting down. Feb 9 08:55:45.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.717917 systemd[1]: Stopping sysroot-boot.service... Feb 9 08:55:45.718759 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 08:55:45.719603 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 08:55:45.721593 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 08:55:45.721914 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 08:55:45.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.731001 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 08:55:45.731145 systemd[1]: Stopped iscsid.service. Feb 9 08:55:45.735633 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 08:55:45.745337 ignition[850]: INFO : Ignition 2.14.0 Feb 9 08:55:45.745337 ignition[850]: INFO : Stage: umount Feb 9 08:55:45.745337 ignition[850]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 08:55:45.745337 ignition[850]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 9 08:55:45.745337 ignition[850]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 9 08:55:45.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.735833 systemd[1]: Finished initrd-cleanup.service. Feb 9 08:55:45.752236 systemd[1]: Stopping iscsiuio.service... Feb 9 08:55:45.757190 ignition[850]: INFO : umount: umount passed Feb 9 08:55:45.757190 ignition[850]: INFO : Ignition finished successfully Feb 9 08:55:45.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.756829 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 08:55:45.756992 systemd[1]: Stopped iscsiuio.service. Feb 9 08:55:45.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.760055 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 08:55:45.760807 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 08:55:45.760917 systemd[1]: Stopped ignition-mount.service. Feb 9 08:55:45.763841 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 08:55:45.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.763932 systemd[1]: Stopped ignition-disks.service. Feb 9 08:55:45.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.768423 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 08:55:45.768521 systemd[1]: Stopped ignition-kargs.service. Feb 9 08:55:45.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.769961 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 08:55:45.770047 systemd[1]: Stopped ignition-fetch.service. Feb 9 08:55:45.771291 systemd[1]: Stopped target network.target. Feb 9 08:55:45.772540 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 08:55:45.772641 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 08:55:45.774105 systemd[1]: Stopped target paths.target. Feb 9 08:55:45.775318 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 08:55:45.778860 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 08:55:45.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.793615 systemd[1]: Stopped target slices.target. Feb 9 08:55:45.794329 systemd[1]: Stopped target sockets.target. Feb 9 08:55:45.796107 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 08:55:45.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.796183 systemd[1]: Closed iscsid.socket. Feb 9 08:55:45.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.797369 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 08:55:45.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.797430 systemd[1]: Closed iscsiuio.socket. Feb 9 08:55:45.798560 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 08:55:45.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.813000 audit: BPF prog-id=6 op=UNLOAD Feb 9 08:55:45.798778 systemd[1]: Stopped ignition-setup.service. Feb 9 08:55:45.800272 systemd[1]: Stopping systemd-networkd.service... Feb 9 08:55:45.801841 systemd[1]: Stopping systemd-resolved.service... Feb 9 08:55:45.803979 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 08:55:45.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.804136 systemd[1]: Stopped sysroot-boot.service. Feb 9 08:55:45.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.804782 systemd-networkd[688]: eth1: DHCPv6 lease lost Feb 9 08:55:45.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.805579 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 08:55:45.805653 systemd[1]: Stopped initrd-setup-root.service. Feb 9 08:55:45.808635 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 08:55:45.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.808828 systemd-networkd[688]: eth0: DHCPv6 lease lost Feb 9 08:55:45.835000 audit: BPF prog-id=9 op=UNLOAD Feb 9 08:55:45.808877 systemd[1]: Stopped systemd-resolved.service. Feb 9 08:55:45.812089 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 08:55:45.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.812243 systemd[1]: Stopped systemd-networkd.service. Feb 9 08:55:45.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.813979 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 08:55:45.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.814033 systemd[1]: Closed systemd-networkd.socket. Feb 9 08:55:45.816155 systemd[1]: Stopping network-cleanup.service... Feb 9 08:55:45.819763 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 08:55:45.819867 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 08:55:45.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.821336 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 08:55:45.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.821414 systemd[1]: Stopped systemd-sysctl.service. Feb 9 08:55:45.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.823120 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 08:55:45.823193 systemd[1]: Stopped systemd-modules-load.service. Feb 9 08:55:45.824243 systemd[1]: Stopping systemd-udevd.service... Feb 9 08:55:45.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.832792 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 08:55:45.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:45.834550 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 08:55:45.834867 systemd[1]: Stopped systemd-udevd.service. Feb 9 08:55:45.836156 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 08:55:45.836217 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 08:55:45.837074 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 08:55:45.837141 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 08:55:45.838266 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 08:55:45.838347 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 08:55:45.841639 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 08:55:45.841734 systemd[1]: Stopped dracut-cmdline.service. Feb 9 08:55:45.843104 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 08:55:45.843179 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 08:55:45.845797 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 08:55:45.846592 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 08:55:45.846748 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 08:55:45.857353 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 08:55:45.857440 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 08:55:45.858266 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 08:55:45.858330 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 08:55:45.861369 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 9 08:55:45.862232 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 08:55:45.862379 systemd[1]: Stopped network-cleanup.service. Feb 9 08:55:45.863658 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 08:55:45.863824 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 08:55:45.864850 systemd[1]: Reached target initrd-switch-root.target. Feb 9 08:55:45.867607 systemd[1]: Starting initrd-switch-root.service... Feb 9 08:55:45.887729 systemd[1]: Switching root. Feb 9 08:55:45.913080 systemd-journald[184]: Journal stopped Feb 9 08:55:50.940336 systemd-journald[184]: Received SIGTERM from PID 1 (systemd). Feb 9 08:55:50.940450 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 08:55:50.940479 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 08:55:50.940509 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 08:55:50.940532 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 08:55:50.940556 kernel: SELinux: policy capability open_perms=1 Feb 9 08:55:50.940586 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 08:55:50.940609 kernel: SELinux: policy capability always_check_network=0 Feb 9 08:55:50.940638 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 08:55:50.940660 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 08:55:50.940684 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 08:55:50.940774 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 08:55:50.940804 systemd[1]: Successfully loaded SELinux policy in 74.723ms. Feb 9 08:55:50.940854 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.741ms. Feb 9 08:55:50.940889 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 08:55:50.940925 systemd[1]: Detected virtualization kvm. Feb 9 08:55:50.940961 systemd[1]: Detected architecture x86-64. Feb 9 08:55:50.940995 systemd[1]: Detected first boot. Feb 9 08:55:50.941030 systemd[1]: Hostname set to . Feb 9 08:55:50.941065 systemd[1]: Initializing machine ID from VM UUID. Feb 9 08:55:50.941102 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 08:55:50.941132 systemd[1]: Populated /etc with preset unit settings. Feb 9 08:55:50.941167 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 08:55:50.941203 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 08:55:50.941239 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 08:55:50.941273 kernel: kauditd_printk_skb: 50 callbacks suppressed Feb 9 08:55:50.941305 kernel: audit: type=1334 audit(1707468950.620:93): prog-id=12 op=LOAD Feb 9 08:55:50.941334 kernel: audit: type=1334 audit(1707468950.620:94): prog-id=3 op=UNLOAD Feb 9 08:55:50.941365 kernel: audit: type=1334 audit(1707468950.622:95): prog-id=13 op=LOAD Feb 9 08:55:50.941396 kernel: audit: type=1334 audit(1707468950.624:96): prog-id=14 op=LOAD Feb 9 08:55:50.941427 kernel: audit: type=1334 audit(1707468950.624:97): prog-id=4 op=UNLOAD Feb 9 08:55:50.941449 kernel: audit: type=1334 audit(1707468950.624:98): prog-id=5 op=UNLOAD Feb 9 08:55:50.941470 kernel: audit: type=1334 audit(1707468950.627:99): prog-id=15 op=LOAD Feb 9 08:55:50.941493 kernel: audit: type=1334 audit(1707468950.628:100): prog-id=12 op=UNLOAD Feb 9 08:55:50.941516 kernel: audit: type=1334 audit(1707468950.629:101): prog-id=16 op=LOAD Feb 9 08:55:50.941546 kernel: audit: type=1334 audit(1707468950.631:102): prog-id=17 op=LOAD Feb 9 08:55:50.941578 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 08:55:50.941603 systemd[1]: Stopped initrd-switch-root.service. Feb 9 08:55:50.941628 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 08:55:50.941653 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 08:55:50.941679 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 08:55:50.941716 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 08:55:50.941742 systemd[1]: Created slice system-getty.slice. Feb 9 08:55:50.941764 systemd[1]: Created slice system-modprobe.slice. Feb 9 08:55:50.942004 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 08:55:50.942031 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 08:55:50.942055 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 08:55:50.942079 systemd[1]: Created slice user.slice. Feb 9 08:55:50.942101 systemd[1]: Started systemd-ask-password-console.path. Feb 9 08:55:50.942124 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 08:55:50.942148 systemd[1]: Set up automount boot.automount. Feb 9 08:55:50.942177 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 08:55:50.942207 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 08:55:50.942230 systemd[1]: Stopped target initrd-fs.target. Feb 9 08:55:50.942253 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 08:55:50.942278 systemd[1]: Reached target integritysetup.target. Feb 9 08:55:50.942302 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 08:55:50.942326 systemd[1]: Reached target remote-fs.target. Feb 9 08:55:50.942350 systemd[1]: Reached target slices.target. Feb 9 08:55:50.942371 systemd[1]: Reached target swap.target. Feb 9 08:55:50.942398 systemd[1]: Reached target torcx.target. Feb 9 08:55:50.944078 systemd[1]: Reached target veritysetup.target. Feb 9 08:55:50.944127 systemd[1]: Listening on systemd-coredump.socket. Feb 9 08:55:50.944163 systemd[1]: Listening on systemd-initctl.socket. Feb 9 08:55:50.944199 systemd[1]: Listening on systemd-networkd.socket. Feb 9 08:55:50.944234 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 08:55:50.944271 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 08:55:50.944307 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 08:55:50.944342 systemd[1]: Mounting dev-hugepages.mount... Feb 9 08:55:50.944383 systemd[1]: Mounting dev-mqueue.mount... Feb 9 08:55:50.944417 systemd[1]: Mounting media.mount... Feb 9 08:55:50.944450 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 08:55:50.944484 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 08:55:50.944518 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 08:55:50.944552 systemd[1]: Mounting tmp.mount... Feb 9 08:55:50.944580 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 08:55:50.944614 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 08:55:50.944649 systemd[1]: Starting kmod-static-nodes.service... Feb 9 08:55:50.944684 systemd[1]: Starting modprobe@configfs.service... Feb 9 08:55:50.944718 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 08:55:50.949138 systemd[1]: Starting modprobe@drm.service... Feb 9 08:55:50.949207 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 08:55:50.949234 systemd[1]: Starting modprobe@fuse.service... Feb 9 08:55:50.949258 systemd[1]: Starting modprobe@loop.service... Feb 9 08:55:50.949284 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 08:55:50.949311 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 08:55:50.949355 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 08:55:50.949385 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 08:55:50.949411 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 08:55:50.949434 systemd[1]: Stopped systemd-journald.service. Feb 9 08:55:50.949460 systemd[1]: Starting systemd-journald.service... Feb 9 08:55:50.949485 systemd[1]: Starting systemd-modules-load.service... Feb 9 08:55:50.949509 systemd[1]: Starting systemd-network-generator.service... Feb 9 08:55:50.949538 systemd[1]: Starting systemd-remount-fs.service... Feb 9 08:55:50.949563 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 08:55:50.949588 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 08:55:50.949613 systemd[1]: Stopped verity-setup.service. Feb 9 08:55:50.949640 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 08:55:50.949666 systemd[1]: Mounted dev-hugepages.mount. Feb 9 08:55:50.949691 systemd[1]: Mounted dev-mqueue.mount. Feb 9 08:55:50.949736 systemd[1]: Mounted media.mount. Feb 9 08:55:50.950903 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 08:55:50.950961 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 08:55:50.950988 systemd[1]: Mounted tmp.mount. Feb 9 08:55:50.951011 systemd[1]: Finished kmod-static-nodes.service. Feb 9 08:55:50.951036 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 08:55:50.951060 systemd[1]: Finished modprobe@configfs.service. Feb 9 08:55:50.951084 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 08:55:50.951108 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 08:55:50.951132 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 08:55:50.951156 systemd[1]: Finished modprobe@drm.service. Feb 9 08:55:50.951185 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 08:55:50.951209 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 08:55:50.951232 systemd[1]: Finished systemd-modules-load.service. Feb 9 08:55:50.951253 kernel: fuse: init (API version 7.34) Feb 9 08:55:50.951276 systemd[1]: Finished systemd-network-generator.service. Feb 9 08:55:50.951303 systemd[1]: Finished systemd-remount-fs.service. Feb 9 08:55:50.951326 systemd[1]: Reached target network-pre.target. Feb 9 08:55:50.951365 systemd-journald[955]: Journal started Feb 9 08:55:50.951463 systemd-journald[955]: Runtime Journal (/run/log/journal/c242a2fe184b4cd990038a0b06eff199) is 4.9M, max 39.5M, 34.5M free. Feb 9 08:55:46.120000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 08:55:46.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 08:55:46.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 08:55:50.961402 kernel: loop: module loaded Feb 9 08:55:50.961448 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 08:55:50.961504 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 08:55:46.212000 audit: BPF prog-id=10 op=LOAD Feb 9 08:55:46.212000 audit: BPF prog-id=10 op=UNLOAD Feb 9 08:55:46.212000 audit: BPF prog-id=11 op=LOAD Feb 9 08:55:46.212000 audit: BPF prog-id=11 op=UNLOAD Feb 9 08:55:46.329000 audit[882]: AVC avc: denied { associate } for pid=882 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 08:55:46.329000 audit[882]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=865 pid=882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:55:46.329000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 08:55:46.332000 audit[882]: AVC avc: denied { associate } for pid=882 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 08:55:46.332000 audit[882]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=865 pid=882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:55:46.332000 audit: CWD cwd="/" Feb 9 08:55:46.332000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:46.332000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:46.332000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 08:55:50.620000 audit: BPF prog-id=12 op=LOAD Feb 9 08:55:50.620000 audit: BPF prog-id=3 op=UNLOAD Feb 9 08:55:50.622000 audit: BPF prog-id=13 op=LOAD Feb 9 08:55:50.624000 audit: BPF prog-id=14 op=LOAD Feb 9 08:55:50.624000 audit: BPF prog-id=4 op=UNLOAD Feb 9 08:55:50.624000 audit: BPF prog-id=5 op=UNLOAD Feb 9 08:55:50.627000 audit: BPF prog-id=15 op=LOAD Feb 9 08:55:50.628000 audit: BPF prog-id=12 op=UNLOAD Feb 9 08:55:50.629000 audit: BPF prog-id=16 op=LOAD Feb 9 08:55:50.631000 audit: BPF prog-id=17 op=LOAD Feb 9 08:55:50.631000 audit: BPF prog-id=13 op=UNLOAD Feb 9 08:55:50.631000 audit: BPF prog-id=14 op=UNLOAD Feb 9 08:55:50.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:50.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:50.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:50.646000 audit: BPF prog-id=15 op=UNLOAD Feb 9 08:55:50.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:50.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:50.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:50.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:50.832000 audit: BPF prog-id=18 op=LOAD Feb 9 08:55:50.832000 audit: BPF prog-id=19 op=LOAD Feb 9 08:55:50.832000 audit: BPF prog-id=20 op=LOAD Feb 9 08:55:50.832000 audit: BPF prog-id=16 op=UNLOAD Feb 9 08:55:50.832000 audit: BPF prog-id=17 op=UNLOAD Feb 9 08:55:50.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:50.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:50.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:50.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:50.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:50.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:50.977834 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 08:55:50.977907 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 08:55:50.977938 systemd[1]: Starting systemd-random-seed.service... Feb 9 08:55:50.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:50.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:50.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:50.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:50.933000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 08:55:50.933000 audit[955]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffdd36a55e0 a2=4000 a3=7ffdd36a567c items=0 ppid=1 pid=955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:55:50.933000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 08:55:50.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:50.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:50.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:50.618190 systemd[1]: Queued start job for default target multi-user.target. Feb 9 08:55:46.325459 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 08:55:50.618212 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 9 08:55:46.326376 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 08:55:50.633093 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 08:55:46.326415 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 08:55:46.326473 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:46Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 08:55:46.326492 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:46Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 08:55:46.326561 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:46Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 08:55:46.326586 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:46Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 08:55:46.327063 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:46Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 08:55:46.327153 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 08:55:50.987783 systemd[1]: Starting systemd-sysctl.service... Feb 9 08:55:46.327182 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 08:55:46.328462 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 08:55:46.328525 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 08:55:46.328565 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 08:55:46.328595 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 08:55:46.328631 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 08:55:50.991634 systemd[1]: Started systemd-journald.service. Feb 9 08:55:50.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:46.328660 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 08:55:49.888251 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:49Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 08:55:49.888615 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:49Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 08:55:49.888772 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:49Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 08:55:49.889079 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:49Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 08:55:50.994351 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 08:55:49.889156 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:49Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 08:55:50.994623 systemd[1]: Finished modprobe@fuse.service. Feb 9 08:55:50.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:50.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:49.889255 /usr/lib/systemd/system-generators/torcx-generator[882]: time="2024-02-09T08:55:49Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 08:55:50.999153 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 08:55:51.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:51.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:51.014260 systemd[1]: Finished modprobe@loop.service. Feb 9 08:55:51.015823 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 08:55:51.020019 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 08:55:51.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:51.026189 systemd[1]: Starting systemd-journal-flush.service... Feb 9 08:55:51.027211 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 08:55:51.031674 systemd[1]: Finished systemd-random-seed.service. Feb 9 08:55:51.033462 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 08:55:51.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:51.045541 systemd[1]: Finished systemd-sysctl.service. Feb 9 08:55:51.046909 systemd[1]: Reached target first-boot-complete.target. Feb 9 08:55:51.050008 systemd-journald[955]: Time spent on flushing to /var/log/journal/c242a2fe184b4cd990038a0b06eff199 is 44.125ms for 1197 entries. Feb 9 08:55:51.050008 systemd-journald[955]: System Journal (/var/log/journal/c242a2fe184b4cd990038a0b06eff199) is 8.0M, max 195.6M, 187.6M free. Feb 9 08:55:51.105299 systemd-journald[955]: Received client request to flush runtime journal. Feb 9 08:55:51.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:51.094977 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 08:55:51.098262 systemd[1]: Starting systemd-sysusers.service... Feb 9 08:55:51.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:51.110118 systemd[1]: Finished systemd-journal-flush.service. Feb 9 08:55:51.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:51.145884 systemd[1]: Finished systemd-sysusers.service. Feb 9 08:55:51.148413 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 08:55:51.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:51.171926 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 08:55:51.175488 systemd[1]: Starting systemd-udev-settle.service... Feb 9 08:55:51.198625 udevadm[993]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 08:55:51.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:51.216167 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 08:55:52.102182 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 08:55:52.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:52.103000 audit: BPF prog-id=21 op=LOAD Feb 9 08:55:52.103000 audit: BPF prog-id=22 op=LOAD Feb 9 08:55:52.103000 audit: BPF prog-id=7 op=UNLOAD Feb 9 08:55:52.103000 audit: BPF prog-id=8 op=UNLOAD Feb 9 08:55:52.105558 systemd[1]: Starting systemd-udevd.service... Feb 9 08:55:52.130353 systemd-udevd[994]: Using default interface naming scheme 'v252'. Feb 9 08:55:52.176334 systemd[1]: Started systemd-udevd.service. Feb 9 08:55:52.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:52.182000 audit: BPF prog-id=23 op=LOAD Feb 9 08:55:52.184291 systemd[1]: Starting systemd-networkd.service... Feb 9 08:55:52.190000 audit: BPF prog-id=24 op=LOAD Feb 9 08:55:52.191000 audit: BPF prog-id=25 op=LOAD Feb 9 08:55:52.191000 audit: BPF prog-id=26 op=LOAD Feb 9 08:55:52.192830 systemd[1]: Starting systemd-userdbd.service... Feb 9 08:55:52.249653 systemd[1]: Started systemd-userdbd.service. Feb 9 08:55:52.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:52.273455 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 08:55:52.338758 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 08:55:52.339121 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 08:55:52.341435 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 08:55:52.346123 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 08:55:52.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:52.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:52.352026 systemd[1]: Starting modprobe@loop.service... Feb 9 08:55:52.352830 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 08:55:52.352945 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 08:55:52.353100 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 08:55:52.353819 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 08:55:52.354043 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 08:55:52.355362 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 08:55:52.355565 systemd[1]: Finished modprobe@loop.service. Feb 9 08:55:52.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:52.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:52.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:52.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:52.386556 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 08:55:52.386815 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 08:55:52.391216 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 08:55:52.391286 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 08:55:52.397450 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 08:55:52.418439 systemd-networkd[1010]: lo: Link UP Feb 9 08:55:52.418456 systemd-networkd[1010]: lo: Gained carrier Feb 9 08:55:52.419639 systemd-networkd[1010]: Enumeration completed Feb 9 08:55:52.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:52.419834 systemd[1]: Started systemd-networkd.service. Feb 9 08:55:52.420215 systemd-networkd[1010]: eth1: Configuring with /run/systemd/network/10-f6:ea:99:78:e1:e6.network. Feb 9 08:55:52.422089 systemd-networkd[1010]: eth0: Configuring with /run/systemd/network/10-b2:42:d5:59:01:65.network. Feb 9 08:55:52.424101 systemd-networkd[1010]: eth1: Link UP Feb 9 08:55:52.424120 systemd-networkd[1010]: eth1: Gained carrier Feb 9 08:55:52.432245 systemd-networkd[1010]: eth0: Link UP Feb 9 08:55:52.432263 systemd-networkd[1010]: eth0: Gained carrier Feb 9 08:55:52.437755 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 9 08:55:52.444742 kernel: ACPI: button: Power Button [PWRF] Feb 9 08:55:52.493000 audit[1002]: AVC avc: denied { confidentiality } for pid=1002 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 08:55:52.493000 audit[1002]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5594f301aa00 a1=32194 a2=7f69c98cebc5 a3=5 items=108 ppid=994 pid=1002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:55:52.493000 audit: CWD cwd="/" Feb 9 08:55:52.493000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=1 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=2 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=3 name=(null) inode=14578 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=4 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=5 name=(null) inode=14579 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=6 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=7 name=(null) inode=14580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=8 name=(null) inode=14580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=9 name=(null) inode=14581 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=10 name=(null) inode=14580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=11 name=(null) inode=14582 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=12 name=(null) inode=14580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=13 name=(null) inode=14583 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=14 name=(null) inode=14580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=15 name=(null) inode=14584 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=16 name=(null) inode=14580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=17 name=(null) inode=14585 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=18 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=19 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=20 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=21 name=(null) inode=14587 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=22 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=23 name=(null) inode=14588 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=24 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=25 name=(null) inode=14589 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=26 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=27 name=(null) inode=14590 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=28 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=29 name=(null) inode=14591 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=30 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=31 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=32 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=33 name=(null) inode=14593 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=34 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=35 name=(null) inode=14594 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=36 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=37 name=(null) inode=14595 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=38 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=39 name=(null) inode=14596 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=40 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=41 name=(null) inode=14597 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=42 name=(null) inode=14577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=43 name=(null) inode=14598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=44 name=(null) inode=14598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=45 name=(null) inode=14599 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=46 name=(null) inode=14598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=47 name=(null) inode=14600 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=48 name=(null) inode=14598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=49 name=(null) inode=14601 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=50 name=(null) inode=14598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=51 name=(null) inode=14602 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=52 name=(null) inode=14598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=53 name=(null) inode=14603 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=55 name=(null) inode=14604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=56 name=(null) inode=14604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=57 name=(null) inode=14605 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=58 name=(null) inode=14604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=59 name=(null) inode=14606 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=60 name=(null) inode=14604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=61 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=62 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=63 name=(null) inode=14608 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=64 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=65 name=(null) inode=14609 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=66 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=67 name=(null) inode=14610 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=68 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=69 name=(null) inode=14611 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=70 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=71 name=(null) inode=14612 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=72 name=(null) inode=14604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=73 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=74 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=75 name=(null) inode=14614 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=76 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=77 name=(null) inode=14615 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=78 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=79 name=(null) inode=14616 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=80 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=81 name=(null) inode=14617 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=82 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=83 name=(null) inode=14618 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=84 name=(null) inode=14604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=85 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=86 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=87 name=(null) inode=14620 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=88 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=89 name=(null) inode=14621 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=90 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=91 name=(null) inode=14622 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=92 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=93 name=(null) inode=14623 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=94 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=95 name=(null) inode=14624 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=96 name=(null) inode=14604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=97 name=(null) inode=14625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=98 name=(null) inode=14625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=99 name=(null) inode=14626 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=100 name=(null) inode=14625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=101 name=(null) inode=14627 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=102 name=(null) inode=14625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=103 name=(null) inode=14628 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=104 name=(null) inode=14625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=105 name=(null) inode=14629 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=106 name=(null) inode=14625 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PATH item=107 name=(null) inode=14630 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 08:55:52.493000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 08:55:52.537792 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 9 08:55:52.543744 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 9 08:55:52.556748 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 08:55:52.665739 kernel: EDAC MC: Ver: 3.0.0 Feb 9 08:55:52.688362 systemd[1]: Finished systemd-udev-settle.service. Feb 9 08:55:52.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:52.691029 systemd[1]: Starting lvm2-activation-early.service... Feb 9 08:55:52.712499 lvm[1032]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 08:55:52.746383 systemd[1]: Finished lvm2-activation-early.service. Feb 9 08:55:52.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:52.747298 systemd[1]: Reached target cryptsetup.target. Feb 9 08:55:52.749168 systemd[1]: Starting lvm2-activation.service... Feb 9 08:55:52.756365 lvm[1033]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 08:55:52.783599 systemd[1]: Finished lvm2-activation.service. Feb 9 08:55:52.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:52.784458 systemd[1]: Reached target local-fs-pre.target. Feb 9 08:55:52.787602 systemd[1]: Mounting media-configdrive.mount... Feb 9 08:55:52.788593 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 08:55:52.788679 systemd[1]: Reached target machines.target. Feb 9 08:55:52.790965 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 08:55:52.808374 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 08:55:52.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:52.809729 kernel: ISO 9660 Extensions: RRIP_1991A Feb 9 08:55:52.811583 systemd[1]: Mounted media-configdrive.mount. Feb 9 08:55:52.812438 systemd[1]: Reached target local-fs.target. Feb 9 08:55:52.815029 systemd[1]: Starting ldconfig.service... Feb 9 08:55:52.818045 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 08:55:52.818136 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 08:55:52.820020 systemd[1]: Starting systemd-boot-update.service... Feb 9 08:55:52.824404 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 08:55:52.825279 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 08:55:52.825394 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 08:55:52.831383 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 08:55:52.846678 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1039 (bootctl) Feb 9 08:55:52.849056 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 08:55:52.866201 systemd-tmpfiles[1041]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 08:55:52.871753 systemd-tmpfiles[1041]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 08:55:52.877754 systemd-tmpfiles[1041]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 08:55:52.958483 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 08:55:52.959500 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 08:55:52.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:53.038744 systemd-fsck[1045]: fsck.fat 4.2 (2021-01-31) Feb 9 08:55:53.038744 systemd-fsck[1045]: /dev/vda1: 789 files, 115332/258078 clusters Feb 9 08:55:53.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:53.041400 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 08:55:53.043544 systemd[1]: Mounting boot.mount... Feb 9 08:55:53.059788 systemd[1]: Mounted boot.mount. Feb 9 08:55:53.091405 systemd[1]: Finished systemd-boot-update.service. Feb 9 08:55:53.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:53.175737 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 08:55:53.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:53.179230 systemd[1]: Starting audit-rules.service... Feb 9 08:55:53.182945 systemd[1]: Starting clean-ca-certificates.service... Feb 9 08:55:53.186236 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 08:55:53.190000 audit: BPF prog-id=27 op=LOAD Feb 9 08:55:53.194000 audit: BPF prog-id=28 op=LOAD Feb 9 08:55:53.192360 systemd[1]: Starting systemd-resolved.service... Feb 9 08:55:53.198832 systemd[1]: Starting systemd-timesyncd.service... Feb 9 08:55:53.202974 systemd[1]: Starting systemd-update-utmp.service... Feb 9 08:55:53.222023 systemd[1]: Finished clean-ca-certificates.service. Feb 9 08:55:53.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:53.223044 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 08:55:53.234000 audit[1055]: SYSTEM_BOOT pid=1055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 08:55:53.240177 systemd[1]: Finished systemd-update-utmp.service. Feb 9 08:55:53.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:53.283614 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 08:55:53.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:55:53.341000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 08:55:53.341000 audit[1069]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcf37e3960 a2=420 a3=0 items=0 ppid=1049 pid=1069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:55:53.341000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 08:55:53.343202 augenrules[1069]: No rules Feb 9 08:55:53.343360 systemd[1]: Finished audit-rules.service. Feb 9 08:55:53.367910 systemd-resolved[1052]: Positive Trust Anchors: Feb 9 08:55:53.367928 systemd-resolved[1052]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 08:55:53.368012 systemd-resolved[1052]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 08:55:53.385896 ldconfig[1038]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 08:55:53.388158 systemd-resolved[1052]: Using system hostname 'ci-3510.3.2-b-854bdc2340'. Feb 9 08:55:53.390484 systemd[1]: Started systemd-timesyncd.service. Feb 9 08:55:53.391623 systemd[1]: Reached target time-set.target. Feb 9 08:55:53.393304 systemd[1]: Started systemd-resolved.service. Feb 9 08:55:53.394215 systemd[1]: Reached target network.target. Feb 9 08:55:53.394999 systemd[1]: Reached target nss-lookup.target. Feb 9 08:55:53.396381 systemd[1]: Finished ldconfig.service. Feb 9 08:55:53.398659 systemd[1]: Starting systemd-update-done.service... Feb 9 08:55:53.410570 systemd[1]: Finished systemd-update-done.service. Feb 9 08:55:53.411407 systemd[1]: Reached target sysinit.target. Feb 9 08:55:53.412102 systemd[1]: Started motdgen.path. Feb 9 08:55:53.412647 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 08:55:53.413591 systemd[1]: Started logrotate.timer. Feb 9 08:55:53.414390 systemd[1]: Started mdadm.timer. Feb 9 08:55:53.414971 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 08:55:53.415545 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 08:55:53.415602 systemd[1]: Reached target paths.target. Feb 9 08:55:53.416177 systemd[1]: Reached target timers.target. Feb 9 08:55:53.417167 systemd[1]: Listening on dbus.socket. Feb 9 08:55:53.419426 systemd[1]: Starting docker.socket... Feb 9 08:55:53.424406 systemd[1]: Listening on sshd.socket. Feb 9 08:55:53.425308 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 08:55:53.426135 systemd[1]: Listening on docker.socket. Feb 9 08:55:53.426989 systemd[1]: Reached target sockets.target. Feb 9 08:55:53.427615 systemd[1]: Reached target basic.target. Feb 9 08:55:53.428303 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 08:55:53.428344 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 08:55:53.430088 systemd[1]: Starting containerd.service... Feb 9 08:55:53.433938 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 08:55:53.436554 systemd[1]: Starting dbus.service... Feb 9 08:55:53.440402 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 08:55:53.447840 systemd[1]: Starting extend-filesystems.service... Feb 9 08:55:53.448786 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 08:55:53.452819 systemd[1]: Starting motdgen.service... Feb 9 08:55:53.455883 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 08:55:54.347404 systemd-resolved[1052]: Clock change detected. Flushing caches. Feb 9 08:55:54.347837 systemd-timesyncd[1053]: Contacted time server 198.30.92.2:123 (0.flatcar.pool.ntp.org). Feb 9 08:55:54.347911 systemd-timesyncd[1053]: Initial clock synchronization to Fri 2024-02-09 08:55:54.347332 UTC. Feb 9 08:55:54.350470 systemd[1]: Starting prepare-critools.service... Feb 9 08:55:54.355538 systemd[1]: Starting prepare-helm.service... Feb 9 08:55:54.361286 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 08:55:54.364899 systemd[1]: Starting sshd-keygen.service... Feb 9 08:55:54.373732 systemd[1]: Starting systemd-logind.service... Feb 9 08:55:54.374648 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 08:55:54.374752 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 08:55:54.376785 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 08:55:54.378183 systemd[1]: Starting update-engine.service... Feb 9 08:55:54.384828 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 08:55:54.398825 dbus-daemon[1080]: [system] SELinux support is enabled Feb 9 08:55:54.409073 systemd[1]: Started dbus.service. Feb 9 08:55:54.414945 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 08:55:54.414998 systemd[1]: Reached target system-config.target. Feb 9 08:55:54.418256 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 08:55:54.420249 systemd[1]: Starting user-configdrive.service... Feb 9 08:55:54.435749 tar[1103]: ./ Feb 9 08:55:54.437804 tar[1103]: ./macvlan Feb 9 08:55:54.442333 jq[1083]: false Feb 9 08:55:54.449573 tar[1104]: crictl Feb 9 08:55:54.452136 jq[1098]: true Feb 9 08:55:54.456956 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 08:55:54.457199 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 08:55:54.465974 systemd-networkd[1010]: eth0: Gained IPv6LL Feb 9 08:55:54.471640 tar[1105]: linux-amd64/helm Feb 9 08:55:54.474147 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 08:55:54.474381 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 08:55:54.498469 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 08:55:54.498713 systemd[1]: Finished motdgen.service. Feb 9 08:55:54.520969 extend-filesystems[1084]: Found vda Feb 9 08:55:54.520969 extend-filesystems[1084]: Found vda1 Feb 9 08:55:54.520969 extend-filesystems[1084]: Found vda2 Feb 9 08:55:54.520969 extend-filesystems[1084]: Found vda3 Feb 9 08:55:54.520969 extend-filesystems[1084]: Found usr Feb 9 08:55:54.520969 extend-filesystems[1084]: Found vda4 Feb 9 08:55:54.520969 extend-filesystems[1084]: Found vda6 Feb 9 08:55:54.520969 extend-filesystems[1084]: Found vda7 Feb 9 08:55:54.520969 extend-filesystems[1084]: Found vda9 Feb 9 08:55:54.520969 extend-filesystems[1084]: Checking size of /dev/vda9 Feb 9 08:55:54.584908 coreos-cloudinit[1108]: 2024/02/09 08:55:54 Checking availability of "cloud-drive" Feb 9 08:55:54.584908 coreos-cloudinit[1108]: 2024/02/09 08:55:54 Fetching user-data from datasource of type "cloud-drive" Feb 9 08:55:54.584908 coreos-cloudinit[1108]: 2024/02/09 08:55:54 Attempting to read from "/media/configdrive/openstack/latest/user_data" Feb 9 08:55:54.584908 coreos-cloudinit[1108]: 2024/02/09 08:55:54 Fetching meta-data from datasource of type "cloud-drive" Feb 9 08:55:54.584908 coreos-cloudinit[1108]: 2024/02/09 08:55:54 Attempting to read from "/media/configdrive/openstack/latest/meta_data.json" Feb 9 08:55:54.585425 jq[1114]: true Feb 9 08:55:54.601100 update_engine[1095]: I0209 08:55:54.600042 1095 main.cc:92] Flatcar Update Engine starting Feb 9 08:55:54.606476 systemd[1]: Started update-engine.service. Feb 9 08:55:54.611996 update_engine[1095]: I0209 08:55:54.611241 1095 update_check_scheduler.cc:74] Next update check in 11m50s Feb 9 08:55:54.610051 systemd[1]: Started locksmithd.service. Feb 9 08:55:54.619215 extend-filesystems[1084]: Resized partition /dev/vda9 Feb 9 08:55:54.634550 coreos-cloudinit[1108]: Detected an Ignition config. Exiting... Feb 9 08:55:54.639212 systemd[1]: Finished user-configdrive.service. Feb 9 08:55:54.640097 systemd[1]: Reached target user-config.target. Feb 9 08:55:54.645757 extend-filesystems[1130]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 08:55:54.658637 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 15121403 blocks Feb 9 08:55:54.800310 bash[1145]: Updated "/home/core/.ssh/authorized_keys" Feb 9 08:55:54.801754 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 08:55:54.807633 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Feb 9 08:55:54.834626 systemd-logind[1093]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 08:55:54.834661 systemd-logind[1093]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 08:55:54.836111 systemd-logind[1093]: New seat seat0. Feb 9 08:55:54.838167 extend-filesystems[1130]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 9 08:55:54.838167 extend-filesystems[1130]: old_desc_blocks = 1, new_desc_blocks = 8 Feb 9 08:55:54.838167 extend-filesystems[1130]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Feb 9 08:55:54.837903 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 08:55:54.848860 tar[1103]: ./static Feb 9 08:55:54.848914 extend-filesystems[1084]: Resized filesystem in /dev/vda9 Feb 9 08:55:54.848914 extend-filesystems[1084]: Found vdb Feb 9 08:55:54.838142 systemd[1]: Finished extend-filesystems.service. Feb 9 08:55:54.846351 systemd[1]: Started systemd-logind.service. Feb 9 08:55:54.870872 coreos-metadata[1079]: Feb 09 08:55:54.870 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 9 08:55:54.885582 coreos-metadata[1079]: Feb 09 08:55:54.885 INFO Fetch successful Feb 9 08:55:54.902465 env[1109]: time="2024-02-09T08:55:54.901667331Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 08:55:54.925152 unknown[1079]: wrote ssh authorized keys file for user: core Feb 9 08:55:54.947170 update-ssh-keys[1151]: Updated "/home/core/.ssh/authorized_keys" Feb 9 08:55:54.948024 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 08:55:54.963796 env[1109]: time="2024-02-09T08:55:54.963720256Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 08:55:54.963973 env[1109]: time="2024-02-09T08:55:54.963920645Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 08:55:54.982367 env[1109]: time="2024-02-09T08:55:54.982291424Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 08:55:54.982367 env[1109]: time="2024-02-09T08:55:54.982348574Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 08:55:54.988084 env[1109]: time="2024-02-09T08:55:54.988011553Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 08:55:54.988084 env[1109]: time="2024-02-09T08:55:54.988070524Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 08:55:54.988084 env[1109]: time="2024-02-09T08:55:54.988093627Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 08:55:54.988423 env[1109]: time="2024-02-09T08:55:54.988109630Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 08:55:54.988423 env[1109]: time="2024-02-09T08:55:54.988278603Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 08:55:54.994727 env[1109]: time="2024-02-09T08:55:54.994640720Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 08:55:54.995119 env[1109]: time="2024-02-09T08:55:54.995061185Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 08:55:54.995119 env[1109]: time="2024-02-09T08:55:54.995113676Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 08:55:54.995297 env[1109]: time="2024-02-09T08:55:54.995271375Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 08:55:54.995297 env[1109]: time="2024-02-09T08:55:54.995294146Z" level=info msg="metadata content store policy set" policy=shared Feb 9 08:55:54.996864 tar[1103]: ./vlan Feb 9 08:55:55.009583 env[1109]: time="2024-02-09T08:55:55.009496488Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 08:55:55.009583 env[1109]: time="2024-02-09T08:55:55.009576831Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 08:55:55.009861 env[1109]: time="2024-02-09T08:55:55.009616200Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 08:55:55.009861 env[1109]: time="2024-02-09T08:55:55.009673532Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 08:55:55.009861 env[1109]: time="2024-02-09T08:55:55.009703578Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 08:55:55.009861 env[1109]: time="2024-02-09T08:55:55.009725975Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 08:55:55.009861 env[1109]: time="2024-02-09T08:55:55.009750358Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 08:55:55.009861 env[1109]: time="2024-02-09T08:55:55.009772787Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 08:55:55.009861 env[1109]: time="2024-02-09T08:55:55.009795281Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 08:55:55.009861 env[1109]: time="2024-02-09T08:55:55.009821520Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 08:55:55.009861 env[1109]: time="2024-02-09T08:55:55.009843188Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 08:55:55.009861 env[1109]: time="2024-02-09T08:55:55.009863052Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 08:55:55.010257 env[1109]: time="2024-02-09T08:55:55.010116215Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 08:55:55.010312 env[1109]: time="2024-02-09T08:55:55.010261664Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 08:55:55.010932 env[1109]: time="2024-02-09T08:55:55.010889585Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 08:55:55.011049 env[1109]: time="2024-02-09T08:55:55.010975004Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 08:55:55.011049 env[1109]: time="2024-02-09T08:55:55.011008091Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 08:55:55.011153 env[1109]: time="2024-02-09T08:55:55.011097189Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 08:55:55.011153 env[1109]: time="2024-02-09T08:55:55.011120445Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 08:55:55.011153 env[1109]: time="2024-02-09T08:55:55.011142987Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 08:55:55.011289 env[1109]: time="2024-02-09T08:55:55.011165655Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 08:55:55.011289 env[1109]: time="2024-02-09T08:55:55.011188927Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 08:55:55.011289 env[1109]: time="2024-02-09T08:55:55.011210269Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 08:55:55.011289 env[1109]: time="2024-02-09T08:55:55.011233738Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 08:55:55.011289 env[1109]: time="2024-02-09T08:55:55.011254664Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 08:55:55.011289 env[1109]: time="2024-02-09T08:55:55.011278434Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 08:55:55.011563 env[1109]: time="2024-02-09T08:55:55.011531283Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 08:55:55.011649 env[1109]: time="2024-02-09T08:55:55.011566899Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 08:55:55.011649 env[1109]: time="2024-02-09T08:55:55.011588872Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 08:55:55.011649 env[1109]: time="2024-02-09T08:55:55.011626497Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 08:55:55.011776 env[1109]: time="2024-02-09T08:55:55.011655656Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 08:55:55.011776 env[1109]: time="2024-02-09T08:55:55.011680660Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 08:55:55.011776 env[1109]: time="2024-02-09T08:55:55.011714246Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 08:55:55.011776 env[1109]: time="2024-02-09T08:55:55.011765510Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 08:55:55.012166 env[1109]: time="2024-02-09T08:55:55.012075374Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 08:55:55.015070 env[1109]: time="2024-02-09T08:55:55.012171940Z" level=info msg="Connect containerd service" Feb 9 08:55:55.015070 env[1109]: time="2024-02-09T08:55:55.012223548Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 08:55:55.022475 env[1109]: time="2024-02-09T08:55:55.022411100Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 08:55:55.027881 env[1109]: time="2024-02-09T08:55:55.027817444Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 08:55:55.029561 env[1109]: time="2024-02-09T08:55:55.027918641Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 08:55:55.029561 env[1109]: time="2024-02-09T08:55:55.027999251Z" level=info msg="containerd successfully booted in 0.207655s" Feb 9 08:55:55.028125 systemd[1]: Started containerd.service. Feb 9 08:55:55.039580 env[1109]: time="2024-02-09T08:55:55.039484431Z" level=info msg="Start subscribing containerd event" Feb 9 08:55:55.039768 env[1109]: time="2024-02-09T08:55:55.039612567Z" level=info msg="Start recovering state" Feb 9 08:55:55.039768 env[1109]: time="2024-02-09T08:55:55.039733534Z" level=info msg="Start event monitor" Feb 9 08:55:55.039768 env[1109]: time="2024-02-09T08:55:55.039763247Z" level=info msg="Start snapshots syncer" Feb 9 08:55:55.039918 env[1109]: time="2024-02-09T08:55:55.039783336Z" level=info msg="Start cni network conf syncer for default" Feb 9 08:55:55.039918 env[1109]: time="2024-02-09T08:55:55.039798451Z" level=info msg="Start streaming server" Feb 9 08:55:55.105991 systemd-networkd[1010]: eth1: Gained IPv6LL Feb 9 08:55:55.111874 tar[1103]: ./portmap Feb 9 08:55:55.201044 tar[1103]: ./host-local Feb 9 08:55:55.282670 tar[1103]: ./vrf Feb 9 08:55:55.365551 tar[1103]: ./bridge Feb 9 08:55:55.406240 systemd[1]: Created slice system-sshd.slice. Feb 9 08:55:55.472744 tar[1103]: ./tuning Feb 9 08:55:55.562698 tar[1103]: ./firewall Feb 9 08:55:55.637006 sshd_keygen[1117]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 08:55:55.705460 tar[1103]: ./host-device Feb 9 08:55:55.719502 systemd[1]: Finished sshd-keygen.service. Feb 9 08:55:55.723279 systemd[1]: Starting issuegen.service... Feb 9 08:55:55.727705 systemd[1]: Started sshd@0-164.92.86.105:22-69.49.245.160:51598.service. Feb 9 08:55:55.749229 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 08:55:55.749482 systemd[1]: Finished issuegen.service. Feb 9 08:55:55.752770 systemd[1]: Starting systemd-user-sessions.service... Feb 9 08:55:55.789617 systemd[1]: Finished systemd-user-sessions.service. Feb 9 08:55:55.793256 systemd[1]: Started getty@tty1.service. Feb 9 08:55:55.798806 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 08:55:55.801282 systemd[1]: Reached target getty.target. Feb 9 08:55:55.824308 tar[1103]: ./sbr Feb 9 08:55:55.926290 tar[1103]: ./loopback Feb 9 08:55:56.004701 tar[1103]: ./dhcp Feb 9 08:55:56.092728 systemd[1]: Finished prepare-critools.service. Feb 9 08:55:56.099458 tar[1105]: linux-amd64/LICENSE Feb 9 08:55:56.102081 tar[1105]: linux-amd64/README.md Feb 9 08:55:56.107895 systemd[1]: Finished prepare-helm.service. Feb 9 08:55:56.137042 sshd[1165]: Invalid user hadiakaf from 69.49.245.160 port 51598 Feb 9 08:55:56.178382 sshd[1165]: pam_faillock(sshd:auth): User unknown Feb 9 08:55:56.179144 sshd[1165]: pam_unix(sshd:auth): check pass; user unknown Feb 9 08:55:56.179192 sshd[1165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.49.245.160 Feb 9 08:55:56.180368 tar[1103]: ./ptp Feb 9 08:55:56.180469 sshd[1165]: pam_faillock(sshd:auth): User unknown Feb 9 08:55:56.203259 locksmithd[1128]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 08:55:56.232971 tar[1103]: ./ipvlan Feb 9 08:55:56.281098 tar[1103]: ./bandwidth Feb 9 08:55:56.342735 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 08:55:56.344114 systemd[1]: Reached target multi-user.target. Feb 9 08:55:56.347405 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 08:55:56.360334 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 08:55:56.360744 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 08:55:56.361690 systemd[1]: Startup finished in 1.175s (kernel) + 7.256s (initrd) + 9.443s (userspace) = 17.875s. Feb 9 08:55:56.907342 systemd[1]: Started sshd@1-164.92.86.105:22-15.204.211.99:32848.service. Feb 9 08:55:57.282816 sshd[1180]: Invalid user snowduty from 15.204.211.99 port 32848 Feb 9 08:55:57.287136 sshd[1180]: pam_faillock(sshd:auth): User unknown Feb 9 08:55:57.288507 sshd[1180]: pam_unix(sshd:auth): check pass; user unknown Feb 9 08:55:57.288723 sshd[1180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=15.204.211.99 Feb 9 08:55:57.289591 sshd[1180]: pam_faillock(sshd:auth): User unknown Feb 9 08:55:58.078773 sshd[1165]: Failed password for invalid user hadiakaf from 69.49.245.160 port 51598 ssh2 Feb 9 08:55:58.992189 sshd[1180]: Failed password for invalid user snowduty from 15.204.211.99 port 32848 ssh2 Feb 9 08:55:59.844232 sshd[1165]: Received disconnect from 69.49.245.160 port 51598:11: Bye Bye [preauth] Feb 9 08:55:59.844232 sshd[1165]: Disconnected from invalid user hadiakaf 69.49.245.160 port 51598 [preauth] Feb 9 08:55:59.846213 systemd[1]: sshd@0-164.92.86.105:22-69.49.245.160:51598.service: Deactivated successfully. Feb 9 08:56:00.154682 sshd[1180]: Received disconnect from 15.204.211.99 port 32848:11: Bye Bye [preauth] Feb 9 08:56:00.154682 sshd[1180]: Disconnected from invalid user snowduty 15.204.211.99 port 32848 [preauth] Feb 9 08:56:00.157585 systemd[1]: sshd@1-164.92.86.105:22-15.204.211.99:32848.service: Deactivated successfully. Feb 9 08:56:02.672143 systemd[1]: Started sshd@2-164.92.86.105:22-129.226.92.40:53700.service. Feb 9 08:56:02.915700 systemd[1]: Started sshd@3-164.92.86.105:22-140.86.39.162:54542.service. Feb 9 08:56:03.474243 systemd[1]: Started sshd@4-164.92.86.105:22-139.178.89.65:40432.service. Feb 9 08:56:03.523788 sshd[1191]: Accepted publickey for core from 139.178.89.65 port 40432 ssh2: RSA SHA256:zxCjWE6I1sqRNr8f+A5DoPj4YLVmU7ObDiNpO/GSq00 Feb 9 08:56:03.528516 sshd[1191]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 08:56:03.558448 systemd[1]: Created slice user-500.slice. Feb 9 08:56:03.560570 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 08:56:03.570329 systemd-logind[1093]: New session 1 of user core. Feb 9 08:56:03.581480 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 08:56:03.584486 systemd[1]: Starting user@500.service... Feb 9 08:56:03.594217 (systemd)[1194]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 08:56:03.705074 sshd[1185]: Invalid user oracle from 129.226.92.40 port 53700 Feb 9 08:56:03.708959 sshd[1185]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:03.709769 sshd[1185]: pam_unix(sshd:auth): check pass; user unknown Feb 9 08:56:03.709827 sshd[1185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.92.40 Feb 9 08:56:03.710402 sshd[1185]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:03.735527 systemd[1194]: Queued start job for default target default.target. Feb 9 08:56:03.737082 systemd[1194]: Reached target paths.target. Feb 9 08:56:03.737363 systemd[1194]: Reached target sockets.target. Feb 9 08:56:03.737698 systemd[1194]: Reached target timers.target. Feb 9 08:56:03.737864 systemd[1194]: Reached target basic.target. Feb 9 08:56:03.738105 systemd[1194]: Reached target default.target. Feb 9 08:56:03.738220 systemd[1]: Started user@500.service. Feb 9 08:56:03.738646 systemd[1194]: Startup finished in 132ms. Feb 9 08:56:03.739810 systemd[1]: Started session-1.scope. Feb 9 08:56:03.757337 sshd[1188]: Invalid user minda from 140.86.39.162 port 54542 Feb 9 08:56:03.761776 sshd[1188]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:03.762558 sshd[1188]: pam_unix(sshd:auth): check pass; user unknown Feb 9 08:56:03.762730 sshd[1188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.86.39.162 Feb 9 08:56:03.763452 sshd[1188]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:03.806930 systemd[1]: Started sshd@5-164.92.86.105:22-139.178.89.65:40438.service. Feb 9 08:56:03.874136 sshd[1203]: Accepted publickey for core from 139.178.89.65 port 40438 ssh2: RSA SHA256:zxCjWE6I1sqRNr8f+A5DoPj4YLVmU7ObDiNpO/GSq00 Feb 9 08:56:03.876162 sshd[1203]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 08:56:03.884531 systemd[1]: Started session-2.scope. Feb 9 08:56:03.885578 systemd-logind[1093]: New session 2 of user core. Feb 9 08:56:03.956781 sshd[1203]: pam_unix(sshd:session): session closed for user core Feb 9 08:56:03.963788 systemd[1]: sshd@5-164.92.86.105:22-139.178.89.65:40438.service: Deactivated successfully. Feb 9 08:56:03.964935 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 08:56:03.966475 systemd-logind[1093]: Session 2 logged out. Waiting for processes to exit. Feb 9 08:56:03.968502 systemd[1]: Started sshd@6-164.92.86.105:22-139.178.89.65:40444.service. Feb 9 08:56:03.970983 systemd-logind[1093]: Removed session 2. Feb 9 08:56:04.018502 sshd[1209]: Accepted publickey for core from 139.178.89.65 port 40444 ssh2: RSA SHA256:zxCjWE6I1sqRNr8f+A5DoPj4YLVmU7ObDiNpO/GSq00 Feb 9 08:56:04.021354 sshd[1209]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 08:56:04.028754 systemd-logind[1093]: New session 3 of user core. Feb 9 08:56:04.029947 systemd[1]: Started session-3.scope. Feb 9 08:56:04.095374 sshd[1209]: pam_unix(sshd:session): session closed for user core Feb 9 08:56:04.101283 systemd[1]: sshd@6-164.92.86.105:22-139.178.89.65:40444.service: Deactivated successfully. Feb 9 08:56:04.102517 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 08:56:04.103695 systemd-logind[1093]: Session 3 logged out. Waiting for processes to exit. Feb 9 08:56:04.106065 systemd[1]: Started sshd@7-164.92.86.105:22-139.178.89.65:40454.service. Feb 9 08:56:04.108441 systemd-logind[1093]: Removed session 3. Feb 9 08:56:04.158837 sshd[1215]: Accepted publickey for core from 139.178.89.65 port 40454 ssh2: RSA SHA256:zxCjWE6I1sqRNr8f+A5DoPj4YLVmU7ObDiNpO/GSq00 Feb 9 08:56:04.161835 sshd[1215]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 08:56:04.169758 systemd[1]: Started session-4.scope. Feb 9 08:56:04.170509 systemd-logind[1093]: New session 4 of user core. Feb 9 08:56:04.239294 sshd[1215]: pam_unix(sshd:session): session closed for user core Feb 9 08:56:04.245310 systemd[1]: sshd@7-164.92.86.105:22-139.178.89.65:40454.service: Deactivated successfully. Feb 9 08:56:04.246810 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 08:56:04.248164 systemd-logind[1093]: Session 4 logged out. Waiting for processes to exit. Feb 9 08:56:04.250960 systemd[1]: Started sshd@8-164.92.86.105:22-139.178.89.65:40464.service. Feb 9 08:56:04.253492 systemd-logind[1093]: Removed session 4. Feb 9 08:56:04.309183 sshd[1221]: Accepted publickey for core from 139.178.89.65 port 40464 ssh2: RSA SHA256:zxCjWE6I1sqRNr8f+A5DoPj4YLVmU7ObDiNpO/GSq00 Feb 9 08:56:04.311925 sshd[1221]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 08:56:04.319642 systemd[1]: Started session-5.scope. Feb 9 08:56:04.320690 systemd-logind[1093]: New session 5 of user core. Feb 9 08:56:04.398114 sudo[1224]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 08:56:04.398475 sudo[1224]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 08:56:04.408868 dbus-daemon[1080]: \xd0\xdd=#\xe0U: received setenforce notice (enforcing=1206682880) Feb 9 08:56:04.412013 sudo[1224]: pam_unix(sudo:session): session closed for user root Feb 9 08:56:04.416749 sshd[1221]: pam_unix(sshd:session): session closed for user core Feb 9 08:56:04.423945 systemd[1]: sshd@8-164.92.86.105:22-139.178.89.65:40464.service: Deactivated successfully. Feb 9 08:56:04.425228 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 08:56:04.426702 systemd-logind[1093]: Session 5 logged out. Waiting for processes to exit. Feb 9 08:56:04.428521 systemd[1]: Started sshd@9-164.92.86.105:22-139.178.89.65:40474.service. Feb 9 08:56:04.431272 systemd-logind[1093]: Removed session 5. Feb 9 08:56:04.481060 sshd[1228]: Accepted publickey for core from 139.178.89.65 port 40474 ssh2: RSA SHA256:zxCjWE6I1sqRNr8f+A5DoPj4YLVmU7ObDiNpO/GSq00 Feb 9 08:56:04.483831 sshd[1228]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 08:56:04.491328 systemd[1]: Started session-6.scope. Feb 9 08:56:04.492129 systemd-logind[1093]: New session 6 of user core. Feb 9 08:56:04.558525 sudo[1232]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 08:56:04.559277 sudo[1232]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 08:56:04.565043 sudo[1232]: pam_unix(sudo:session): session closed for user root Feb 9 08:56:04.573918 sudo[1231]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 08:56:04.574280 sudo[1231]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 08:56:04.594705 kernel: kauditd_printk_skb: 190 callbacks suppressed Feb 9 08:56:04.594841 kernel: audit: type=1305 audit(1707468964.591:178): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 08:56:04.591000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 08:56:04.593752 systemd[1]: Stopping audit-rules.service... Feb 9 08:56:04.591000 audit[1235]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffca24a0bb0 a2=420 a3=0 items=0 ppid=1 pid=1235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:04.597554 auditctl[1235]: No rules Feb 9 08:56:04.604626 kernel: audit: type=1300 audit(1707468964.591:178): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffca24a0bb0 a2=420 a3=0 items=0 ppid=1 pid=1235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:04.598290 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 08:56:04.598522 systemd[1]: Stopped audit-rules.service. Feb 9 08:56:04.605858 systemd[1]: Starting audit-rules.service... Feb 9 08:56:04.591000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 08:56:04.610763 kernel: audit: type=1327 audit(1707468964.591:178): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 08:56:04.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:04.617167 kernel: audit: type=1131 audit(1707468964.596:179): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:04.637839 augenrules[1252]: No rules Feb 9 08:56:04.639214 systemd[1]: Finished audit-rules.service. Feb 9 08:56:04.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:04.639000 audit[1231]: USER_END pid=1231 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 08:56:04.641572 sudo[1231]: pam_unix(sudo:session): session closed for user root Feb 9 08:56:04.660653 kernel: audit: type=1130 audit(1707468964.638:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:04.660791 kernel: audit: type=1106 audit(1707468964.639:181): pid=1231 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 08:56:04.660826 kernel: audit: type=1104 audit(1707468964.639:182): pid=1231 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 08:56:04.660862 kernel: audit: type=1130 audit(1707468964.654:183): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-164.92.86.105:22-139.178.89.65:40490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:04.639000 audit[1231]: CRED_DISP pid=1231 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 08:56:04.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-164.92.86.105:22-139.178.89.65:40490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:04.653502 sshd[1228]: pam_unix(sshd:session): session closed for user core Feb 9 08:56:04.658052 systemd[1]: Started sshd@10-164.92.86.105:22-139.178.89.65:40490.service. Feb 9 08:56:04.667000 audit[1228]: USER_END pid=1228 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 08:56:04.675717 kernel: audit: type=1106 audit(1707468964.667:184): pid=1228 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 08:56:04.669855 systemd[1]: sshd@9-164.92.86.105:22-139.178.89.65:40474.service: Deactivated successfully. Feb 9 08:56:04.670993 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 08:56:04.683122 kernel: audit: type=1104 audit(1707468964.667:185): pid=1228 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 08:56:04.667000 audit[1228]: CRED_DISP pid=1228 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 08:56:04.682633 systemd-logind[1093]: Session 6 logged out. Waiting for processes to exit. Feb 9 08:56:04.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-164.92.86.105:22-139.178.89.65:40474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:04.684068 systemd-logind[1093]: Removed session 6. Feb 9 08:56:04.720000 audit[1257]: USER_ACCT pid=1257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 08:56:04.721306 sshd[1257]: Accepted publickey for core from 139.178.89.65 port 40490 ssh2: RSA SHA256:zxCjWE6I1sqRNr8f+A5DoPj4YLVmU7ObDiNpO/GSq00 Feb 9 08:56:04.722000 audit[1257]: CRED_ACQ pid=1257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 08:56:04.722000 audit[1257]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe08a0eba0 a2=3 a3=0 items=0 ppid=1 pid=1257 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:04.722000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 08:56:04.723263 sshd[1257]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 08:56:04.731063 systemd-logind[1093]: New session 7 of user core. Feb 9 08:56:04.731958 systemd[1]: Started session-7.scope. Feb 9 08:56:04.738000 audit[1257]: USER_START pid=1257 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 08:56:04.741000 audit[1260]: CRED_ACQ pid=1260 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 08:56:04.796000 audit[1261]: USER_ACCT pid=1261 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 08:56:04.797502 sudo[1261]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 08:56:04.797000 audit[1261]: CRED_REFR pid=1261 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 08:56:04.798351 sudo[1261]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 08:56:04.800000 audit[1261]: USER_START pid=1261 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 08:56:05.413638 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 08:56:05.423185 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 08:56:05.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:05.424881 systemd[1]: Reached target network-online.target. Feb 9 08:56:05.427885 systemd[1]: Starting docker.service... Feb 9 08:56:05.495679 env[1277]: time="2024-02-09T08:56:05.495553706Z" level=info msg="Starting up" Feb 9 08:56:05.499304 env[1277]: time="2024-02-09T08:56:05.499230481Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 08:56:05.499304 env[1277]: time="2024-02-09T08:56:05.499267770Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 08:56:05.499304 env[1277]: time="2024-02-09T08:56:05.499299713Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 08:56:05.499592 env[1277]: time="2024-02-09T08:56:05.499315667Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 08:56:05.502290 env[1277]: time="2024-02-09T08:56:05.502243013Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 08:56:05.502495 env[1277]: time="2024-02-09T08:56:05.502469705Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 08:56:05.502636 env[1277]: time="2024-02-09T08:56:05.502583375Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 08:56:05.502763 env[1277]: time="2024-02-09T08:56:05.502737743Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 08:56:05.551521 env[1277]: time="2024-02-09T08:56:05.551457229Z" level=info msg="Loading containers: start." Feb 9 08:56:05.632000 audit[1307]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.632000 audit[1307]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fffb8a8e2c0 a2=0 a3=7fffb8a8e2ac items=0 ppid=1277 pid=1307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.632000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 08:56:05.635000 audit[1309]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1309 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.635000 audit[1309]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc8c28c4d0 a2=0 a3=7ffc8c28c4bc items=0 ppid=1277 pid=1309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.635000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 08:56:05.638000 audit[1311]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1311 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.638000 audit[1311]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff9cc52630 a2=0 a3=7fff9cc5261c items=0 ppid=1277 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.638000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 08:56:05.642000 audit[1313]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.642000 audit[1313]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc6481e8c0 a2=0 a3=7ffc6481e8ac items=0 ppid=1277 pid=1313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.642000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 08:56:05.646000 audit[1315]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1315 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.646000 audit[1315]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffd74af580 a2=0 a3=7fffd74af56c items=0 ppid=1277 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.646000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 08:56:05.671000 audit[1320]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.671000 audit[1320]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc9030ac20 a2=0 a3=7ffc9030ac0c items=0 ppid=1277 pid=1320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.671000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 08:56:05.685000 audit[1322]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.685000 audit[1322]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc1c9c0400 a2=0 a3=7ffc1c9c03ec items=0 ppid=1277 pid=1322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.685000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 08:56:05.688000 audit[1324]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.688000 audit[1324]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffff45b0be0 a2=0 a3=7ffff45b0bcc items=0 ppid=1277 pid=1324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.688000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 08:56:05.692000 audit[1326]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.692000 audit[1326]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffdb8863290 a2=0 a3=7ffdb886327c items=0 ppid=1277 pid=1326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.692000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 08:56:05.706000 audit[1330]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.706000 audit[1330]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffef52fc830 a2=0 a3=7ffef52fc81c items=0 ppid=1277 pid=1330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.706000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 08:56:05.708000 audit[1331]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.708000 audit[1331]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd74ca92b0 a2=0 a3=7ffd74ca929c items=0 ppid=1277 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.708000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 08:56:05.722640 kernel: Initializing XFRM netlink socket Feb 9 08:56:05.767943 env[1277]: time="2024-02-09T08:56:05.767897109Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 08:56:05.810000 audit[1339]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.810000 audit[1339]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc9b1523d0 a2=0 a3=7ffc9b1523bc items=0 ppid=1277 pid=1339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.810000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 08:56:05.826000 audit[1342]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.826000 audit[1342]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff14ba0830 a2=0 a3=7fff14ba081c items=0 ppid=1277 pid=1342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.826000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 08:56:05.831000 audit[1345]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.831000 audit[1345]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc8e444880 a2=0 a3=7ffc8e44486c items=0 ppid=1277 pid=1345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.831000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 08:56:05.834000 audit[1347]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.834000 audit[1347]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdf223c600 a2=0 a3=7ffdf223c5ec items=0 ppid=1277 pid=1347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.834000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 08:56:05.838000 audit[1349]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.838000 audit[1349]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffebafb1e20 a2=0 a3=7ffebafb1e0c items=0 ppid=1277 pid=1349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.838000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 08:56:05.841000 audit[1351]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.841000 audit[1351]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffcfadfb080 a2=0 a3=7ffcfadfb06c items=0 ppid=1277 pid=1351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.841000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 08:56:05.844000 audit[1353]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.844000 audit[1353]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff781a4ac0 a2=0 a3=7fff781a4aac items=0 ppid=1277 pid=1353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.844000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 08:56:05.857000 audit[1356]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1356 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.857000 audit[1356]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffddcaecb00 a2=0 a3=7ffddcaecaec items=0 ppid=1277 pid=1356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.857000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 08:56:05.861000 audit[1358]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1358 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.861000 audit[1358]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffcd7ea9670 a2=0 a3=7ffcd7ea965c items=0 ppid=1277 pid=1358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.861000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 08:56:05.864000 audit[1360]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.864000 audit[1360]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff835d3ca0 a2=0 a3=7fff835d3c8c items=0 ppid=1277 pid=1360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.864000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 08:56:05.868000 audit[1362]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1362 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.868000 audit[1362]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff919d2820 a2=0 a3=7fff919d280c items=0 ppid=1277 pid=1362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.868000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 08:56:05.869764 systemd-networkd[1010]: docker0: Link UP Feb 9 08:56:05.883000 audit[1366]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1366 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.883000 audit[1366]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcb9290ca0 a2=0 a3=7ffcb9290c8c items=0 ppid=1277 pid=1366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.883000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 08:56:05.885000 audit[1367]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1367 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:05.885000 audit[1367]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffefd848360 a2=0 a3=7ffefd84834c items=0 ppid=1277 pid=1367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:05.885000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 08:56:05.887100 env[1277]: time="2024-02-09T08:56:05.887054928Z" level=info msg="Loading containers: done." Feb 9 08:56:05.904691 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2567126418-merged.mount: Deactivated successfully. Feb 9 08:56:05.905351 sshd[1185]: Failed password for invalid user oracle from 129.226.92.40 port 53700 ssh2 Feb 9 08:56:05.914261 env[1277]: time="2024-02-09T08:56:05.914199884Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 08:56:05.914783 env[1277]: time="2024-02-09T08:56:05.914752157Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 08:56:05.915042 env[1277]: time="2024-02-09T08:56:05.915021086Z" level=info msg="Daemon has completed initialization" Feb 9 08:56:05.936133 systemd[1]: Started docker.service. Feb 9 08:56:05.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:05.943056 env[1277]: time="2024-02-09T08:56:05.942998083Z" level=info msg="API listen on /run/docker.sock" Feb 9 08:56:05.955321 sshd[1188]: Failed password for invalid user minda from 140.86.39.162 port 54542 ssh2 Feb 9 08:56:05.984016 systemd[1]: Starting coreos-metadata.service... Feb 9 08:56:06.060169 coreos-metadata[1394]: Feb 09 08:56:06.060 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 9 08:56:06.080998 coreos-metadata[1394]: Feb 09 08:56:06.080 INFO Fetch successful Feb 9 08:56:06.100065 systemd[1]: Finished coreos-metadata.service. Feb 9 08:56:06.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:06.119546 systemd[1]: Reloading. Feb 9 08:56:06.233354 /usr/lib/systemd/system-generators/torcx-generator[1429]: time="2024-02-09T08:56:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 08:56:06.239723 /usr/lib/systemd/system-generators/torcx-generator[1429]: time="2024-02-09T08:56:06Z" level=info msg="torcx already run" Feb 9 08:56:06.379492 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 08:56:06.379527 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 08:56:06.411081 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 08:56:06.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.557000 audit: BPF prog-id=34 op=LOAD Feb 9 08:56:06.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.557000 audit: BPF prog-id=35 op=LOAD Feb 9 08:56:06.557000 audit: BPF prog-id=21 op=UNLOAD Feb 9 08:56:06.558000 audit: BPF prog-id=22 op=UNLOAD Feb 9 08:56:06.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.562000 audit: BPF prog-id=36 op=LOAD Feb 9 08:56:06.562000 audit: BPF prog-id=29 op=UNLOAD Feb 9 08:56:06.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.563000 audit: BPF prog-id=37 op=LOAD Feb 9 08:56:06.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.564000 audit: BPF prog-id=38 op=LOAD Feb 9 08:56:06.565000 audit: BPF prog-id=30 op=UNLOAD Feb 9 08:56:06.565000 audit: BPF prog-id=31 op=UNLOAD Feb 9 08:56:06.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.567000 audit: BPF prog-id=39 op=LOAD Feb 9 08:56:06.567000 audit: BPF prog-id=24 op=UNLOAD Feb 9 08:56:06.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.568000 audit: BPF prog-id=40 op=LOAD Feb 9 08:56:06.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.568000 audit: BPF prog-id=41 op=LOAD Feb 9 08:56:06.569000 audit: BPF prog-id=25 op=UNLOAD Feb 9 08:56:06.569000 audit: BPF prog-id=26 op=UNLOAD Feb 9 08:56:06.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.571000 audit: BPF prog-id=42 op=LOAD Feb 9 08:56:06.571000 audit: BPF prog-id=28 op=UNLOAD Feb 9 08:56:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.574000 audit: BPF prog-id=43 op=LOAD Feb 9 08:56:06.574000 audit: BPF prog-id=27 op=UNLOAD Feb 9 08:56:06.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.578000 audit: BPF prog-id=44 op=LOAD Feb 9 08:56:06.578000 audit: BPF prog-id=23 op=UNLOAD Feb 9 08:56:06.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.582000 audit: BPF prog-id=45 op=LOAD Feb 9 08:56:06.583000 audit: BPF prog-id=32 op=UNLOAD Feb 9 08:56:06.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.587000 audit: BPF prog-id=46 op=LOAD Feb 9 08:56:06.587000 audit: BPF prog-id=18 op=UNLOAD Feb 9 08:56:06.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.588000 audit: BPF prog-id=47 op=LOAD Feb 9 08:56:06.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:06.589000 audit: BPF prog-id=48 op=LOAD Feb 9 08:56:06.589000 audit: BPF prog-id=19 op=UNLOAD Feb 9 08:56:06.589000 audit: BPF prog-id=20 op=UNLOAD Feb 9 08:56:06.613569 systemd[1]: Started kubelet.service. Feb 9 08:56:06.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:06.758344 kubelet[1475]: E0209 08:56:06.758193 1475 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 08:56:06.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 08:56:06.764480 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 08:56:06.764736 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 08:56:07.237875 env[1109]: time="2024-02-09T08:56:07.237801162Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 9 08:56:07.491064 sshd[1185]: Received disconnect from 129.226.92.40 port 53700:11: Bye Bye [preauth] Feb 9 08:56:07.491064 sshd[1185]: Disconnected from invalid user oracle 129.226.92.40 port 53700 [preauth] Feb 9 08:56:07.492063 systemd[1]: sshd@2-164.92.86.105:22-129.226.92.40:53700.service: Deactivated successfully. Feb 9 08:56:07.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@2-164.92.86.105:22-129.226.92.40:53700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:07.597061 sshd[1188]: Received disconnect from 140.86.39.162 port 54542:11: Bye Bye [preauth] Feb 9 08:56:07.597061 sshd[1188]: Disconnected from invalid user minda 140.86.39.162 port 54542 [preauth] Feb 9 08:56:07.598953 systemd[1]: sshd@3-164.92.86.105:22-140.86.39.162:54542.service: Deactivated successfully. Feb 9 08:56:07.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@3-164.92.86.105:22-140.86.39.162:54542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:07.847629 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3929838901.mount: Deactivated successfully. Feb 9 08:56:10.402424 env[1109]: time="2024-02-09T08:56:10.402353669Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:10.406821 env[1109]: time="2024-02-09T08:56:10.406753863Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:10.410574 env[1109]: time="2024-02-09T08:56:10.410510623Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:10.415760 env[1109]: time="2024-02-09T08:56:10.415688648Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:10.417292 env[1109]: time="2024-02-09T08:56:10.417227340Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f\"" Feb 9 08:56:10.437911 env[1109]: time="2024-02-09T08:56:10.437864382Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 9 08:56:10.503541 kernel: kauditd_printk_skb: 262 callbacks suppressed Feb 9 08:56:10.503717 kernel: audit: type=1130 audit(1707468970.494:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-164.92.86.105:22-1.164.107.107:33998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:10.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-164.92.86.105:22-1.164.107.107:33998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:10.495088 systemd[1]: Started sshd@11-164.92.86.105:22-1.164.107.107:33998.service. Feb 9 08:56:11.238528 sshd[1501]: Invalid user shahbaz from 1.164.107.107 port 33998 Feb 9 08:56:11.243680 sshd[1501]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:11.244932 sshd[1501]: pam_unix(sshd:auth): check pass; user unknown Feb 9 08:56:11.245154 sshd[1501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.164.107.107 Feb 9 08:56:11.245949 sshd[1501]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:11.245000 audit[1501]: USER_AUTH pid=1501 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="shahbaz" exe="/usr/sbin/sshd" hostname=1.164.107.107 addr=1.164.107.107 terminal=ssh res=failed' Feb 9 08:56:11.252712 kernel: audit: type=1100 audit(1707468971.245:399): pid=1501 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="shahbaz" exe="/usr/sbin/sshd" hostname=1.164.107.107 addr=1.164.107.107 terminal=ssh res=failed' Feb 9 08:56:13.203823 sshd[1501]: Failed password for invalid user shahbaz from 1.164.107.107 port 33998 ssh2 Feb 9 08:56:13.322566 env[1109]: time="2024-02-09T08:56:13.322479286Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:13.326210 env[1109]: time="2024-02-09T08:56:13.326140099Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:13.330330 env[1109]: time="2024-02-09T08:56:13.330276108Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:13.339812 env[1109]: time="2024-02-09T08:56:13.339747150Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:13.341299 env[1109]: time="2024-02-09T08:56:13.341231032Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486\"" Feb 9 08:56:13.358274 env[1109]: time="2024-02-09T08:56:13.358231424Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 9 08:56:14.074775 systemd[1]: Started sshd@12-164.92.86.105:22-122.184.72.209:57564.service. Feb 9 08:56:14.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-164.92.86.105:22-122.184.72.209:57564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:14.080956 sshd[1501]: Received disconnect from 1.164.107.107 port 33998:11: Bye Bye [preauth] Feb 9 08:56:14.080956 sshd[1501]: Disconnected from invalid user shahbaz 1.164.107.107 port 33998 [preauth] Feb 9 08:56:14.082448 kernel: audit: type=1130 audit(1707468974.074:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-164.92.86.105:22-122.184.72.209:57564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:14.084043 systemd[1]: sshd@11-164.92.86.105:22-1.164.107.107:33998.service: Deactivated successfully. Feb 9 08:56:14.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-164.92.86.105:22-1.164.107.107:33998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:14.090842 kernel: audit: type=1131 audit(1707468974.083:401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-164.92.86.105:22-1.164.107.107:33998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:15.076899 env[1109]: time="2024-02-09T08:56:15.076837929Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:15.080690 env[1109]: time="2024-02-09T08:56:15.080637022Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:15.084142 env[1109]: time="2024-02-09T08:56:15.084073196Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:15.087180 env[1109]: time="2024-02-09T08:56:15.087133896Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:15.088699 env[1109]: time="2024-02-09T08:56:15.088637014Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e\"" Feb 9 08:56:15.108709 env[1109]: time="2024-02-09T08:56:15.108654480Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 08:56:15.338994 sshd[1509]: Invalid user trixx from 122.184.72.209 port 57564 Feb 9 08:56:15.343634 sshd[1509]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:15.344674 sshd[1509]: pam_unix(sshd:auth): check pass; user unknown Feb 9 08:56:15.344742 sshd[1509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.184.72.209 Feb 9 08:56:15.345344 sshd[1509]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:15.344000 audit[1509]: USER_AUTH pid=1509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="trixx" exe="/usr/sbin/sshd" hostname=122.184.72.209 addr=122.184.72.209 terminal=ssh res=failed' Feb 9 08:56:15.351661 kernel: audit: type=1100 audit(1707468975.344:402): pid=1509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="trixx" exe="/usr/sbin/sshd" hostname=122.184.72.209 addr=122.184.72.209 terminal=ssh res=failed' Feb 9 08:56:16.616372 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2070548827.mount: Deactivated successfully. Feb 9 08:56:17.001959 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 08:56:17.002169 systemd[1]: Stopped kubelet.service. Feb 9 08:56:17.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:17.009629 kernel: audit: type=1130 audit(1707468977.001:403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:17.010699 systemd[1]: Started kubelet.service. Feb 9 08:56:17.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:17.018728 kernel: audit: type=1131 audit(1707468977.001:404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:17.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:17.027628 kernel: audit: type=1130 audit(1707468977.010:405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:17.113525 kubelet[1518]: E0209 08:56:17.113461 1518 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 08:56:17.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 08:56:17.118634 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 08:56:17.118832 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 08:56:17.124850 kernel: audit: type=1131 audit(1707468977.118:406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 08:56:17.388374 env[1109]: time="2024-02-09T08:56:17.388190418Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:17.392707 env[1109]: time="2024-02-09T08:56:17.392240213Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:17.394853 env[1109]: time="2024-02-09T08:56:17.394794988Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:17.397215 env[1109]: time="2024-02-09T08:56:17.397154027Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:17.398128 env[1109]: time="2024-02-09T08:56:17.398081693Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 9 08:56:17.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-164.92.86.105:22-170.64.208.208:50102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:17.412648 systemd[1]: Started sshd@13-164.92.86.105:22-170.64.208.208:50102.service. Feb 9 08:56:17.419667 kernel: audit: type=1130 audit(1707468977.412:407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-164.92.86.105:22-170.64.208.208:50102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:17.427354 env[1109]: time="2024-02-09T08:56:17.427300935Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 08:56:17.520674 sshd[1509]: Failed password for invalid user trixx from 122.184.72.209 port 57564 ssh2 Feb 9 08:56:17.996286 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4017272752.mount: Deactivated successfully. Feb 9 08:56:18.005282 env[1109]: time="2024-02-09T08:56:18.005213321Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:18.008884 env[1109]: time="2024-02-09T08:56:18.008822395Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:18.011255 env[1109]: time="2024-02-09T08:56:18.011197182Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:18.013711 env[1109]: time="2024-02-09T08:56:18.013657793Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:18.014352 env[1109]: time="2024-02-09T08:56:18.014290093Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 9 08:56:18.034654 env[1109]: time="2024-02-09T08:56:18.034582164Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 9 08:56:18.307645 sshd[1530]: Invalid user esrassoc from 170.64.208.208 port 50102 Feb 9 08:56:18.312500 sshd[1530]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:18.313587 sshd[1530]: pam_unix(sshd:auth): check pass; user unknown Feb 9 08:56:18.313786 sshd[1530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.208.208 Feb 9 08:56:18.314574 sshd[1530]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:18.314000 audit[1530]: USER_AUTH pid=1530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="esrassoc" exe="/usr/sbin/sshd" hostname=170.64.208.208 addr=170.64.208.208 terminal=ssh res=failed' Feb 9 08:56:18.321663 kernel: audit: type=1100 audit(1707468978.314:408): pid=1530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="esrassoc" exe="/usr/sbin/sshd" hostname=170.64.208.208 addr=170.64.208.208 terminal=ssh res=failed' Feb 9 08:56:18.376753 sshd[1509]: Received disconnect from 122.184.72.209 port 57564:11: Bye Bye [preauth] Feb 9 08:56:18.376753 sshd[1509]: Disconnected from invalid user trixx 122.184.72.209 port 57564 [preauth] Feb 9 08:56:18.378669 systemd[1]: sshd@12-164.92.86.105:22-122.184.72.209:57564.service: Deactivated successfully. Feb 9 08:56:18.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-164.92.86.105:22-122.184.72.209:57564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:18.385650 kernel: audit: type=1131 audit(1707468978.378:409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-164.92.86.105:22-122.184.72.209:57564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:19.035922 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2095034566.mount: Deactivated successfully. Feb 9 08:56:19.568795 sshd[1530]: Failed password for invalid user esrassoc from 170.64.208.208 port 50102 ssh2 Feb 9 08:56:20.643972 sshd[1530]: Received disconnect from 170.64.208.208 port 50102:11: Bye Bye [preauth] Feb 9 08:56:20.643972 sshd[1530]: Disconnected from invalid user esrassoc 170.64.208.208 port 50102 [preauth] Feb 9 08:56:20.645953 systemd[1]: sshd@13-164.92.86.105:22-170.64.208.208:50102.service: Deactivated successfully. Feb 9 08:56:20.653706 kernel: audit: type=1131 audit(1707468980.645:410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-164.92.86.105:22-170.64.208.208:50102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:20.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-164.92.86.105:22-170.64.208.208:50102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:22.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-164.92.86.105:22-68.183.63.174:44578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:22.196730 kernel: audit: type=1130 audit(1707468982.188:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-164.92.86.105:22-68.183.63.174:44578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:22.188904 systemd[1]: Started sshd@14-164.92.86.105:22-68.183.63.174:44578.service. Feb 9 08:56:22.686692 sshd[1542]: Invalid user zhangxu from 68.183.63.174 port 44578 Feb 9 08:56:22.690985 sshd[1542]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:22.692510 sshd[1542]: pam_unix(sshd:auth): check pass; user unknown Feb 9 08:56:22.692735 sshd[1542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.63.174 Feb 9 08:56:22.693371 sshd[1542]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:22.693000 audit[1542]: USER_AUTH pid=1542 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zhangxu" exe="/usr/sbin/sshd" hostname=68.183.63.174 addr=68.183.63.174 terminal=ssh res=failed' Feb 9 08:56:22.699782 kernel: audit: type=1100 audit(1707468982.693:412): pid=1542 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zhangxu" exe="/usr/sbin/sshd" hostname=68.183.63.174 addr=68.183.63.174 terminal=ssh res=failed' Feb 9 08:56:24.832893 sshd[1542]: Failed password for invalid user zhangxu from 68.183.63.174 port 44578 ssh2 Feb 9 08:56:25.412556 env[1109]: time="2024-02-09T08:56:25.412491479Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:25.419457 env[1109]: time="2024-02-09T08:56:25.419381092Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:25.422845 env[1109]: time="2024-02-09T08:56:25.422789140Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:25.427128 env[1109]: time="2024-02-09T08:56:25.427065748Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:25.428286 env[1109]: time="2024-02-09T08:56:25.428207365Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Feb 9 08:56:25.452541 env[1109]: time="2024-02-09T08:56:25.452476981Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 9 08:56:25.921696 sshd[1542]: Received disconnect from 68.183.63.174 port 44578:11: Bye Bye [preauth] Feb 9 08:56:25.921696 sshd[1542]: Disconnected from invalid user zhangxu 68.183.63.174 port 44578 [preauth] Feb 9 08:56:25.922999 systemd[1]: sshd@14-164.92.86.105:22-68.183.63.174:44578.service: Deactivated successfully. Feb 9 08:56:25.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-164.92.86.105:22-68.183.63.174:44578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:25.931793 kernel: audit: type=1131 audit(1707468985.922:413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-164.92.86.105:22-68.183.63.174:44578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:26.220934 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1197970429.mount: Deactivated successfully. Feb 9 08:56:27.252194 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 9 08:56:27.264757 kernel: audit: type=1130 audit(1707468987.251:414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:27.264899 kernel: audit: type=1131 audit(1707468987.251:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:27.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:27.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:27.252515 systemd[1]: Stopped kubelet.service. Feb 9 08:56:27.254946 systemd[1]: Started kubelet.service. Feb 9 08:56:27.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:27.275650 kernel: audit: type=1130 audit(1707468987.251:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:27.349085 env[1109]: time="2024-02-09T08:56:27.349013931Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:27.358079 env[1109]: time="2024-02-09T08:56:27.358016023Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:27.362560 env[1109]: time="2024-02-09T08:56:27.362498942Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:27.365669 kubelet[1550]: E0209 08:56:27.365552 1550 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 08:56:27.368213 env[1109]: time="2024-02-09T08:56:27.368138033Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:27.368962 env[1109]: time="2024-02-09T08:56:27.368599756Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Feb 9 08:56:27.369552 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 08:56:27.369796 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 08:56:27.376687 kernel: audit: type=1131 audit(1707468987.369:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 08:56:27.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 08:56:31.719191 systemd[1]: Stopped kubelet.service. Feb 9 08:56:31.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:31.726621 kernel: audit: type=1130 audit(1707468991.719:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:31.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:31.733635 kernel: audit: type=1131 audit(1707468991.723:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:31.755837 systemd[1]: Reloading. Feb 9 08:56:31.876952 /usr/lib/systemd/system-generators/torcx-generator[1635]: time="2024-02-09T08:56:31Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 08:56:31.877529 /usr/lib/systemd/system-generators/torcx-generator[1635]: time="2024-02-09T08:56:31Z" level=info msg="torcx already run" Feb 9 08:56:32.061870 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 08:56:32.062209 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 08:56:32.105143 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 08:56:32.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.263685 kernel: audit: type=1400 audit(1707468992.234:420): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.263863 kernel: audit: type=1400 audit(1707468992.234:421): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.299501 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 08:56:32.299724 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 08:56:32.299765 kernel: audit: type=1400 audit(1707468992.234:422): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.299802 kernel: audit: backlog limit exceeded Feb 9 08:56:32.299838 kernel: audit: type=1400 audit(1707468992.234:423): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.320204 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 08:56:32.320400 kernel: audit: type=1400 audit(1707468992.234:424): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.320457 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 08:56:32.320492 kernel: audit: type=1400 audit(1707468992.234:425): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.320532 kernel: audit: backlog limit exceeded Feb 9 08:56:32.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.241000 audit: BPF prog-id=49 op=LOAD Feb 9 08:56:32.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.263000 audit: BPF prog-id=50 op=LOAD Feb 9 08:56:32.263000 audit: BPF prog-id=34 op=UNLOAD Feb 9 08:56:32.263000 audit: BPF prog-id=35 op=UNLOAD Feb 9 08:56:32.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.266000 audit: BPF prog-id=51 op=LOAD Feb 9 08:56:32.266000 audit: BPF prog-id=36 op=UNLOAD Feb 9 08:56:32.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.266000 audit: BPF prog-id=52 op=LOAD Feb 9 08:56:32.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.266000 audit: BPF prog-id=53 op=LOAD Feb 9 08:56:32.266000 audit: BPF prog-id=37 op=UNLOAD Feb 9 08:56:32.266000 audit: BPF prog-id=38 op=UNLOAD Feb 9 08:56:32.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.287000 audit: BPF prog-id=54 op=LOAD Feb 9 08:56:32.287000 audit: BPF prog-id=39 op=UNLOAD Feb 9 08:56:32.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.320000 audit: BPF prog-id=55 op=LOAD Feb 9 08:56:32.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.321000 audit: BPF prog-id=56 op=LOAD Feb 9 08:56:32.321000 audit: BPF prog-id=40 op=UNLOAD Feb 9 08:56:32.321000 audit: BPF prog-id=41 op=UNLOAD Feb 9 08:56:32.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.322000 audit: BPF prog-id=57 op=LOAD Feb 9 08:56:32.322000 audit: BPF prog-id=42 op=UNLOAD Feb 9 08:56:32.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.324000 audit: BPF prog-id=58 op=LOAD Feb 9 08:56:32.324000 audit: BPF prog-id=43 op=UNLOAD Feb 9 08:56:32.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.326000 audit: BPF prog-id=59 op=LOAD Feb 9 08:56:32.326000 audit: BPF prog-id=44 op=UNLOAD Feb 9 08:56:32.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.329000 audit: BPF prog-id=60 op=LOAD Feb 9 08:56:32.329000 audit: BPF prog-id=45 op=UNLOAD Feb 9 08:56:32.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.332000 audit: BPF prog-id=61 op=LOAD Feb 9 08:56:32.333000 audit: BPF prog-id=46 op=UNLOAD Feb 9 08:56:32.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.333000 audit: BPF prog-id=62 op=LOAD Feb 9 08:56:32.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:32.333000 audit: BPF prog-id=63 op=LOAD Feb 9 08:56:32.333000 audit: BPF prog-id=47 op=UNLOAD Feb 9 08:56:32.333000 audit: BPF prog-id=48 op=UNLOAD Feb 9 08:56:32.358633 systemd[1]: Started kubelet.service. Feb 9 08:56:32.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:32.460402 kubelet[1683]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 08:56:32.460976 kubelet[1683]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 08:56:32.461244 kubelet[1683]: I0209 08:56:32.461191 1683 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 08:56:32.463875 kubelet[1683]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 08:56:32.464135 kubelet[1683]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 08:56:33.532745 kubelet[1683]: I0209 08:56:33.532707 1683 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 08:56:33.533402 kubelet[1683]: I0209 08:56:33.533377 1683 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 08:56:33.533978 kubelet[1683]: I0209 08:56:33.533940 1683 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 08:56:33.541089 kubelet[1683]: I0209 08:56:33.541046 1683 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 08:56:33.542074 kubelet[1683]: I0209 08:56:33.542038 1683 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 08:56:33.542220 kubelet[1683]: I0209 08:56:33.542162 1683 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 08:56:33.542220 kubelet[1683]: I0209 08:56:33.542197 1683 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 08:56:33.542220 kubelet[1683]: I0209 08:56:33.542215 1683 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 08:56:33.542474 kubelet[1683]: I0209 08:56:33.542389 1683 state_mem.go:36] "Initialized new in-memory state store" Feb 9 08:56:33.542826 kubelet[1683]: I0209 08:56:33.542797 1683 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 08:56:33.544032 kubelet[1683]: E0209 08:56:33.543991 1683 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://164.92.86.105:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:33.547969 kubelet[1683]: I0209 08:56:33.547934 1683 kubelet.go:398] "Attempting to sync node with API server" Feb 9 08:56:33.548366 kubelet[1683]: I0209 08:56:33.548339 1683 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 08:56:33.548527 kubelet[1683]: I0209 08:56:33.548510 1683 kubelet.go:297] "Adding apiserver pod source" Feb 9 08:56:33.548699 kubelet[1683]: I0209 08:56:33.548662 1683 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 08:56:33.550151 kubelet[1683]: I0209 08:56:33.550118 1683 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 08:56:33.550723 kubelet[1683]: W0209 08:56:33.550703 1683 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 08:56:33.551386 kubelet[1683]: I0209 08:56:33.551361 1683 server.go:1186] "Started kubelet" Feb 9 08:56:33.551724 kubelet[1683]: W0209 08:56:33.551674 1683 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://164.92.86.105:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:33.551869 kubelet[1683]: E0209 08:56:33.551847 1683 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://164.92.86.105:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:33.552110 kubelet[1683]: W0209 08:56:33.552065 1683 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://164.92.86.105:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-b-854bdc2340&limit=500&resourceVersion=0": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:33.552245 kubelet[1683]: E0209 08:56:33.552228 1683 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://164.92.86.105:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-b-854bdc2340&limit=500&resourceVersion=0": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:33.554724 kubelet[1683]: I0209 08:56:33.554692 1683 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 08:56:33.559308 kubelet[1683]: I0209 08:56:33.559263 1683 server.go:451] "Adding debug handlers to kubelet server" Feb 9 08:56:33.559000 audit[1683]: AVC avc: denied { mac_admin } for pid=1683 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:33.559000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 08:56:33.559000 audit[1683]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dd73b0 a1=c000f06c60 a2=c000dd7380 a3=25 items=0 ppid=1 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.559000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 08:56:33.561158 kubelet[1683]: E0209 08:56:33.561124 1683 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 08:56:33.561271 kubelet[1683]: E0209 08:56:33.561166 1683 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 08:56:33.561336 kubelet[1683]: E0209 08:56:33.559173 1683 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-b-854bdc2340.17b22600c99eebf1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-b-854bdc2340", UID:"ci-3510.3.2-b-854bdc2340", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-b-854bdc2340"}, FirstTimestamp:time.Date(2024, time.February, 9, 8, 56, 33, 551330289, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 8, 56, 33, 551330289, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://164.92.86.105:6443/api/v1/namespaces/default/events": dial tcp 164.92.86.105:6443: connect: connection refused'(may retry after sleeping) Feb 9 08:56:33.561336 kubelet[1683]: I0209 08:56:33.559930 1683 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 08:56:33.560000 audit[1683]: AVC avc: denied { mac_admin } for pid=1683 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:33.560000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 08:56:33.560000 audit[1683]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f8e640 a1=c000f06cf0 a2=c000dd7560 a3=25 items=0 ppid=1 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.560000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 08:56:33.561789 kubelet[1683]: I0209 08:56:33.561408 1683 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 08:56:33.561789 kubelet[1683]: I0209 08:56:33.561528 1683 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 08:56:33.568897 kubelet[1683]: I0209 08:56:33.568858 1683 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 08:56:33.568000 audit[1694]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1694 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:33.568000 audit[1694]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff902f4820 a2=0 a3=7fff902f480c items=0 ppid=1683 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.568000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 08:56:33.569988 kubelet[1683]: I0209 08:56:33.569948 1683 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 08:56:33.572000 audit[1695]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:33.572000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4235e420 a2=0 a3=7fff4235e40c items=0 ppid=1683 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 08:56:33.576135 kubelet[1683]: E0209 08:56:33.575974 1683 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://164.92.86.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-b-854bdc2340?timeout=10s": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:33.576287 kubelet[1683]: W0209 08:56:33.576198 1683 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://164.92.86.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:33.576287 kubelet[1683]: E0209 08:56:33.576264 1683 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://164.92.86.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:33.579000 audit[1697]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:33.579000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc754e22b0 a2=0 a3=7ffc754e229c items=0 ppid=1683 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.579000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 08:56:33.583000 audit[1699]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:33.583000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe96f1fba0 a2=0 a3=7ffe96f1fb8c items=0 ppid=1683 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.583000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 08:56:33.596000 audit[1702]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:33.596000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd45f48420 a2=0 a3=7ffd45f4840c items=0 ppid=1683 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 08:56:33.598000 audit[1704]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:33.598000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd22525080 a2=0 a3=7ffd2252506c items=0 ppid=1683 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.598000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 08:56:33.607000 audit[1707]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:33.607000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffeffcd95a0 a2=0 a3=7ffeffcd958c items=0 ppid=1683 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.607000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 08:56:33.624874 kubelet[1683]: I0209 08:56:33.624834 1683 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 08:56:33.624874 kubelet[1683]: I0209 08:56:33.624857 1683 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 08:56:33.624874 kubelet[1683]: I0209 08:56:33.624877 1683 state_mem.go:36] "Initialized new in-memory state store" Feb 9 08:56:33.624000 audit[1712]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1712 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:33.624000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7fff17609000 a2=0 a3=7fff17608fec items=0 ppid=1683 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.624000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 08:56:33.627000 audit[1713]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:33.627000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc3f1aff40 a2=0 a3=7ffc3f1aff2c items=0 ppid=1683 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.627000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 08:56:33.629649 kubelet[1683]: I0209 08:56:33.629547 1683 policy_none.go:49] "None policy: Start" Feb 9 08:56:33.630840 kubelet[1683]: I0209 08:56:33.630817 1683 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 08:56:33.631083 kubelet[1683]: I0209 08:56:33.631060 1683 state_mem.go:35] "Initializing new in-memory state store" Feb 9 08:56:33.631000 audit[1714]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:33.631000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3d4639d0 a2=0 a3=7ffd3d4639bc items=0 ppid=1683 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.631000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 08:56:33.639587 systemd[1]: Created slice kubepods.slice. Feb 9 08:56:33.645000 audit[1717]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:33.645000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffec37de5c0 a2=0 a3=7ffec37de5ac items=0 ppid=1683 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.645000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 08:56:33.647805 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 08:56:33.654240 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 08:56:33.657000 audit[1719]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:33.657000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd38346540 a2=0 a3=7ffd3834652c items=0 ppid=1683 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.657000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 08:56:33.661836 kubelet[1683]: I0209 08:56:33.661797 1683 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 08:56:33.671000 audit[1683]: AVC avc: denied { mac_admin } for pid=1683 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:33.671000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 08:56:33.671000 audit[1683]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e97200 a1=c0010e0d38 a2=c000e971d0 a3=25 items=0 ppid=1 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.671000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 08:56:33.674667 kubelet[1683]: I0209 08:56:33.674638 1683 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 08:56:33.675375 kubelet[1683]: I0209 08:56:33.675345 1683 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 08:56:33.677170 kubelet[1683]: E0209 08:56:33.677137 1683 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-b-854bdc2340\" not found" Feb 9 08:56:33.678569 kubelet[1683]: I0209 08:56:33.678536 1683 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-b-854bdc2340" Feb 9 08:56:33.679592 kubelet[1683]: E0209 08:56:33.679548 1683 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://164.92.86.105:6443/api/v1/nodes\": dial tcp 164.92.86.105:6443: connect: connection refused" node="ci-3510.3.2-b-854bdc2340" Feb 9 08:56:33.680000 audit[1722]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:33.680000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffcb17673f0 a2=0 a3=7ffcb17673dc items=0 ppid=1683 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.680000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 08:56:33.685000 audit[1724]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:33.685000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffe44e33880 a2=0 a3=7ffe44e3386c items=0 ppid=1683 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.685000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 08:56:33.690000 audit[1726]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:33.690000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffc68391cf0 a2=0 a3=7ffc68391cdc items=0 ppid=1683 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.690000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 08:56:33.691480 kubelet[1683]: I0209 08:56:33.691439 1683 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 08:56:33.692000 audit[1727]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:33.692000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb6fb2330 a2=0 a3=7ffeb6fb231c items=0 ppid=1683 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.692000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 08:56:33.693000 audit[1728]: NETFILTER_CFG table=mangle:42 family=10 entries=2 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 08:56:33.693000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcd254be30 a2=0 a3=7ffcd254be1c items=0 ppid=1683 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.693000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 08:56:33.694000 audit[1729]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:33.694000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc9e12d80 a2=0 a3=7ffcc9e12d6c items=0 ppid=1683 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.694000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 08:56:33.696000 audit[1730]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 08:56:33.696000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff936052b0 a2=0 a3=7fff9360529c items=0 ppid=1683 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.696000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 08:56:33.697000 audit[1731]: NETFILTER_CFG table=nat:45 family=10 entries=2 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 08:56:33.697000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffca7075380 a2=0 a3=7ffca707536c items=0 ppid=1683 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.697000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 08:56:33.714000 audit[1733]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=1733 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 08:56:33.714000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff92d8cc10 a2=0 a3=7fff92d8cbfc items=0 ppid=1683 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.714000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 08:56:33.716000 audit[1734]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 08:56:33.716000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd5a15e130 a2=0 a3=7ffd5a15e11c items=0 ppid=1683 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.716000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 08:56:33.723000 audit[1736]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=1736 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 08:56:33.723000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7fffbb9ae780 a2=0 a3=7fffbb9ae76c items=0 ppid=1683 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.723000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 08:56:33.725000 audit[1737]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 08:56:33.725000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdd8df41b0 a2=0 a3=7ffdd8df419c items=0 ppid=1683 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.725000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 08:56:33.727000 audit[1738]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 08:56:33.727000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd69369b80 a2=0 a3=7ffd69369b6c items=0 ppid=1683 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.727000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 08:56:33.732000 audit[1740]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 08:56:33.732000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffedb234a20 a2=0 a3=7ffedb234a0c items=0 ppid=1683 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.732000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 08:56:33.737000 audit[1742]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 08:56:33.737000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe4a49a110 a2=0 a3=7ffe4a49a0fc items=0 ppid=1683 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.737000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 08:56:33.742000 audit[1744]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=1744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 08:56:33.742000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffd3249aae0 a2=0 a3=7ffd3249aacc items=0 ppid=1683 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.742000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 08:56:33.753000 audit[1746]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 08:56:33.753000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffff47d2190 a2=0 a3=7ffff47d217c items=0 ppid=1683 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 08:56:33.759000 audit[1748]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=1748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 08:56:33.759000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffc79daa060 a2=0 a3=7ffc79daa04c items=0 ppid=1683 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.759000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 08:56:33.763378 kubelet[1683]: I0209 08:56:33.762447 1683 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 08:56:33.763378 kubelet[1683]: I0209 08:56:33.762484 1683 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 08:56:33.763378 kubelet[1683]: I0209 08:56:33.762515 1683 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 08:56:33.763378 kubelet[1683]: E0209 08:56:33.762703 1683 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 08:56:33.765000 audit[1749]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 08:56:33.765000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff62efa6c0 a2=0 a3=7fff62efa6ac items=0 ppid=1683 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.765000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 08:56:33.778307 kubelet[1683]: W0209 08:56:33.778220 1683 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://164.92.86.105:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:33.778559 kubelet[1683]: E0209 08:56:33.778535 1683 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://164.92.86.105:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:33.778816 kubelet[1683]: E0209 08:56:33.778782 1683 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://164.92.86.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-b-854bdc2340?timeout=10s": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:33.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-164.92.86.105:22-45.55.53.166:37852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:33.799725 systemd[1]: Started sshd@15-164.92.86.105:22-45.55.53.166:37852.service. Feb 9 08:56:33.804000 audit[1752]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 08:56:33.804000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeedfe6190 a2=0 a3=7ffeedfe617c items=0 ppid=1683 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.804000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 08:56:33.805000 audit[1753]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 08:56:33.805000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2c851360 a2=0 a3=7ffc2c85134c items=0 ppid=1683 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:33.805000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 08:56:33.863226 kubelet[1683]: I0209 08:56:33.863163 1683 topology_manager.go:210] "Topology Admit Handler" Feb 9 08:56:33.865201 kubelet[1683]: I0209 08:56:33.865167 1683 topology_manager.go:210] "Topology Admit Handler" Feb 9 08:56:33.868421 kubelet[1683]: I0209 08:56:33.868386 1683 topology_manager.go:210] "Topology Admit Handler" Feb 9 08:56:33.870167 kubelet[1683]: I0209 08:56:33.870110 1683 status_manager.go:698] "Failed to get status for pod" podUID=096f5e952a97e029cb666da161c543c3 pod="kube-system/kube-apiserver-ci-3510.3.2-b-854bdc2340" err="Get \"https://164.92.86.105:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.2-b-854bdc2340\": dial tcp 164.92.86.105:6443: connect: connection refused" Feb 9 08:56:33.871944 kubelet[1683]: I0209 08:56:33.871811 1683 status_manager.go:698] "Failed to get status for pod" podUID=898e9360694ea660bf62b56505884290 pod="kube-system/kube-controller-manager-ci-3510.3.2-b-854bdc2340" err="Get \"https://164.92.86.105:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.2-b-854bdc2340\": dial tcp 164.92.86.105:6443: connect: connection refused" Feb 9 08:56:33.875103 kubelet[1683]: I0209 08:56:33.875032 1683 status_manager.go:698] "Failed to get status for pod" podUID=e92966ca6391121784917ab97e068347 pod="kube-system/kube-scheduler-ci-3510.3.2-b-854bdc2340" err="Get \"https://164.92.86.105:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.2-b-854bdc2340\": dial tcp 164.92.86.105:6443: connect: connection refused" Feb 9 08:56:33.879426 systemd[1]: Created slice kubepods-burstable-pod096f5e952a97e029cb666da161c543c3.slice. Feb 9 08:56:33.880517 kubelet[1683]: I0209 08:56:33.880488 1683 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/096f5e952a97e029cb666da161c543c3-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-b-854bdc2340\" (UID: \"096f5e952a97e029cb666da161c543c3\") " pod="kube-system/kube-apiserver-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:33.885273 kubelet[1683]: I0209 08:56:33.885234 1683 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-b-854bdc2340" Feb 9 08:56:33.886523 kubelet[1683]: E0209 08:56:33.886487 1683 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://164.92.86.105:6443/api/v1/nodes\": dial tcp 164.92.86.105:6443: connect: connection refused" node="ci-3510.3.2-b-854bdc2340" Feb 9 08:56:33.886805 kubelet[1683]: I0209 08:56:33.886755 1683 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/898e9360694ea660bf62b56505884290-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-b-854bdc2340\" (UID: \"898e9360694ea660bf62b56505884290\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:33.887018 kubelet[1683]: I0209 08:56:33.886994 1683 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/898e9360694ea660bf62b56505884290-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-b-854bdc2340\" (UID: \"898e9360694ea660bf62b56505884290\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:33.887251 kubelet[1683]: I0209 08:56:33.887231 1683 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/898e9360694ea660bf62b56505884290-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-b-854bdc2340\" (UID: \"898e9360694ea660bf62b56505884290\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:33.887455 kubelet[1683]: I0209 08:56:33.887438 1683 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/096f5e952a97e029cb666da161c543c3-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-b-854bdc2340\" (UID: \"096f5e952a97e029cb666da161c543c3\") " pod="kube-system/kube-apiserver-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:33.887668 kubelet[1683]: I0209 08:56:33.887646 1683 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/096f5e952a97e029cb666da161c543c3-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-b-854bdc2340\" (UID: \"096f5e952a97e029cb666da161c543c3\") " pod="kube-system/kube-apiserver-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:33.887919 kubelet[1683]: I0209 08:56:33.887901 1683 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/898e9360694ea660bf62b56505884290-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-b-854bdc2340\" (UID: \"898e9360694ea660bf62b56505884290\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:33.888171 kubelet[1683]: I0209 08:56:33.888150 1683 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/898e9360694ea660bf62b56505884290-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-b-854bdc2340\" (UID: \"898e9360694ea660bf62b56505884290\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:33.888410 kubelet[1683]: I0209 08:56:33.888387 1683 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e92966ca6391121784917ab97e068347-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-b-854bdc2340\" (UID: \"e92966ca6391121784917ab97e068347\") " pod="kube-system/kube-scheduler-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:33.899264 systemd[1]: Created slice kubepods-burstable-pod898e9360694ea660bf62b56505884290.slice. Feb 9 08:56:33.914234 systemd[1]: Created slice kubepods-burstable-pode92966ca6391121784917ab97e068347.slice. Feb 9 08:56:34.179809 kubelet[1683]: E0209 08:56:34.179597 1683 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://164.92.86.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-b-854bdc2340?timeout=10s": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:34.195637 kubelet[1683]: E0209 08:56:34.195543 1683 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:34.199406 env[1109]: time="2024-02-09T08:56:34.198289067Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-b-854bdc2340,Uid:096f5e952a97e029cb666da161c543c3,Namespace:kube-system,Attempt:0,}" Feb 9 08:56:34.205124 kubelet[1683]: E0209 08:56:34.205072 1683 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:34.205742 env[1109]: time="2024-02-09T08:56:34.205694005Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-b-854bdc2340,Uid:898e9360694ea660bf62b56505884290,Namespace:kube-system,Attempt:0,}" Feb 9 08:56:34.220635 kubelet[1683]: E0209 08:56:34.220532 1683 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:34.221476 env[1109]: time="2024-02-09T08:56:34.221418001Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-b-854bdc2340,Uid:e92966ca6391121784917ab97e068347,Namespace:kube-system,Attempt:0,}" Feb 9 08:56:34.264283 sshd[1751]: Invalid user seongsim from 45.55.53.166 port 37852 Feb 9 08:56:34.281874 sshd[1751]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:34.283380 sshd[1751]: pam_unix(sshd:auth): check pass; user unknown Feb 9 08:56:34.283445 sshd[1751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.53.166 Feb 9 08:56:34.284510 sshd[1751]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:34.284000 audit[1751]: USER_AUTH pid=1751 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="seongsim" exe="/usr/sbin/sshd" hostname=45.55.53.166 addr=45.55.53.166 terminal=ssh res=failed' Feb 9 08:56:34.288836 kubelet[1683]: I0209 08:56:34.288794 1683 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-b-854bdc2340" Feb 9 08:56:34.289592 kubelet[1683]: E0209 08:56:34.289552 1683 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://164.92.86.105:6443/api/v1/nodes\": dial tcp 164.92.86.105:6443: connect: connection refused" node="ci-3510.3.2-b-854bdc2340" Feb 9 08:56:34.607191 kubelet[1683]: W0209 08:56:34.607017 1683 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://164.92.86.105:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-b-854bdc2340&limit=500&resourceVersion=0": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:34.607191 kubelet[1683]: E0209 08:56:34.607118 1683 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://164.92.86.105:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-b-854bdc2340&limit=500&resourceVersion=0": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:34.758774 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3614662418.mount: Deactivated successfully. Feb 9 08:56:34.783844 env[1109]: time="2024-02-09T08:56:34.783773757Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:34.793739 env[1109]: time="2024-02-09T08:56:34.793572994Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:34.797743 env[1109]: time="2024-02-09T08:56:34.797677205Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:34.801909 env[1109]: time="2024-02-09T08:56:34.801773811Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:34.816735 env[1109]: time="2024-02-09T08:56:34.806582599Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:34.816735 env[1109]: time="2024-02-09T08:56:34.814489824Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:34.818574 env[1109]: time="2024-02-09T08:56:34.818525024Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:34.822509 env[1109]: time="2024-02-09T08:56:34.822432056Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:34.825792 env[1109]: time="2024-02-09T08:56:34.825725330Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:34.829376 env[1109]: time="2024-02-09T08:56:34.829306253Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:34.833081 env[1109]: time="2024-02-09T08:56:34.833022535Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:34.838855 env[1109]: time="2024-02-09T08:56:34.838772034Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 08:56:34.903180 env[1109]: time="2024-02-09T08:56:34.902758457Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 08:56:34.903180 env[1109]: time="2024-02-09T08:56:34.902823242Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 08:56:34.903180 env[1109]: time="2024-02-09T08:56:34.902843111Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 08:56:34.905038 env[1109]: time="2024-02-09T08:56:34.904899348Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/89745406bed0dce6034fdcaf7a77361305cbb84b6b945cb87af06543addf015b pid=1764 runtime=io.containerd.runc.v2 Feb 9 08:56:34.932872 env[1109]: time="2024-02-09T08:56:34.932724765Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 08:56:34.933286 env[1109]: time="2024-02-09T08:56:34.933235324Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 08:56:34.933466 env[1109]: time="2024-02-09T08:56:34.933421510Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 08:56:34.942126 env[1109]: time="2024-02-09T08:56:34.934640117Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/448d7d80a1922b1c6fed99dbdfb882a7ad8f84c621751ccd1f112c0498c5af1c pid=1782 runtime=io.containerd.runc.v2 Feb 9 08:56:34.947252 kubelet[1683]: W0209 08:56:34.947193 1683 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://164.92.86.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:34.947252 kubelet[1683]: E0209 08:56:34.947253 1683 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://164.92.86.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:34.953315 env[1109]: time="2024-02-09T08:56:34.953026392Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 08:56:34.953315 env[1109]: time="2024-02-09T08:56:34.953086422Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 08:56:34.953315 env[1109]: time="2024-02-09T08:56:34.953105209Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 08:56:34.953936 env[1109]: time="2024-02-09T08:56:34.953820447Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f4a612902dafb54ac2603b531319244e390c4bdbd4bc3bc616e06d586d52ad63 pid=1804 runtime=io.containerd.runc.v2 Feb 9 08:56:34.962270 systemd[1]: Started cri-containerd-89745406bed0dce6034fdcaf7a77361305cbb84b6b945cb87af06543addf015b.scope. Feb 9 08:56:34.980858 kubelet[1683]: E0209 08:56:34.980799 1683 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://164.92.86.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-b-854bdc2340?timeout=10s": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:34.987224 systemd[1]: Started cri-containerd-448d7d80a1922b1c6fed99dbdfb882a7ad8f84c621751ccd1f112c0498c5af1c.scope. Feb 9 08:56:35.008891 systemd[1]: Started cri-containerd-f4a612902dafb54ac2603b531319244e390c4bdbd4bc3bc616e06d586d52ad63.scope. Feb 9 08:56:35.012326 kubelet[1683]: W0209 08:56:35.012145 1683 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://164.92.86.105:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:35.012326 kubelet[1683]: E0209 08:56:35.012278 1683 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://164.92.86.105:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:35.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.017000 audit: BPF prog-id=64 op=LOAD Feb 9 08:56:35.019000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.019000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1764 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839373435343036626564306463653630333466646361663761373733 Feb 9 08:56:35.019000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.019000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1764 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839373435343036626564306463653630333466646361663761373733 Feb 9 08:56:35.019000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.019000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.019000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.019000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.019000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.019000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.019000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.019000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.019000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.019000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.019000 audit: BPF prog-id=65 op=LOAD Feb 9 08:56:35.019000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002bbe00 items=0 ppid=1764 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839373435343036626564306463653630333466646361663761373733 Feb 9 08:56:35.020000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.020000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.020000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.020000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.020000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.020000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.020000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.020000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.020000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.020000 audit: BPF prog-id=66 op=LOAD Feb 9 08:56:35.020000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002bbe48 items=0 ppid=1764 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839373435343036626564306463653630333466646361663761373733 Feb 9 08:56:35.020000 audit: BPF prog-id=66 op=UNLOAD Feb 9 08:56:35.020000 audit: BPF prog-id=65 op=UNLOAD Feb 9 08:56:35.020000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.020000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.020000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.020000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.020000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.020000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.020000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.020000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.020000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.020000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.020000 audit: BPF prog-id=67 op=LOAD Feb 9 08:56:35.020000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000336258 items=0 ppid=1764 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839373435343036626564306463653630333466646361663761373733 Feb 9 08:56:35.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.057000 audit: BPF prog-id=68 op=LOAD Feb 9 08:56:35.059000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.059000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1804 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634613631323930326461666235346163323630336235333133313932 Feb 9 08:56:35.059000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.059000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1804 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634613631323930326461666235346163323630336235333133313932 Feb 9 08:56:35.059000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.059000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.059000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.059000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.059000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.059000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.059000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.059000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.059000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.059000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.059000 audit: BPF prog-id=69 op=LOAD Feb 9 08:56:35.059000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c0670 items=0 ppid=1804 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634613631323930326461666235346163323630336235333133313932 Feb 9 08:56:35.059000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.059000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.059000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.059000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.059000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.059000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.059000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.059000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.059000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.059000 audit: BPF prog-id=70 op=LOAD Feb 9 08:56:35.059000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003c06b8 items=0 ppid=1804 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634613631323930326461666235346163323630336235333133313932 Feb 9 08:56:35.060000 audit: BPF prog-id=70 op=UNLOAD Feb 9 08:56:35.060000 audit: BPF prog-id=69 op=UNLOAD Feb 9 08:56:35.060000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.060000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.060000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.060000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.060000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.060000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.060000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.060000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.060000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.060000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.060000 audit: BPF prog-id=71 op=LOAD Feb 9 08:56:35.060000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c0ac8 items=0 ppid=1804 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634613631323930326461666235346163323630336235333133313932 Feb 9 08:56:35.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.070000 audit: BPF prog-id=72 op=LOAD Feb 9 08:56:35.076470 kubelet[1683]: W0209 08:56:35.074431 1683 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://164.92.86.105:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:35.076470 kubelet[1683]: E0209 08:56:35.074482 1683 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://164.92.86.105:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:35.076000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.076000 audit[1805]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=1782 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434386437643830613139323262316336666564393964626466623838 Feb 9 08:56:35.077000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.077000 audit[1805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=1782 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434386437643830613139323262316336666564393964626466623838 Feb 9 08:56:35.078000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.078000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.078000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.078000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.078000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.078000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.078000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.078000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.078000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.078000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.078000 audit: BPF prog-id=73 op=LOAD Feb 9 08:56:35.078000 audit[1805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000238270 items=0 ppid=1782 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434386437643830613139323262316336666564393964626466623838 Feb 9 08:56:35.081000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.081000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.081000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.081000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.081000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.081000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.081000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.081000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.081000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.081000 audit: BPF prog-id=74 op=LOAD Feb 9 08:56:35.081000 audit[1805]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0002382b8 items=0 ppid=1782 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434386437643830613139323262316336666564393964626466623838 Feb 9 08:56:35.084000 audit: BPF prog-id=74 op=UNLOAD Feb 9 08:56:35.084000 audit: BPF prog-id=73 op=UNLOAD Feb 9 08:56:35.084000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.084000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.084000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.084000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.084000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.084000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.084000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.084000 audit[1805]: AVC avc: denied { perfmon } for pid=1805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.084000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.084000 audit[1805]: AVC avc: denied { bpf } for pid=1805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.084000 audit: BPF prog-id=75 op=LOAD Feb 9 08:56:35.084000 audit[1805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0002386c8 items=0 ppid=1782 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434386437643830613139323262316336666564393964626466623838 Feb 9 08:56:35.094213 kubelet[1683]: I0209 08:56:35.094078 1683 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-b-854bdc2340" Feb 9 08:56:35.094590 kubelet[1683]: E0209 08:56:35.094554 1683 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://164.92.86.105:6443/api/v1/nodes\": dial tcp 164.92.86.105:6443: connect: connection refused" node="ci-3510.3.2-b-854bdc2340" Feb 9 08:56:35.134886 env[1109]: time="2024-02-09T08:56:35.134828440Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-b-854bdc2340,Uid:096f5e952a97e029cb666da161c543c3,Namespace:kube-system,Attempt:0,} returns sandbox id \"89745406bed0dce6034fdcaf7a77361305cbb84b6b945cb87af06543addf015b\"" Feb 9 08:56:35.136944 kubelet[1683]: E0209 08:56:35.136713 1683 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:35.145435 env[1109]: time="2024-02-09T08:56:35.145359433Z" level=info msg="CreateContainer within sandbox \"89745406bed0dce6034fdcaf7a77361305cbb84b6b945cb87af06543addf015b\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 08:56:35.161143 env[1109]: time="2024-02-09T08:56:35.160823124Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-b-854bdc2340,Uid:898e9360694ea660bf62b56505884290,Namespace:kube-system,Attempt:0,} returns sandbox id \"448d7d80a1922b1c6fed99dbdfb882a7ad8f84c621751ccd1f112c0498c5af1c\"" Feb 9 08:56:35.162076 kubelet[1683]: E0209 08:56:35.162034 1683 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:35.170746 env[1109]: time="2024-02-09T08:56:35.170120032Z" level=info msg="CreateContainer within sandbox \"448d7d80a1922b1c6fed99dbdfb882a7ad8f84c621751ccd1f112c0498c5af1c\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 08:56:35.193174 env[1109]: time="2024-02-09T08:56:35.192949575Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-b-854bdc2340,Uid:e92966ca6391121784917ab97e068347,Namespace:kube-system,Attempt:0,} returns sandbox id \"f4a612902dafb54ac2603b531319244e390c4bdbd4bc3bc616e06d586d52ad63\"" Feb 9 08:56:35.195983 kubelet[1683]: E0209 08:56:35.195918 1683 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:35.200320 env[1109]: time="2024-02-09T08:56:35.200249177Z" level=info msg="CreateContainer within sandbox \"89745406bed0dce6034fdcaf7a77361305cbb84b6b945cb87af06543addf015b\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"e4a823ac7eab8c3688ce75a52bd002d1c3bbe6e700371050a06f8b8f3eeec87c\"" Feb 9 08:56:35.201715 env[1109]: time="2024-02-09T08:56:35.200515146Z" level=info msg="CreateContainer within sandbox \"f4a612902dafb54ac2603b531319244e390c4bdbd4bc3bc616e06d586d52ad63\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 08:56:35.202438 env[1109]: time="2024-02-09T08:56:35.202393957Z" level=info msg="StartContainer for \"e4a823ac7eab8c3688ce75a52bd002d1c3bbe6e700371050a06f8b8f3eeec87c\"" Feb 9 08:56:35.218217 env[1109]: time="2024-02-09T08:56:35.218139600Z" level=info msg="CreateContainer within sandbox \"448d7d80a1922b1c6fed99dbdfb882a7ad8f84c621751ccd1f112c0498c5af1c\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"452c2429bd964d48f5d9133f1b03f61cb2c18ef91bb204690d4e3e10bf041a51\"" Feb 9 08:56:35.219038 env[1109]: time="2024-02-09T08:56:35.218997288Z" level=info msg="StartContainer for \"452c2429bd964d48f5d9133f1b03f61cb2c18ef91bb204690d4e3e10bf041a51\"" Feb 9 08:56:35.231151 env[1109]: time="2024-02-09T08:56:35.231091869Z" level=info msg="CreateContainer within sandbox \"f4a612902dafb54ac2603b531319244e390c4bdbd4bc3bc616e06d586d52ad63\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"e8fd4d019cf6f5d8a41a164f5589f97e097ac90079c27919f28f712b63d73597\"" Feb 9 08:56:35.233171 env[1109]: time="2024-02-09T08:56:35.233115832Z" level=info msg="StartContainer for \"e8fd4d019cf6f5d8a41a164f5589f97e097ac90079c27919f28f712b63d73597\"" Feb 9 08:56:35.240516 systemd[1]: Started cri-containerd-e4a823ac7eab8c3688ce75a52bd002d1c3bbe6e700371050a06f8b8f3eeec87c.scope. Feb 9 08:56:35.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.274000 audit: BPF prog-id=76 op=LOAD Feb 9 08:56:35.276000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.276000 audit[1897]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1764 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534613832336163376561623863333638386365373561353262643030 Feb 9 08:56:35.276000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.276000 audit[1897]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1764 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534613832336163376561623863333638386365373561353262643030 Feb 9 08:56:35.277000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.277000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.277000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.277000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.277000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.277000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.277000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.277000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.277000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.277000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.277000 audit: BPF prog-id=77 op=LOAD Feb 9 08:56:35.277000 audit[1897]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003d0a60 items=0 ppid=1764 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534613832336163376561623863333638386365373561353262643030 Feb 9 08:56:35.278000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.278000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.278000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.278000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.278000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.278000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.278000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.278000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.278000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.278000 audit: BPF prog-id=78 op=LOAD Feb 9 08:56:35.278000 audit[1897]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003d0aa8 items=0 ppid=1764 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534613832336163376561623863333638386365373561353262643030 Feb 9 08:56:35.279000 audit: BPF prog-id=78 op=UNLOAD Feb 9 08:56:35.279000 audit: BPF prog-id=77 op=UNLOAD Feb 9 08:56:35.279000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.279000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.279000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.279000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.279000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.279000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.279000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.279000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.279000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.279000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.279000 audit: BPF prog-id=79 op=LOAD Feb 9 08:56:35.279000 audit[1897]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003d0eb8 items=0 ppid=1764 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534613832336163376561623863333638386365373561353262643030 Feb 9 08:56:35.285724 systemd[1]: Started cri-containerd-452c2429bd964d48f5d9133f1b03f61cb2c18ef91bb204690d4e3e10bf041a51.scope. Feb 9 08:56:35.311571 systemd[1]: Started cri-containerd-e8fd4d019cf6f5d8a41a164f5589f97e097ac90079c27919f28f712b63d73597.scope. Feb 9 08:56:35.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.338000 audit: BPF prog-id=80 op=LOAD Feb 9 08:56:35.339000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.339000 audit[1914]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1782 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435326332343239626439363464343866356439313333663162303366 Feb 9 08:56:35.339000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.339000 audit[1914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1782 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435326332343239626439363464343866356439313333663162303366 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit: BPF prog-id=81 op=LOAD Feb 9 08:56:35.340000 audit[1914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001fd190 items=0 ppid=1782 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435326332343239626439363464343866356439313333663162303366 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit: BPF prog-id=82 op=LOAD Feb 9 08:56:35.340000 audit[1914]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001fd1d8 items=0 ppid=1782 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435326332343239626439363464343866356439313333663162303366 Feb 9 08:56:35.340000 audit: BPF prog-id=82 op=UNLOAD Feb 9 08:56:35.340000 audit: BPF prog-id=81 op=UNLOAD Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.340000 audit: BPF prog-id=83 op=LOAD Feb 9 08:56:35.340000 audit[1914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001fd5e8 items=0 ppid=1782 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435326332343239626439363464343866356439313333663162303366 Feb 9 08:56:35.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.391000 audit: BPF prog-id=84 op=LOAD Feb 9 08:56:35.393000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.393000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1804 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538666434643031396366366635643861343161313634663535383966 Feb 9 08:56:35.393000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.393000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1804 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538666434643031396366366635643861343161313634663535383966 Feb 9 08:56:35.393000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.393000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.393000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.393000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.393000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.393000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.393000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.393000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.393000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.393000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.393000 audit: BPF prog-id=85 op=LOAD Feb 9 08:56:35.393000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000248e0 items=0 ppid=1804 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538666434643031396366366635643861343161313634663535383966 Feb 9 08:56:35.394000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.394000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.394000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.394000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.394000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.394000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.394000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.394000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.394000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.394000 audit: BPF prog-id=86 op=LOAD Feb 9 08:56:35.394000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024928 items=0 ppid=1804 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538666434643031396366366635643861343161313634663535383966 Feb 9 08:56:35.394000 audit: BPF prog-id=86 op=UNLOAD Feb 9 08:56:35.394000 audit: BPF prog-id=85 op=UNLOAD Feb 9 08:56:35.394000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.394000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.394000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.394000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.394000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.394000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.394000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.394000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.394000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.394000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:35.394000 audit: BPF prog-id=87 op=LOAD Feb 9 08:56:35.394000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024d38 items=0 ppid=1804 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:35.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538666434643031396366366635643861343161313634663535383966 Feb 9 08:56:35.408739 env[1109]: time="2024-02-09T08:56:35.408656779Z" level=info msg="StartContainer for \"e4a823ac7eab8c3688ce75a52bd002d1c3bbe6e700371050a06f8b8f3eeec87c\" returns successfully" Feb 9 08:56:35.438245 env[1109]: time="2024-02-09T08:56:35.438094746Z" level=info msg="StartContainer for \"452c2429bd964d48f5d9133f1b03f61cb2c18ef91bb204690d4e3e10bf041a51\" returns successfully" Feb 9 08:56:35.482380 env[1109]: time="2024-02-09T08:56:35.482304967Z" level=info msg="StartContainer for \"e8fd4d019cf6f5d8a41a164f5589f97e097ac90079c27919f28f712b63d73597\" returns successfully" Feb 9 08:56:35.594292 kubelet[1683]: E0209 08:56:35.594245 1683 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://164.92.86.105:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:35.824081 kubelet[1683]: E0209 08:56:35.824034 1683 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:35.831437 kubelet[1683]: E0209 08:56:35.830959 1683 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:35.832260 kubelet[1683]: I0209 08:56:35.832219 1683 status_manager.go:698] "Failed to get status for pod" podUID=e92966ca6391121784917ab97e068347 pod="kube-system/kube-scheduler-ci-3510.3.2-b-854bdc2340" err="Get \"https://164.92.86.105:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.2-b-854bdc2340\": dial tcp 164.92.86.105:6443: connect: connection refused" Feb 9 08:56:35.832856 kubelet[1683]: I0209 08:56:35.832829 1683 status_manager.go:698] "Failed to get status for pod" podUID=898e9360694ea660bf62b56505884290 pod="kube-system/kube-controller-manager-ci-3510.3.2-b-854bdc2340" err="Get \"https://164.92.86.105:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.2-b-854bdc2340\": dial tcp 164.92.86.105:6443: connect: connection refused" Feb 9 08:56:35.839776 kubelet[1683]: E0209 08:56:35.839734 1683 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:35.843549 kubelet[1683]: I0209 08:56:35.843388 1683 status_manager.go:698] "Failed to get status for pod" podUID=096f5e952a97e029cb666da161c543c3 pod="kube-system/kube-apiserver-ci-3510.3.2-b-854bdc2340" err="Get \"https://164.92.86.105:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.2-b-854bdc2340\": dial tcp 164.92.86.105:6443: connect: connection refused" Feb 9 08:56:36.398996 sshd[1751]: Failed password for invalid user seongsim from 45.55.53.166 port 37852 ssh2 Feb 9 08:56:36.582041 kubelet[1683]: E0209 08:56:36.581979 1683 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: Get "https://164.92.86.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-b-854bdc2340?timeout=10s": dial tcp 164.92.86.105:6443: connect: connection refused Feb 9 08:56:36.696706 kubelet[1683]: I0209 08:56:36.696555 1683 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-b-854bdc2340" Feb 9 08:56:36.842147 kubelet[1683]: E0209 08:56:36.842101 1683 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:36.842989 kubelet[1683]: E0209 08:56:36.842117 1683 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:36.843240 kubelet[1683]: E0209 08:56:36.843063 1683 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:37.531847 kernel: kauditd_printk_skb: 620 callbacks suppressed Feb 9 08:56:37.532119 kernel: audit: type=1400 audit(1707468997.522:737): avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 08:56:37.522000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 08:56:37.522000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000132a80 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c919 key=(null) Feb 9 08:56:37.545743 kernel: audit: type=1300 audit(1707468997.522:737): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000132a80 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c919 key=(null) Feb 9 08:56:37.522000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 08:56:37.555666 kernel: audit: type=1327 audit(1707468997.522:737): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 08:56:37.532000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 08:56:37.564725 kernel: audit: type=1400 audit(1707468997.532:738): avc: denied { watch } for pid=1944 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 08:56:37.532000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00124a040 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c919 key=(null) Feb 9 08:56:37.575744 kernel: audit: type=1300 audit(1707468997.532:738): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00124a040 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c919 key=(null) Feb 9 08:56:37.532000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 08:56:37.584711 kernel: audit: type=1327 audit(1707468997.532:738): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 08:56:37.844183 kubelet[1683]: E0209 08:56:37.843933 1683 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:38.266448 sshd[1751]: Received disconnect from 45.55.53.166 port 37852:11: Bye Bye [preauth] Feb 9 08:56:38.268177 sshd[1751]: Disconnected from invalid user seongsim 45.55.53.166 port 37852 [preauth] Feb 9 08:56:38.278087 systemd[1]: sshd@15-164.92.86.105:22-45.55.53.166:37852.service: Deactivated successfully. Feb 9 08:56:38.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-164.92.86.105:22-45.55.53.166:37852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:38.286826 kernel: audit: type=1131 audit(1707468998.277:739): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-164.92.86.105:22-45.55.53.166:37852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:38.846006 kubelet[1683]: E0209 08:56:38.845951 1683 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:39.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-164.92.86.105:22-61.76.169.138:22734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:39.211929 systemd[1]: Started sshd@16-164.92.86.105:22-61.76.169.138:22734.service. Feb 9 08:56:39.220643 kernel: audit: type=1130 audit(1707468999.211:740): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-164.92.86.105:22-61.76.169.138:22734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:39.491342 update_engine[1095]: I0209 08:56:39.490700 1095 update_attempter.cc:509] Updating boot flags... Feb 9 08:56:39.921893 sshd[2002]: Invalid user diepnx from 61.76.169.138 port 22734 Feb 9 08:56:39.945322 sshd[2002]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:39.947310 sshd[2002]: pam_unix(sshd:auth): check pass; user unknown Feb 9 08:56:39.947569 sshd[2002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.76.169.138 Feb 9 08:56:39.948783 sshd[2002]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:39.948000 audit[2002]: USER_AUTH pid=2002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="diepnx" exe="/usr/sbin/sshd" hostname=61.76.169.138 addr=61.76.169.138 terminal=ssh res=failed' Feb 9 08:56:39.956677 kernel: audit: type=1100 audit(1707468999.948:741): pid=2002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="diepnx" exe="/usr/sbin/sshd" hostname=61.76.169.138 addr=61.76.169.138 terminal=ssh res=failed' Feb 9 08:56:40.318000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c472 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 08:56:40.320000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c472 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 08:56:40.327812 kernel: audit: type=1400 audit(1707469000.318:742): avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c472 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 08:56:40.320000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c00b4bc150 a2=fc6 a3=0 items=0 ppid=1764 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c472 key=(null) Feb 9 08:56:40.320000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E38362E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 08:56:40.318000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00a9de000 a2=fc6 a3=0 items=0 ppid=1764 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c472 key=(null) Feb 9 08:56:40.318000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E38362E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 08:56:40.322000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c472 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 08:56:40.322000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c002914040 a2=fc6 a3=0 items=0 ppid=1764 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c472 key=(null) Feb 9 08:56:40.322000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E38362E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 08:56:40.330000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525079 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c472 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 08:56:40.330000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c00a9deae0 a2=fc6 a3=0 items=0 ppid=1764 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c472 key=(null) Feb 9 08:56:40.330000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E38362E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 08:56:40.333000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525077 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c472 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 08:56:40.333000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=53 a1=c00a9df440 a2=fc6 a3=0 items=0 ppid=1764 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c472 key=(null) Feb 9 08:56:40.333000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E38362E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 08:56:40.353000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c472 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 08:56:40.353000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c002915e80 a2=fc6 a3=0 items=0 ppid=1764 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c472 key=(null) Feb 9 08:56:40.353000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E38362E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 08:56:40.553206 kubelet[1683]: I0209 08:56:40.552840 1683 apiserver.go:52] "Watching apiserver" Feb 9 08:56:40.571231 kubelet[1683]: I0209 08:56:40.570779 1683 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 08:56:40.589518 kubelet[1683]: E0209 08:56:40.589443 1683 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-b-854bdc2340\" not found" node="ci-3510.3.2-b-854bdc2340" Feb 9 08:56:40.654262 kubelet[1683]: I0209 08:56:40.654175 1683 reconciler.go:41] "Reconciler: start to sync state" Feb 9 08:56:40.678528 kubelet[1683]: I0209 08:56:40.678489 1683 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-b-854bdc2340" Feb 9 08:56:41.750918 sshd[2002]: Failed password for invalid user diepnx from 61.76.169.138 port 22734 ssh2 Feb 9 08:56:41.898473 kubelet[1683]: E0209 08:56:41.896359 1683 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-b-854bdc2340.17b22600c99eebf1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-b-854bdc2340", UID:"ci-3510.3.2-b-854bdc2340", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-b-854bdc2340"}, FirstTimestamp:time.Date(2024, time.February, 9, 8, 56, 33, 551330289, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 8, 56, 33, 551330289, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 08:56:41.956834 kubelet[1683]: E0209 08:56:41.956198 1683 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-b-854bdc2340.17b22600ca34cb6a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-b-854bdc2340", UID:"ci-3510.3.2-b-854bdc2340", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-b-854bdc2340"}, FirstTimestamp:time.Date(2024, time.February, 9, 8, 56, 33, 561152362, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 8, 56, 33, 561152362, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 08:56:42.012275 kubelet[1683]: E0209 08:56:42.012115 1683 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-b-854bdc2340.17b22600cdef8d23", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-b-854bdc2340", UID:"ci-3510.3.2-b-854bdc2340", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.2-b-854bdc2340 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-b-854bdc2340"}, FirstTimestamp:time.Date(2024, time.February, 9, 8, 56, 33, 623723299, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 8, 56, 33, 623723299, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 08:56:42.073883 kubelet[1683]: E0209 08:56:42.073740 1683 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-b-854bdc2340.17b22600cdefa4fe", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-b-854bdc2340", UID:"ci-3510.3.2-b-854bdc2340", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510.3.2-b-854bdc2340 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-b-854bdc2340"}, FirstTimestamp:time.Date(2024, time.February, 9, 8, 56, 33, 623729406, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 8, 56, 33, 623729406, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 08:56:42.131231 kubelet[1683]: E0209 08:56:42.131105 1683 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-b-854bdc2340.17b22600cdefb8d7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-b-854bdc2340", UID:"ci-3510.3.2-b-854bdc2340", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510.3.2-b-854bdc2340 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-b-854bdc2340"}, FirstTimestamp:time.Date(2024, time.February, 9, 8, 56, 33, 623734487, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 8, 56, 33, 623734487, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 08:56:42.189204 kubelet[1683]: E0209 08:56:42.189076 1683 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-b-854bdc2340.17b22600d1081066", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-b-854bdc2340", UID:"ci-3510.3.2-b-854bdc2340", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-b-854bdc2340"}, FirstTimestamp:time.Date(2024, time.February, 9, 8, 56, 33, 675661414, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 8, 56, 33, 675661414, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 08:56:42.250816 kubelet[1683]: E0209 08:56:42.250693 1683 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-b-854bdc2340.17b22600cdef8d23", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-b-854bdc2340", UID:"ci-3510.3.2-b-854bdc2340", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.2-b-854bdc2340 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-b-854bdc2340"}, FirstTimestamp:time.Date(2024, time.February, 9, 8, 56, 33, 623723299, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 8, 56, 33, 678461209, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 08:56:42.348871 kubelet[1683]: E0209 08:56:42.348707 1683 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:42.854756 kubelet[1683]: E0209 08:56:42.854714 1683 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:43.337869 sshd[2002]: Received disconnect from 61.76.169.138 port 22734:11: Bye Bye [preauth] Feb 9 08:56:43.337869 sshd[2002]: Disconnected from invalid user diepnx 61.76.169.138 port 22734 [preauth] Feb 9 08:56:43.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-164.92.86.105:22-61.76.169.138:22734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:43.340175 systemd[1]: sshd@16-164.92.86.105:22-61.76.169.138:22734.service: Deactivated successfully. Feb 9 08:56:43.343643 kernel: kauditd_printk_skb: 17 callbacks suppressed Feb 9 08:56:43.343769 kernel: audit: type=1131 audit(1707469003.338:748): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-164.92.86.105:22-61.76.169.138:22734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:43.579463 systemd[1]: Reloading. Feb 9 08:56:43.729736 /usr/lib/systemd/system-generators/torcx-generator[2041]: time="2024-02-09T08:56:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 08:56:43.731144 /usr/lib/systemd/system-generators/torcx-generator[2041]: time="2024-02-09T08:56:43Z" level=info msg="torcx already run" Feb 9 08:56:43.811053 kubelet[1683]: I0209 08:56:43.810988 1683 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-b-854bdc2340" podStartSLOduration=1.8108743760000001 pod.CreationTimestamp="2024-02-09 08:56:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 08:56:43.806477731 +0000 UTC m=+11.442262546" watchObservedRunningTime="2024-02-09 08:56:43.810874376 +0000 UTC m=+11.446659171" Feb 9 08:56:43.939950 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 08:56:43.940260 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 08:56:43.982633 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 08:56:44.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.156921 kernel: audit: type=1400 audit(1707469004.148:749): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.180851 kernel: audit: type=1400 audit(1707469004.155:750): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.192643 kernel: audit: type=1400 audit(1707469004.155:751): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.192822 kernel: audit: type=1400 audit(1707469004.155:752): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.192851 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 08:56:44.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.200028 kernel: audit: type=1400 audit(1707469004.155:753): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.200225 kernel: audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 08:56:44.200280 kernel: audit: backlog limit exceeded Feb 9 08:56:44.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.209238 kernel: audit: type=1400 audit(1707469004.155:754): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.155000 audit: BPF prog-id=88 op=LOAD Feb 9 08:56:44.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.155000 audit: BPF prog-id=89 op=LOAD Feb 9 08:56:44.155000 audit: BPF prog-id=49 op=UNLOAD Feb 9 08:56:44.155000 audit: BPF prog-id=50 op=UNLOAD Feb 9 08:56:44.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.179000 audit: BPF prog-id=90 op=LOAD Feb 9 08:56:44.179000 audit: BPF prog-id=51 op=UNLOAD Feb 9 08:56:44.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.179000 audit: BPF prog-id=91 op=LOAD Feb 9 08:56:44.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.179000 audit: BPF prog-id=92 op=LOAD Feb 9 08:56:44.179000 audit: BPF prog-id=52 op=UNLOAD Feb 9 08:56:44.179000 audit: BPF prog-id=53 op=UNLOAD Feb 9 08:56:44.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.185000 audit: BPF prog-id=93 op=LOAD Feb 9 08:56:44.185000 audit: BPF prog-id=68 op=UNLOAD Feb 9 08:56:44.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.207000 audit: BPF prog-id=54 op=UNLOAD Feb 9 08:56:44.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.210000 audit: BPF prog-id=97 op=LOAD Feb 9 08:56:44.210000 audit: BPF prog-id=57 op=UNLOAD Feb 9 08:56:44.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.212000 audit: BPF prog-id=98 op=LOAD Feb 9 08:56:44.212000 audit: BPF prog-id=58 op=UNLOAD Feb 9 08:56:44.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.213000 audit: BPF prog-id=99 op=LOAD Feb 9 08:56:44.213000 audit: BPF prog-id=84 op=UNLOAD Feb 9 08:56:44.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.216000 audit: BPF prog-id=100 op=LOAD Feb 9 08:56:44.216000 audit: BPF prog-id=59 op=UNLOAD Feb 9 08:56:44.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.220000 audit: BPF prog-id=101 op=LOAD Feb 9 08:56:44.220000 audit: BPF prog-id=60 op=UNLOAD Feb 9 08:56:44.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.221000 audit: BPF prog-id=102 op=LOAD Feb 9 08:56:44.221000 audit: BPF prog-id=76 op=UNLOAD Feb 9 08:56:44.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.224000 audit: BPF prog-id=103 op=LOAD Feb 9 08:56:44.224000 audit: BPF prog-id=64 op=UNLOAD Feb 9 08:56:44.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.226000 audit: BPF prog-id=104 op=LOAD Feb 9 08:56:44.226000 audit: BPF prog-id=72 op=UNLOAD Feb 9 08:56:44.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.227000 audit: BPF prog-id=105 op=LOAD Feb 9 08:56:44.227000 audit: BPF prog-id=61 op=UNLOAD Feb 9 08:56:44.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.228000 audit: BPF prog-id=106 op=LOAD Feb 9 08:56:44.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.228000 audit: BPF prog-id=107 op=LOAD Feb 9 08:56:44.228000 audit: BPF prog-id=62 op=UNLOAD Feb 9 08:56:44.228000 audit: BPF prog-id=63 op=UNLOAD Feb 9 08:56:44.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.229000 audit: BPF prog-id=108 op=LOAD Feb 9 08:56:44.229000 audit: BPF prog-id=80 op=UNLOAD Feb 9 08:56:44.254134 kubelet[1683]: E0209 08:56:44.236109 1683 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:44.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-164.92.86.105:22-15.204.211.99:51696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:44.281259 systemd[1]: Started sshd@17-164.92.86.105:22-15.204.211.99:51696.service. Feb 9 08:56:44.284699 kubelet[1683]: I0209 08:56:44.284502 1683 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 08:56:44.285230 systemd[1]: Stopping kubelet.service... Feb 9 08:56:44.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:44.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:44.326111 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 08:56:44.327695 systemd[1]: Stopped kubelet.service. Feb 9 08:56:44.327805 systemd[1]: kubelet.service: Consumed 1.841s CPU time. Feb 9 08:56:44.331577 systemd[1]: Started kubelet.service. Feb 9 08:56:44.551796 kubelet[2091]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 08:56:44.552388 kubelet[2091]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 08:56:44.552650 kubelet[2091]: I0209 08:56:44.552576 2091 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 08:56:44.555069 kubelet[2091]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 08:56:44.555420 kubelet[2091]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 08:56:44.566971 kubelet[2091]: I0209 08:56:44.566878 2091 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 08:56:44.567225 kubelet[2091]: I0209 08:56:44.567194 2091 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 08:56:44.567892 kubelet[2091]: I0209 08:56:44.567859 2091 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 08:56:44.575337 kubelet[2091]: I0209 08:56:44.575292 2091 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 08:56:44.579055 kubelet[2091]: I0209 08:56:44.577367 2091 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 08:56:44.584657 kubelet[2091]: I0209 08:56:44.584586 2091 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 08:56:44.585512 kubelet[2091]: I0209 08:56:44.585487 2091 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 08:56:44.586440 kubelet[2091]: I0209 08:56:44.586418 2091 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 08:56:44.589499 kubelet[2091]: I0209 08:56:44.589461 2091 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 08:56:44.589715 kubelet[2091]: I0209 08:56:44.589694 2091 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 08:56:44.589899 kubelet[2091]: I0209 08:56:44.589883 2091 state_mem.go:36] "Initialized new in-memory state store" Feb 9 08:56:44.597456 kubelet[2091]: I0209 08:56:44.597411 2091 kubelet.go:398] "Attempting to sync node with API server" Feb 9 08:56:44.597784 kubelet[2091]: I0209 08:56:44.597757 2091 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 08:56:44.598009 kubelet[2091]: I0209 08:56:44.597982 2091 kubelet.go:297] "Adding apiserver pod source" Feb 9 08:56:44.598176 kubelet[2091]: I0209 08:56:44.598154 2091 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 08:56:44.600922 kubelet[2091]: I0209 08:56:44.600882 2091 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 08:56:44.605030 kubelet[2091]: I0209 08:56:44.603799 2091 server.go:1186] "Started kubelet" Feb 9 08:56:44.619343 kubelet[2091]: I0209 08:56:44.619022 2091 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 08:56:44.623781 kubelet[2091]: I0209 08:56:44.623516 2091 server.go:451] "Adding debug handlers to kubelet server" Feb 9 08:56:44.646871 kubelet[2091]: E0209 08:56:44.646662 2091 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 08:56:44.646871 kubelet[2091]: E0209 08:56:44.646743 2091 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 08:56:44.646000 audit[2091]: AVC avc: denied { mac_admin } for pid=2091 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.646000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 08:56:44.646000 audit[2091]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001046450 a1=c00095a870 a2=c001046420 a3=25 items=0 ppid=1 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:44.646000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 08:56:44.649450 kubelet[2091]: I0209 08:56:44.649410 2091 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 08:56:44.648000 audit[2091]: AVC avc: denied { mac_admin } for pid=2091 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.648000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 08:56:44.648000 audit[2091]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010955e0 a1=c00095a888 a2=c0010464e0 a3=25 items=0 ppid=1 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:44.648000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 08:56:44.650285 kubelet[2091]: I0209 08:56:44.650255 2091 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 08:56:44.650752 kubelet[2091]: I0209 08:56:44.650727 2091 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 08:56:44.672408 kubelet[2091]: I0209 08:56:44.672360 2091 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 08:56:44.692780 sshd[2089]: Invalid user peymanh from 15.204.211.99 port 51696 Feb 9 08:56:44.700647 kubelet[2091]: I0209 08:56:44.697844 2091 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 08:56:44.716916 sshd[2089]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:44.728019 sshd[2089]: pam_unix(sshd:auth): check pass; user unknown Feb 9 08:56:44.728095 sshd[2089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=15.204.211.99 Feb 9 08:56:44.731879 sshd[2089]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:44.730000 audit[2089]: USER_AUTH pid=2089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="peymanh" exe="/usr/sbin/sshd" hostname=15.204.211.99 addr=15.204.211.99 terminal=ssh res=failed' Feb 9 08:56:44.782107 kubelet[2091]: I0209 08:56:44.782050 2091 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-b-854bdc2340" Feb 9 08:56:44.831074 kubelet[2091]: I0209 08:56:44.830939 2091 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-b-854bdc2340" Feb 9 08:56:44.834209 kubelet[2091]: I0209 08:56:44.834173 2091 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-b-854bdc2340" Feb 9 08:56:44.856778 kubelet[2091]: I0209 08:56:44.856743 2091 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 08:56:44.857002 kubelet[2091]: I0209 08:56:44.856984 2091 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 08:56:44.857143 kubelet[2091]: I0209 08:56:44.857128 2091 state_mem.go:36] "Initialized new in-memory state store" Feb 9 08:56:44.857458 kubelet[2091]: I0209 08:56:44.857439 2091 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 08:56:44.857716 kubelet[2091]: I0209 08:56:44.857684 2091 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 08:56:44.857845 kubelet[2091]: I0209 08:56:44.857828 2091 policy_none.go:49] "None policy: Start" Feb 9 08:56:44.861521 kubelet[2091]: I0209 08:56:44.861437 2091 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 08:56:44.862595 kubelet[2091]: I0209 08:56:44.862564 2091 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 08:56:44.862833 kubelet[2091]: I0209 08:56:44.862814 2091 state_mem.go:35] "Initializing new in-memory state store" Feb 9 08:56:44.863646 kubelet[2091]: I0209 08:56:44.863588 2091 state_mem.go:75] "Updated machine memory state" Feb 9 08:56:44.871384 kubelet[2091]: I0209 08:56:44.871346 2091 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 08:56:44.869000 audit[2091]: AVC avc: denied { mac_admin } for pid=2091 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 08:56:44.869000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 08:56:44.869000 audit[2091]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001556c60 a1=c0012de4e0 a2=c001556c30 a3=25 items=0 ppid=1 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 08:56:44.869000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 08:56:44.872154 kubelet[2091]: I0209 08:56:44.872127 2091 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 08:56:44.872578 kubelet[2091]: I0209 08:56:44.872551 2091 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 08:56:44.941085 kubelet[2091]: I0209 08:56:44.941046 2091 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 08:56:44.941344 kubelet[2091]: I0209 08:56:44.941322 2091 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 08:56:44.941733 kubelet[2091]: I0209 08:56:44.941709 2091 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 08:56:44.941927 kubelet[2091]: E0209 08:56:44.941909 2091 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 08:56:45.042388 kubelet[2091]: I0209 08:56:45.042334 2091 topology_manager.go:210] "Topology Admit Handler" Feb 9 08:56:45.042761 kubelet[2091]: I0209 08:56:45.042738 2091 topology_manager.go:210] "Topology Admit Handler" Feb 9 08:56:45.042904 kubelet[2091]: I0209 08:56:45.042888 2091 topology_manager.go:210] "Topology Admit Handler" Feb 9 08:56:45.070544 kubelet[2091]: E0209 08:56:45.070486 2091 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.2-b-854bdc2340\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:45.071132 kubelet[2091]: E0209 08:56:45.071089 2091 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-b-854bdc2340\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:45.208675 kubelet[2091]: I0209 08:56:45.208509 2091 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/898e9360694ea660bf62b56505884290-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-b-854bdc2340\" (UID: \"898e9360694ea660bf62b56505884290\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:45.210827 kubelet[2091]: I0209 08:56:45.209076 2091 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/898e9360694ea660bf62b56505884290-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-b-854bdc2340\" (UID: \"898e9360694ea660bf62b56505884290\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:45.210827 kubelet[2091]: I0209 08:56:45.209151 2091 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/096f5e952a97e029cb666da161c543c3-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-b-854bdc2340\" (UID: \"096f5e952a97e029cb666da161c543c3\") " pod="kube-system/kube-apiserver-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:45.210827 kubelet[2091]: I0209 08:56:45.209192 2091 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/096f5e952a97e029cb666da161c543c3-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-b-854bdc2340\" (UID: \"096f5e952a97e029cb666da161c543c3\") " pod="kube-system/kube-apiserver-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:45.210827 kubelet[2091]: I0209 08:56:45.209236 2091 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/096f5e952a97e029cb666da161c543c3-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-b-854bdc2340\" (UID: \"096f5e952a97e029cb666da161c543c3\") " pod="kube-system/kube-apiserver-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:45.210827 kubelet[2091]: I0209 08:56:45.209279 2091 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/898e9360694ea660bf62b56505884290-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-b-854bdc2340\" (UID: \"898e9360694ea660bf62b56505884290\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:45.211245 kubelet[2091]: I0209 08:56:45.209315 2091 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/898e9360694ea660bf62b56505884290-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-b-854bdc2340\" (UID: \"898e9360694ea660bf62b56505884290\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:45.211245 kubelet[2091]: I0209 08:56:45.209356 2091 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e92966ca6391121784917ab97e068347-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-b-854bdc2340\" (UID: \"e92966ca6391121784917ab97e068347\") " pod="kube-system/kube-scheduler-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:45.211245 kubelet[2091]: I0209 08:56:45.209399 2091 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/898e9360694ea660bf62b56505884290-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-b-854bdc2340\" (UID: \"898e9360694ea660bf62b56505884290\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:45.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-164.92.86.105:22-61.83.148.111:58392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:45.253580 systemd[1]: Started sshd@18-164.92.86.105:22-61.83.148.111:58392.service. Feb 9 08:56:45.360856 kubelet[2091]: E0209 08:56:45.360788 2091 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:45.372697 kubelet[2091]: E0209 08:56:45.372639 2091 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:45.373054 kubelet[2091]: E0209 08:56:45.372764 2091 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:45.617906 kubelet[2091]: I0209 08:56:45.617831 2091 apiserver.go:52] "Watching apiserver" Feb 9 08:56:45.698595 kubelet[2091]: I0209 08:56:45.698517 2091 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 08:56:45.714007 kubelet[2091]: I0209 08:56:45.713916 2091 reconciler.go:41] "Reconciler: start to sync state" Feb 9 08:56:45.956918 kubelet[2091]: E0209 08:56:45.956770 2091 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:46.016837 kubelet[2091]: E0209 08:56:46.016777 2091 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.2-b-854bdc2340\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:46.017364 kubelet[2091]: E0209 08:56:46.017333 2091 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:46.042953 sshd[2149]: Invalid user eghlima from 61.83.148.111 port 58392 Feb 9 08:56:46.082647 sshd[2149]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:46.084217 sshd[2149]: pam_unix(sshd:auth): check pass; user unknown Feb 9 08:56:46.084281 sshd[2149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.83.148.111 Feb 9 08:56:46.085039 sshd[2149]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:46.083000 audit[2149]: USER_AUTH pid=2149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="eghlima" exe="/usr/sbin/sshd" hostname=61.83.148.111 addr=61.83.148.111 terminal=ssh res=failed' Feb 9 08:56:46.207430 kubelet[2091]: E0209 08:56:46.207275 2091 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-b-854bdc2340\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.2-b-854bdc2340" Feb 9 08:56:46.208382 kubelet[2091]: E0209 08:56:46.208327 2091 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:46.217433 sshd[2089]: Failed password for invalid user peymanh from 15.204.211.99 port 51696 ssh2 Feb 9 08:56:46.220000 audit[1944]: AVC avc: denied { watch } for pid=1944 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=525104 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c919 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 08:56:46.220000 audit[1944]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e9b8c0 a2=fc6 a3=0 items=0 ppid=1782 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c919 key=(null) Feb 9 08:56:46.220000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 08:56:46.252107 systemd[1]: Started sshd@19-164.92.86.105:22-5.157.10.83:47846.service. Feb 9 08:56:46.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-164.92.86.105:22-5.157.10.83:47846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:46.453220 kubelet[2091]: I0209 08:56:46.453176 2091 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-b-854bdc2340" podStartSLOduration=1.452549491 pod.CreationTimestamp="2024-02-09 08:56:45 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 08:56:46.451596576 +0000 UTC m=+2.082123696" watchObservedRunningTime="2024-02-09 08:56:46.452549491 +0000 UTC m=+2.083076637" Feb 9 08:56:46.605859 systemd[1]: Started sshd@20-164.92.86.105:22-89.185.85.104:58238.service. Feb 9 08:56:46.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-164.92.86.105:22-89.185.85.104:58238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:46.684891 sshd[2089]: Received disconnect from 15.204.211.99 port 51696:11: Bye Bye [preauth] Feb 9 08:56:46.685130 sshd[2089]: Disconnected from invalid user peymanh 15.204.211.99 port 51696 [preauth] Feb 9 08:56:46.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-164.92.86.105:22-15.204.211.99:51696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:46.686753 systemd[1]: sshd@17-164.92.86.105:22-15.204.211.99:51696.service: Deactivated successfully. Feb 9 08:56:46.959100 kubelet[2091]: E0209 08:56:46.958966 2091 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:46.959880 kubelet[2091]: E0209 08:56:46.959856 2091 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:46.960691 kubelet[2091]: E0209 08:56:46.960274 2091 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:47.195869 sshd[2152]: Invalid user hui from 5.157.10.83 port 47846 Feb 9 08:56:47.200262 sshd[2152]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:47.201226 sshd[2152]: pam_unix(sshd:auth): check pass; user unknown Feb 9 08:56:47.201287 sshd[2152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.157.10.83 Feb 9 08:56:47.202095 sshd[2152]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:47.200000 audit[2152]: USER_AUTH pid=2152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hui" exe="/usr/sbin/sshd" hostname=5.157.10.83 addr=5.157.10.83 terminal=ssh res=failed' Feb 9 08:56:47.521862 sshd[2156]: Invalid user pariii from 89.185.85.104 port 58238 Feb 9 08:56:47.527890 sshd[2156]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:47.529310 sshd[2156]: pam_unix(sshd:auth): check pass; user unknown Feb 9 08:56:47.529609 sshd[2156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.185.85.104 Feb 9 08:56:47.530681 sshd[2156]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:47.529000 audit[2156]: USER_AUTH pid=2156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pariii" exe="/usr/sbin/sshd" hostname=89.185.85.104 addr=89.185.85.104 terminal=ssh res=failed' Feb 9 08:56:47.866347 systemd[1]: Started sshd@21-164.92.86.105:22-43.133.34.99:52674.service. Feb 9 08:56:47.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-164.92.86.105:22-43.133.34.99:52674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:48.302057 sudo[1261]: pam_unix(sudo:session): session closed for user root Feb 9 08:56:48.300000 audit[1261]: USER_END pid=1261 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 08:56:48.300000 audit[1261]: CRED_DISP pid=1261 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 08:56:48.310960 sshd[1257]: pam_unix(sshd:session): session closed for user core Feb 9 08:56:48.310000 audit[1257]: USER_END pid=1257 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 08:56:48.311000 audit[1257]: CRED_DISP pid=1257 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 08:56:48.315321 systemd-logind[1093]: Session 7 logged out. Waiting for processes to exit. Feb 9 08:56:48.317588 systemd[1]: sshd@10-164.92.86.105:22-139.178.89.65:40490.service: Deactivated successfully. Feb 9 08:56:48.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-164.92.86.105:22-139.178.89.65:40490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 08:56:48.318658 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 08:56:48.318865 systemd[1]: session-7.scope: Consumed 5.691s CPU time. Feb 9 08:56:48.321505 systemd-logind[1093]: Removed session 7. Feb 9 08:56:48.514890 sshd[2149]: Failed password for invalid user eghlima from 61.83.148.111 port 58392 ssh2 Feb 9 08:56:48.885556 sshd[2165]: Invalid user iphone from 43.133.34.99 port 52674 Feb 9 08:56:48.890195 sshd[2165]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:48.892760 sshd[2165]: pam_unix(sshd:auth): check pass; user unknown Feb 9 08:56:48.892819 sshd[2165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.133.34.99 Feb 9 08:56:48.893739 sshd[2165]: pam_faillock(sshd:auth): User unknown Feb 9 08:56:48.902200 kernel: kauditd_printk_skb: 327 callbacks suppressed Feb 9 08:56:48.902409 kernel: audit: type=1100 audit(1707469008.892:984): pid=2165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="iphone" exe="/usr/sbin/sshd" hostname=43.133.34.99 addr=43.133.34.99 terminal=ssh res=failed' Feb 9 08:56:48.892000 audit[2165]: USER_AUTH pid=2165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="iphone" exe="/usr/sbin/sshd" hostname=43.133.34.99 addr=43.133.34.99 terminal=ssh res=failed' Feb 9 08:56:49.247221 kubelet[2091]: E0209 08:56:49.247080 2091 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 08:56:49.270261 kubelet[2091]: I0209 08:56:49.270220 2091 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-b-854bdc2340" podStartSLOduration=5.270142136 pod.CreationTimestamp="2024-02-09 08:56:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 08:56:46.811737086 +0000 UTC m=+2.442264208" watchObservedRunningTime="2024-02-09 08:56:49.270142136 +0000 UTC m=+4.900669254" Feb 9 08:56:49.435815 sshd[2152]: Failed password for invalid user hui from 5.157.10.83 port 47846 ssh2 Feb 9 08:56:49.765158 sshd[2156]: Failed password for invalid user pariii from 89.185.85.104 port 58238 ssh2 Feb 9 08:56:49.965495 kubelet[2091]: E0209 08:56:49.965446 2091 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2"